Search Results - (( phone application bayes algorithm ) OR ( its application interface algorithm ))*

Refine Results
  1. 1

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Android malware detection using permission based static analysis by Mohd Ariffin, Noor Afiza, Casinto, Hanna Pungo

    Published 2024
    “…Then, K-nearest Neighbor (KNN) and Naïve Bayes (NB) algorithms are applied, and the proposed method is compared with the previous studies and the expected experimental results of the proposed approach will be higher.…”
    Get full text
    Get full text
    Article
  3. 3

    Android malware detection using permission based static analysis by Mohd Ariffin, Noor Afiza, Casinto, Hanna Pungo

    Published 2023
    “…Then, K-nearest Neighbor (KNN) and Na¯ve Bayes (NB) algorithms are applied, and the proposed method is compared with the previous studies and the expected experimental results of the proposed approach will be higher.…”
    Get full text
    Get full text
    Article
  4. 4

    DC motor control using LQR algorithm by Adezeno, Sagoli Olid

    Published 2008
    “…Simulink is chosen due to its block diagram implementation and its creation of user interface which allowing interfacing with programs in others languages. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Brain Machine Interface Controlled Robot Chair by Hema Chengalvarayan, Radhakrishnamurthy

    Published 2010
    “…The BMI controls the joystick of the robot chair using a shared control algorithm. Real-time experiments are also presented using 10 trained and 5 untrained subjects to validate the applicability of the brain machine interface. …”
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    A primary interface selection policy in heterogeneous networks based on QoS by Masud, M. H., Anwar, Farhat, Bari, S.M. Sadakatul

    Published 2012
    “…To connect the above devices, a primary interface can be assigned to a mobile node (MN). Mobile users should be connected with appropriate interfaces based on the application types and its requirements. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Scentopia: Navigating the World of Fragrance by Abd Mutalib, Nurrul Kamaliah

    Published 2024
    “…The programme streamlines the perfume picking process and directs users towards their ideal smell match by utilising cutting-edge algorithms, personalised scent profile, and user-friendly interfaces. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Simulation approach for time-distance calculations based on Newton Forward Divided Difference Interpolation Formula by Sadikin, Zubaidah, Harun, Nurzalina, Panji, Elaziera, Mohd Rohaidi, Nur Nadhirah, Rathi, Sidik, Salim Nasir, Mohd Agos

    Published 2024
    “…Additionally, the significance of graphical user interfaces in simplifying complex tasks and improving user accessibility further validating i-Dash's approach to enhancing journey experiences through its intuitive interface design.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Development of finite element model for soil-structure interaction by Shoaei, Mohammad Dalili

    Published 2014
    “…In general, application of interface element can well highlight the influence of soil behavior and its consequent effects on the superstructure. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
    Proceedings Paper