Search Results - (( mobile evaluation system algorithm ) OR ( based classification _ algorithm ))*
Search alternatives:
- based classification »
- mobile evaluation »
- evaluation system »
- system algorithm »
-
1
-
2
A new mobile malware classification for SMS exploitation
Published 2024“…This paper explores how mobile malware exploit the system calls via SMS. As a solution, we proposed a system calls classification based on surveillance exploitation system calls for SMS. …”
Conference Paper -
3
-
4
Maldroid- attribute selection analysis for malware classification
Published 2019“…The experiment evaluated 8000 real data samples and the result showed that InfoGainEval and KNN algorithm are the most selected in attribute selection and classification process.…”
Get full text
Get full text
Get full text
Article -
5
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
6
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
A wheelchair sitting posture detection system using pressure sensors
Published 2024“…All the classification algorithms were evaluated by using the k-fold cross validation method. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli
Published 2018“…Moreover, the algorithm used for rule-based expert system is forward chaining method. …”
Get full text
Get full text
Student Project -
9
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To this end, computationally efficient classification algorithms such as decision tree, logistic regression and k-Nearest Neighbors were used to implement diverse, flexible and dynamic human activity detection systems. …”
Get full text
Get full text
Article -
10
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
Get full text
Get full text
Thesis -
11
Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud
Published 2022“…An improvement is needed on this factor, which could increase the accuracy of the system in the future. The objectives of this research are to develop a Malaysian license plate recognition system using a Convolutional Neural Network (CNN) on a web application and evaluate the performance of the system based on accuracy and loss values. …”
Get full text
Get full text
Student Project -
12
A web-based image recognition system for detecting harumanis mangoes / Mohamad Shahmil Saari, Romiza Md Nor and Huzaifah A Hamid
Published 2020“…A web-based image recognition system for detecting Harumanis mangoes was developed and known as CamPauh to recognize four classes of mango which are Harumanis, apple mango, other types of mangoes and not mango. …”
Get full text
Get full text
Get full text
Article -
13
Evaluation tool of land suitability for medicinal plants
Published 2019“…An algorithm is employed in the form the Rule Based System (RBS) in a way to construct the framework into bunch of rules that connect each other, resulting the conclusion of suitability. …”
Get full text
Get full text
Get full text
Article -
14
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
Published 2023“…Today many smart devices are running on Android systems. With the increasing popularity of Android, mobile malware continuously evolves as well, and further attacks Android operating systems. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An enhanced android botnet detection approach using feature refinement
Published 2019“…The experimental and statistical tests show that 97.28% accuracy achieved by Random Forest machine classifier, it performs well as compared to other classification algorithms. Based on the test results, various open research issues which need to be addressed in future studies are highlighted.…”
Get full text
Get full text
Thesis -
16
-
17
-
18
Outdoor marker-less tracking and pose calculating system for mobile augmented reality
Published 2014“…A proof of concept mobile AR system is implemented as part of this thesis. …”
Get full text
Get full text
Thesis -
19
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
20
Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff
Published 2011“…Subsequently, both algorithms were applied to the test environments. Finally, the performances of both algorithms were analyzed and evaluated based on the required criteria. …”
Get full text
Get full text
Thesis
