Search Results - (( mobile extraction method algorithm ) OR ( using optimization method algorithm ))

Refine Results
  1. 1

    Behavioural Feature Extraction For Context-Aware Traffic Classification Of Mobile Applications by Aun, Yichiet

    Published 2018
    “…This thesis identified domain-specific features that are effective for accurate, large-scale and scalable mobile applications classification using machine learning techniques. This thesis designed a context-aware traffic classification framework that includes a set of sequential algorithms from cleaning datasets, to identifying new features and detecting optimal classifier(s) based on problem contexts to improve classification accuracy in multi-variate traffic classification.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Color Image Segmentation Based on Bayesian Theorem for Mobile Robot Navigation by Rahimizadeh, Hamid

    Published 2009
    “…Experimental results show that the proposed algorithm works better than other two methods in terms of classifier accuracy with result of more than 99 percent successful segmentation of desired color in varying illumination. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions by Akhlaqi, Mohammad Yahya, Mohd Hanapi, Zurina

    Published 2023
    “…For each journal paper, the detailed information of the work area, targeted issue, formulation technique, optimization approach, adopted algorithms, evaluation techniques, performance matrices, dataset, utilized tools, and framework are extracted and analyzed using manual and automatic coding. …”
    Get full text
    Get full text
    Article
  5. 5

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…The implementation of pre-processing algorithms has been demonstrated to be able to mitigate the signal noises that arises from the winking signals without the need for the use signal filtering algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad by Mehdi , Jahanirad

    Published 2016
    “…Hence, addressing robust feature extraction methods for source communication device identification is necessary. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Geometric-RANSAC position estimation method for enhanced indoor positioning using multipath signals for single base station systems by Manap, Zahariah, Awang Md Isa, Azmi, Darsono, Abd Majid, Zainuddin, Suraya, Mohd Sultan, Juwita, Attiah, Mothana Lafta

    Published 2025
    “…The method considers the formation of a virtual multiple BS system model by treating each of the multipath components received at a mobile station (MS) position as a signal transmitted by a virtual BS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Hybrid indoor positioning utilizing multipath- assisted fingerprint and geometric estimation for single base station systems by Manap, Zahariah

    Published 2025
    “…In the position estimation phase, a novel Geometric Random Sample Consensus (Geometric-RANSAC) multilateration method is proposed by optimizing the MS position estimate over several potential position estimates calculated using regional 3D geometric equations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Data mining in mobile ECG based biometric identification by Sidek, Khairul Azami, Mai, Vu, Khalil, Ibrahim

    Published 2014
    “…Subjects in MIT-BIH Normal Sinus Rhythm Database (NSRDB) were used to validate the reliability and stability of the subject recognition methods. Discriminatory features extracted from the experimentation were later applied to different classifiers for performance measures based on the complexity of our proposed sample extraction method when compared to other related algorithms, the total execution time (TET) applied on different classifiers in various mobile devices and the classification accuracies when applied to various classification techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment by Wang, Kai, Zhou, Jun, Zhang, Wenhai, Zhang, Baohua

    Published 2021
    “…Finally, morphological parameters of the canopy, such as crown height, crown diameter, and crown volume, are extracted using statistical and voxel methods. To verify the algorithm, a total of 43 trees in multiple plots of the campus were tested and compared. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Overhead vision system for mobile robot orientation detection by Fadzilah, Hashim

    Published 2011
    “…Cameras are used to capture the images of mobile robot at various orientations. The images are preprocessed and important features are extracted to be used in the proposed methods. …”
    Get full text
    Thesis
  14. 14

    Application of genetic algorithm methods to optimize flowshop sequencing problem by Mohd Fadil, Md Sairi

    Published 2008
    “…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…Power consumption is one major constraint that makes traditional detection methods impractical for mobile devices, while cloud-based techniques raise many privacy concerns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Reduced Set Kernel Principal Component Analysis (Rskpca) Algorithm for Palm Print Based Mobile Biometric System by Ibrahim, Noor Salwani

    Published 2015
    “…In this project, it has been proven that the proposed RSKPCA as feature extraction gives the best result for mobile biometric system based on palm print. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Designing an expressive virtual Kompang on mobile device with tri-axial accelerometer by Leng, Hoo Yong, Mohd Norowi, Noris, Jantan, Azrul Hazri

    Published 2018
    “…This paper is therefore implemented a simple extraction method by extracting percussive features from embedded sensors to map with the output sound with minimum delay. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Wind farm reactive power optimization by using imperialist competitive algorithm by Soheilirad, Mohammadsoroush, Hizam, Hashim, Farzan, Payam, Hojabri, Mojgan, Fallah, Seyedeh Narjes, Soheilirad, G.

    Published 2013
    “…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
    Get full text
    Get full text
    Conference or Workshop Item