Search Results - (( mobile relation based algorithm ) OR ( _ identification system algorithm ))*

Refine Results
  1. 1

    Identification Of Flow Blockage Levels In Centrifugal Pump By Machine Learning by Ng, Woon Li

    Published 2021
    “…SVM model with cubic kernel is preferable as the training time taken is relatively lower than Ensemble Bagged Tree due to the ensemble algorithms are more complex. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Bayesian signaling game based efficient security model for MANETs by Olanrewaju, Rashidah Funke, Khan, Burhan Ul Islam, Anwar, Farhat, Mir, Roohie Naaz, Yaacob, Mashkuri, Mehraj, Tehseen

    Published 2020
    “…The regular nodes record incessantly to examine their corresponding nodes’ behaviours by using the belief system of Bayes-rules. On its comparison with existing schemes, it was revealed that the presented algorithm provides better identification of malicious nodes and attacks while delivering improved throughput and reduced false positive rate.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…A new algorithm that can be used with integrated visual signatures, especially in late fusion query was introduced. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm by Rahman, MZA, Madihah Mohd Saudi

    Published 2024
    “…A case study was carried out to reverse engineering the mobile botnet codes. Based on the findings, this mobile botnet has successfully posed itself as a fake anti-virus and has the capability to steal important data such as username and password from the Android-based devices. …”
    Proceedings Paper
  5. 5
  6. 6

    Adaptive fault tolerant checkpointing algorithm for cluster based mobile Ad Hoc networks by Mansour, Houssem, Badache, Nadjib, Aliouat, Makhlouf, Pathan, Al-Sakib Khan

    Published 2015
    “…In this paper, we propose an adaptive, coordinated and non-blocking checkpointing algorithm to provide fault tolerance in cluster based MANET, where only minimum number of mobile hosts in the cluster should take checkpoints. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
    Proceedings Paper
  8. 8

    Multivariable system identification for dynamic discrete-time nonlinear system using genetic algorithm by Ahmad, R., Jamaluddin, H., Hussain, Mohd Azlan

    Published 2002
    “…The development of a multivariable system identification model for dynamic discrete-time nonlinear system using genetic algorithm was discussed and analysed. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Data mining in mobile ECG based biometric identification by Sidek, Khairul Azami, Mai, Vu, Khalil, Ibrahim

    Published 2014
    “…Therefore, these outcomes support the usability of ECG based biometric identification in a mobile environment.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Multivariable system identification for dynamic discrete-time nonlinear system using genetic algorithm by Ahmad, R., Jamaluddin, H., Hussain, M. A.

    Published 2002
    “…The development of a multivariable system identification model for dynamic discrete-time nonlinear system using genetic algorithm was discussed and analysed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Adaptive Linear System Identification over Simulated Wireless Environment by Elamin, Musab Jabralla Omer Elamin

    Published 2009
    “…The thesis investigates the possibility of performing system identification over wireless network for both on-line and off-line system identification approaches. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Development of behavior-based reactive navigation system for mobile robot by Mohd Hamami, Mohd Ghazali

    Published 2013
    “…The motions of Pioneer 3TM mobile robot were simulated to show the developed algorithm performance. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…To overcome the issues related to the broadcasting method, several routing algorithms have been proposed over the Ad hoc on demand Distance Vactor (AODV) such as Neighbor Coverage-Based Probabilistic Rebroadcast (NCPR). …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks by Ali, Khalid Abdullahi

    Published 2017
    “…This thesis proposes a prediction-based scheme called Face-based Target Tracking Technique (FTTT) to minimize energy depletion and prolong the lifetime for sensor node while accurately tracking mobile objects. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Identification of non-linear dynamic systems using fuzzy system with constrained membership functions by Yaakob, Mohd. Shafiek

    Published 2004
    “…This study deals with the use of the rule-based fuzzy system for the identification of non-linear dynamic systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…Originality/value – This study presents a novel hybrid algorithm for system identification of an autonomous helicopter model.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…Hence, it is essential to discover the alternative algorithms in order to apply the concept of subspace identification recursively. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…Model structure selection is one of the important steps in a system identification process. Evolutionary computation (EC) is known to be an effective search and optimization method and in this paper EC is proposed as a model structure selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article