Search Results - (( mobile detection method algorithm ) OR ( java application based algorithm ))
Search alternatives:
- application based »
- mobile detection »
- method algorithm »
- java application »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…Power consumption is one major constraint that makes traditional detection methods impractical for mobile devices, while cloud-based techniques raise many privacy concerns. …”
Get full text
Get full text
Get full text
Thesis -
2
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…A prototype of a mobile robot based on Lego successfully implemented by using PIC and can be controlled through voice recognition. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
Published 2004“…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
Get full text
Get full text
Get full text
Article -
5
Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm
Published 2010“…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…This research presents a mobile malware static detection method based on Naive Bayes. …”
Get full text
Get full text
Thesis -
7
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
8
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
Get full text
Get full text
Get full text
Article -
9
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
Get full text
Get full text
Get full text
Thesis -
10
Optimizing the performance of mobile malware detection using the indexing rule
Published 2024journal::journal article -
11
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
12
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…More comprehensive study in behaviour coordination will be the major focus to ensure smoother robot navigation and more effective fire detection capability. Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
Get full text
Get full text
Thesis -
13
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
14
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019Get full text
Get full text
Get full text
Book Chapter -
15
Computing non-contactable drowsiness monitoring system with mobile machine vision
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
Published 2020“…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
Get full text
Get full text
Journal -
17
Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors
Published 2020“…The Amplitude Pace Switching (APS) detection algorithm is introduced to detect the amplitude of the user’s body movement for pace switching. …”
Get full text
Get full text
Thesis -
18
Obstacles Avoidance Mobile Robot
Published 2007“…The objective of this project is to build an obstacle avoidance mobile robot using a RC car as a platform. The obstacle avoidance algorithm is very useful in order to provide a program or a mobile robot with the ability to move independently while avoiding itself to collide with any kind of obstacles such as a surveillance robot. …”
Get full text
Get full text
Final Year Project -
19
A generalized laser simulator algorithm for mobile robot path planning with obstacle avoidance
Published 2022“…This paper aims to develop a new mobile robot path planning algorithm, called generalized laser simulator (GLS), for navigating autonomously mobile robots in the presence of static and dynamic obstacles. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…This method is then utilized as the basis of dynamic ancestral mutual exclusion algorithm for MANET which is named as MDA. …”
Get full text
Get full text
Thesis
