Search Results - (( mobile detection system algorithm ) OR ( rate simulation based algorithm ))

Refine Results
  1. 1

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…On the other hand, the detection algorithm based on the energy consumption achieves PDR of 91.6%, EED of 14.03 ms and detection rate accuracy of 93%. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…A series of experimental results demonstrate that the proposed intrusion detection model can effectively detect anomalies with low false positive rate, high detection rate and achieve high detection accuracy.…”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…The study is carried out using a theoretical calculation, and simulation experiment. The simulations are carried out using various design parameters namely; distance, bit rate, input power and chip spacing. …”
    Get full text
    Thesis
  4. 4

    Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks by Solouk, Vahid

    Published 2009
    “…The performance of the proposed framework has been analyzed mathematically and through simulations which show the robustness of VFHO in terms of signaling cost, endto- end packet delivery cost, overall handoff latency, and packet loss based on various system variables. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil

    Published 2013
    “…The performance of all the schemes are simulated and analyzed by using MatLab 7.9 simulator.…”
    Get full text
    Get full text
    Thesis
  6. 6

    A Scheme For Space-Time-Frequency Coding And Adaptive Multiple Antenna Selection For Improving The Performance Of Multiple-Input Single-Output Ofdm System by Noordin, Nor Kamariah

    Published 2006
    “…Minor contribution of this thesis includes a simplified sphere decoding algorithm for MIMO that forms part of the detection scheme at the receiver. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…The execution models are based on either standalone mobile devices, mobile-to-mobile, mobile-to-edge, or mobile-to-cloud communication models. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Mitigation of Mach Zehnder modulator nonlinearity in millimeter wave radio over fiber system using digital predistortion by Duraikannan, Shankar

    Published 2017
    “…The predistorter is the copy of the training filter that is connected as the post distorter to the nonlinear RoF system. The coefficient computation is performed using recursive prediction error method (RPEM) algorithm which shows a dominant spectral regrowth reduction and in-band distortion reduction with reduced complexity compared to the commonly used slow converging, least mean square algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Automated feature selection using boruta algorithm to detect mobile malware by Che Akmal, Che Yahaya, Ahmad Firdaus, Zainal Abidin, Salwana, Mohamad, Ernawan, Ferda, Mohd Faizal, Ab Razak

    Published 2020
    “…The usage of android system is rapidly growing in mobile devices. Android system might also incur severe different malware dangers and security threats such as infections, root exploit, Trojan, and worms. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…HIDES is developed using the System Development Life Cycle (SDLC) approach. HIDES implements an object detection algorithm; Single-Shot Multibox Detection (SSD) in NVIDIA Jetson Nano to detect intruders through a camera connected to the system. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…The results indi�cate that detection system can detect the DDoS backscatter from both labeled and unlabeled packets with high recall and precision rate within a short time. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm by Wan Bejuri, Wan Mohd Ya'akob, Harun, Muhammad Harraz, Mohamad, Abdul Karim

    Published 2022
    “…The system using algorithm using CNN as an algorithm and the architecture used is Tiny-YOLOv2 to detect traffic signs and pedestrians. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…The simulation result of this study indicated that application of FLC in mobile robot could be a suitable system for fire detection and fire fighting task in an unknown environment. …”
    Get full text
    Get full text
    Thesis