Search Results - (( phone application among algorithm ) OR ( _ application system algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…As many human currently depend on technologies to assist with daily tasks, there are more and more applications which have been developed to be fit in one small gadget such as smart phone and tablet. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…This study's implication serves the safety system in the V2P context by programming the proposed framework as an application in smartphones for exchanging pedestrian information to the vehicles for avoiding accidents…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…This study's implication serves the safety system in the V2P context by programming the proposed framework as an application in smartphones for exchanging pedestrian information to the vehicles for avoiding accidents.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…A new algorithm that can be used with integrated visual signatures, especially in late fusion query was introduced. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…Cross-site scripting vulnerabilities are among the top ten security vulnerabilities affecting web applications for the past decade and mobile version web applications more recently. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Deterministic phase sequence approach for peak to average power ratio reduction in orthogonal frequency division multiplexing systems by Kazemian, Mohsen

    Published 2016
    “…Orthogonal Frequency Division Multiplexing (OFDM) is the current proposed approach in the several applicable wireless communication standards such as IEEE 802.15.3a, 802.11, and 802.16, and is utilized in the Digital Video Broadcasting (DVB) and European Digital Audio Broadcasting (DAB) systems. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…They have a wide range of application in which the goal is to decrease the probability of the system hazardous behavior. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Algorithm development for optimization of a refrigeration system by Izzat, Mohamad Adnan

    Published 2010
    “…The thesis describes the step by step the method to find an algorithm by using experimental data. Vapor compression refrigeration system was studied as it is the most widely used refrigeration system especially in small scale of refrigeration application such as in domestic application. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16
  17. 17
  18. 18

    Development of improved metaheuristic algorithms for modelling and control of a flexible manipulator system by Nasir, Ahmad Nor Kasruddin, Ahmad, Mohd Ashraf, Raja Ismail, R. M.T., Muhammad Hamka, Embong

    Published 2019
    “…The developed algorithms have been applied to optimize Proportional Integral Derivative (PID) controller parameters for a flexible manipulator system and an inverted pendulum system. …”
    Get full text
    Get full text
    Research Report
  19. 19
  20. 20

    A Study On The Application Of Gravitational Search Algorithm In Optimizing Stereo Matching Algorithm’s Parameters For Star Fruit Inspection System by Zainal Abidin, Amar Faiz, Mohd Ali, Nursabillilah, Mat Zain, Norlina, Abdul Majid, Masmaria, Rifin, Rozi, Kadiran, Kamaru Adzha, Mohd Mokji, Ahmad Musa, Tan, Kok, Amirulah, Rahman

    Published 2018
    “…This paper reports the result obtained by implementing Gravitational Search Algorithm for tuning Stereo Matching Algorithm’s parameters for the application star fruit inspection system. …”
    Get full text
    Get full text
    Get full text
    Article