Search Results - (( mobile detection system algorithm ) OR ( rate simulation based algorithm ))
Search alternatives:
- mobile detection »
- system algorithm »
- simulation based »
- rate simulation »
-
1
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…On the other hand, the detection algorithm based on the energy consumption achieves PDR of 91.6%, EED of 14.03 ms and detection rate accuracy of 93%. …”
Get full text
Get full text
Get full text
Thesis -
2
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…A series of experimental results demonstrate that the proposed intrusion detection model can effectively detect anomalies with low false positive rate, high detection rate and achieve high detection accuracy.…”
Get full text
Get full text
Get full text
Thesis -
3
Development of new code for optical code division multiple access systems
Published 2011“…The study is carried out using a theoretical calculation, and simulation experiment. The simulations are carried out using various design parameters namely; distance, bit rate, input power and chip spacing. …”
Get full text
Thesis -
4
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…The performance of the proposed framework has been analyzed mathematically and through simulations which show the robustness of VFHO in terms of signaling cost, endto- end packet delivery cost, overall handoff latency, and packet loss based on various system variables. …”
Get full text
Get full text
Thesis -
5
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The performance of all the schemes are simulated and analyzed by using MatLab 7.9 simulator.…”
Get full text
Get full text
Thesis -
6
A Scheme For Space-Time-Frequency Coding And Adaptive Multiple Antenna Selection For Improving The Performance Of Multiple-Input Single-Output Ofdm System
Published 2006“…Minor contribution of this thesis includes a simplified sphere decoding algorithm for MIMO that forms part of the detection scheme at the receiver. …”
Get full text
Get full text
Thesis -
7
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…The execution models are based on either standalone mobile devices, mobile-to-mobile, mobile-to-edge, or mobile-to-cloud communication models. …”
Get full text
Get full text
Get full text
Thesis -
8
Mitigation of Mach Zehnder modulator nonlinearity in millimeter wave radio over fiber system using digital predistortion
Published 2017“…The predistorter is the copy of the training filter that is connected as the post distorter to the nonlinear RoF system. The coefficient computation is performed using recursive prediction error method (RPEM) algorithm which shows a dominant spectral regrowth reduction and in-band distortion reduction with reduced complexity compared to the commonly used slow converging, least mean square algorithm. …”
Get full text
Get full text
Thesis -
9
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…In this paper, object detection model is developed and implemented with deep learning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
10
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
11
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…The usage of android system is rapidly growing in mobile devices. Android system might also incur severe different malware dangers and security threats such as infections, root exploit, Trojan, and worms. …”
Get full text
Get full text
Get full text
Article -
12
Home intruder detection system using machine learning and IoT
Published 2022“…HIDES is developed using the System Development Life Cycle (SDLC) approach. HIDES implements an object detection algorithm; Single-Shot Multibox Detection (SSD) in NVIDIA Jetson Nano to detect intruders through a camera connected to the system. …”
Get full text
Get full text
Get full text
Article -
13
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…The results indi�cate that detection system can detect the DDoS backscatter from both labeled and unlabeled packets with high recall and precision rate within a short time. …”
Get full text
Get full text
Thesis -
14
A study on the performances of danger theory and negative selection algorithms for mobile spam detection
Published 2024journal::journal article -
15
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
16
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
17
Systematic analysis on mobile botnet detection techniques using genetic algorithm
Published 2024Subjects:Conference Paper -
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm
Published 2022“…The system using algorithm using CNN as an algorithm and the architecture used is Tiny-YOLOv2 to detect traffic signs and pedestrians. …”
Get full text
Get full text
Get full text
Article -
20
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…The simulation result of this study indicated that application of FLC in mobile robot could be a suitable system for fire detection and fire fighting task in an unknown environment. …”
Get full text
Get full text
Thesis
