Search Results - (( mobile detection method algorithm ) OR ( rate estimation search algorithm ))

Refine Results
  1. 1

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
    Get full text
    Get full text
    Article
  2. 2

    Fast adaptive motion estimation search algorithm for H.264 encoder by Patwary, Md Anwarul Kaium

    Published 2012
    “…Furthermore this study presents an analysis of the performance of the proposed algorithm in terms of motion estimation time, total encoding time, video quality (PSNR), and bit rate. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancing the cuckoo search with levy flight through population estimation by Mohd Nawi, Nazri, Shahuddin, Shah Liyana, Rehman, Muhammad Zubair, Khan, Abdullah

    Published 2016
    “…This paper proposed the use of population estimation in a new meta-heuristic called Cuckoo search (CS) algorithm to minimize the training error, achieve fast convergence rate and to avoid local minimum problem. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Fast directional search algorithm for fractional pixel motion estimation for H.264 AVC by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun, Yap, Vooi Voon

    Published 2013
    “…The proposed search pattern and early termination reduce computational time by almost 8% to 18% as compared to the hierarchical fractional pixel algorithm employed in the reference software with a negligible degradation in video quality and negligible increase in bit rate.…”
    Get full text
    Get full text
    Citation Index Journal
  6. 6

    Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun

    Published 2012
    “…Implementation of proposed algorithm in JM12.2 of H.264/AVC shows reduction in computational complexity measured in terms of encoding time while maintaining almost same bit rate and PSNR as compared to Full Search algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Mobile robot path planning using hybrid genetic algorithm and traversability vectors method by Loo, C.K., Rajeswari, M., Wong, E.K., RaoTask, M.V.C.

    Published 2004
    “…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…This research presents a mobile malware static detection method based on Naive Bayes. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Automated feature selection using boruta algorithm to detect mobile malware by Che Akmal, Che Yahaya, Ahmad Firdaus, Zainal Abidin, Salwana, Mohamad, Ernawan, Ferda, Mohd Faizal, Ab Razak

    Published 2020
    “…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter by Nooralishahi, Parham, Loo, Chu Kiong, Shiung, Liew Wei

    Published 2019
    “…We propose a novel algorithm to estimate heart rate. Also, it can differentiate between a photo of a human face and an actual human face meaning that it can detect false signals and skip them. …”
    Get full text
    Get full text
    Article
  15. 15

    Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms by Alswaitti, Mohammed Y. T.

    Published 2018
    “…Unfortunately, these algorithms suffer with several drawbacks such as the tendency to be trapped or stagnate into local optima and slow convergence rates. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20