Search Results - (( mobile detection system algorithm ) OR ( level classification based algorithm ))*

Refine Results
  1. 1

    Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli by Ramli, Amar Aslam

    Published 2018
    “…Moreover, the algorithm used for rule-based expert system is forward chaining method. …”
    Get full text
    Get full text
    Student Project
  2. 2

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…To this end, computationally efficient classification algorithms such as decision tree, logistic regression and k-Nearest Neighbors were used to implement diverse, flexible and dynamic human activity detection systems. …”
    Get full text
    Get full text
    Article
  3. 3

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…Android has become the number one mobile operating system in term of worldwide market share since May 2012. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Identification Of Flow Blockage Levels In Centrifugal Pump By Machine Learning by Ng, Woon Li

    Published 2021
    “…Machine learning can be used as a preventive measure to detect the blockage in the pump inlet at inception level. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection by Jia, Liu

    Published 2024
    “…To address this issue, the Adaptive-Network-based Fuzzy Inference System (ANFIS) has emerged as a promising approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Computer-assisted pterygium screening system: a review by Abdani, Siti Raihanah, Zulkifley, Mohd Asyraf, Shahrimin, Mohamad Ibrani, Zulkifley, Nuraisyah Hani

    Published 2022
    “…Hence, it is important to develop an automated pterygium screening system based on simple imaging modalities such as a mobile phone camera so that it can be assessed by many people. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Multi-Class Multi-Level Classification of Mental Health Disorders Based on Textual Data from Social Media by Sutranggono, Abi Nizar, Sarno, Riyanarto, Ghozali, Imam

    Published 2024
    “…The results of the experiments show that the MCML classification algorithm successfully performs detailed classification and produces promising results for each classification level. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Automated feature selection using boruta algorithm to detect mobile malware by Che Akmal, Che Yahaya, Ahmad Firdaus, Zainal Abidin, Salwana, Mohamad, Ernawan, Ferda, Mohd Faizal, Ab Razak

    Published 2020
    “…The usage of android system is rapidly growing in mobile devices. Android system might also incur severe different malware dangers and security threats such as infections, root exploit, Trojan, and worms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…HIDES is developed using the System Development Life Cycle (SDLC) approach. HIDES implements an object detection algorithm; Single-Shot Multibox Detection (SSD) in NVIDIA Jetson Nano to detect intruders through a camera connected to the system. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm by Wan Bejuri, Wan Mohd Ya'akob, Harun, Muhammad Harraz, Mohamad, Abdul Karim

    Published 2022
    “…The system using algorithm using CNN as an algorithm and the architecture used is Tiny-YOLOv2 to detect traffic signs and pedestrians. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…The simulation result of this study indicated that application of FLC in mobile robot could be a suitable system for fire detection and fire fighting task in an unknown environment. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…MANET is an autonomous system consisting of a group of mobile nodes with no infrastructure support. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Symmetric Key Size for Different Level of Information Classification by Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…Confidential information can be categorized into various levels of classification. The classification depends on the level of damage to an organization or to national security when the information is disclosed. …”
    Get full text
    Get full text
    Conference or Workshop Item