Search Results - (( mobile detection method algorithm ) OR ( java application interface algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Mobile robot path planning using hybrid genetic algorithm and traversability vectors method by Loo, C.K., Rajeswari, M., Wong, E.K., RaoTask, M.V.C.

    Published 2004
    “…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…This research presents a mobile malware static detection method based on Naive Bayes. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automated feature selection using boruta algorithm to detect mobile malware by Che Akmal, Che Yahaya, Ahmad Firdaus, Zainal Abidin, Salwana, Mohamad, Ernawan, Ferda, Mohd Faizal, Ab Razak

    Published 2020
    “…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  12. 12

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…More comprehensive study in behaviour coordination will be the major focus to ensure smoother robot navigation and more effective fire detection capability. Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
    Get full text
    Get full text
    Thesis
  13. 13

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15
  16. 16
  17. 17
  18. 18

    Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method by Amusa, Morufu, Bamidele, Oluwade

    Published 2020
    “…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
    Get full text
    Get full text
    Journal
  19. 19

    Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors by Ang, Yang Yi

    Published 2020
    “…The Amplitude Pace Switching (APS) detection algorithm is introduced to detect the amplitude of the user’s body movement for pace switching. …”
    Get full text
    Get full text
    Thesis
  20. 20