Search Results - (( user detection method algorithm ) OR ( using solution using algorithm ))

Refine Results
  1. 1

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…This research presents a mobile malware static detection method based on Naive Bayes. The approach aims to offer a solution to protect users from potential threats such as Banking Trojan malware. …”
    Get full text
    Get full text
    Thesis
  2. 2

    DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM by YVONNE, PHUA YEE WUN

    Published 2022
    “…To contribute to the existing works of driver drowsiness detection systems, this project aims to develop a more useful drowsiness detection algorithm with low complexity and high performance using Python 3.10.1 software. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  3. 3

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…Subsequently, the security alert mechanism is formulated by integrating with the detection algorithm to alert Twitter users. The overall result significantly indicates that a novel security alert framework using dynamic tweet-based features for phishing detection on Twitter has been formulated. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors by Ang, Yang Yi

    Published 2020
    “…The Amplitude Pace Switching (APS) detection algorithm is introduced to detect the amplitude of the user’s body movement for pace switching. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…This Artificial Neural Network (ANN) is an algorithm that is used to determine the type of fault and the severity level as well as isolate the fault from the system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Detection of multiple mangoes using histogram of oriented gradient technique in aerial monitoring by Mohd Ali, Nursabillilah, Karis, Mohd Safirin, Mohd Sobran, Nur Maisarah, Bahar, Mohd Bazli, Oh, Kok Ken, Mat Ibrahim, Masrullizam, Johan, Nurul Fatiha

    Published 2016
    “…The project uses shape identification algorithm and Histogram of Oriented Gradient principle to detect and count the total number of mango on its tree using a quad copter with an attachable webcam. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  9. 9

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…It consists of a device database and two processing components: (1) device identification module and (2) device capabilities detection module. The content negotiation and adaptation architecture was implemented and validated through various laboratory experiments and field studies which the results highlight the importance of using token attributes matcher by eliminating the need of using the entire user agent strings for device identification and capabilities detection. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Investigating optimal smartphone placement for identifying stairs movement using machine learning by Muhammad Ruhul Amin, Shourov, Husman, Muhammad Afif, Toha, Siti Fauziah, Jasni, Farahiyah

    Published 2023
    “…The goal of this study is to investigate and develop a reliable and accurate method for detecting gait activities on an inclined surface such as stairs using smartphones as the sensing device. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Fish pellet measurement system for food industry by Ngo, Kok Wei

    Published 2025
    “…Then, the image will be processed in a trained model to detect the fish pellet. Then, an algorithm will be used to determine the fish pellet's diameter based on the result of the detection. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…This could include for instance a systematic literature review on theories available to understand the current problem and its possible solution, analysis of the users need gathered from interviews, and of course the application development using Flutter within Visual Studio Code. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection by Abdollah, Mohd Faizal, S. M. M Yassin, S. M. Warusia Mohamed, Mohd Saudi, Nur Hidayah

    Published 2019
    “…However, such detection method still lacks in differentiate the malware behaviours and cause the rate of falsely identified rate, i.e., false positive and false negative increased. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    Self routing traffic light for traffic light controller using priority method based on volume of vehicles by Tan, Swee Tiang

    Published 2015
    “…The aim is to improve the efficiency of conventional traffic light system in terms of reduction of the waiting and travelling times of road users. Normally, there are two methods used to control the conventional traffic light system which are sequencing and sensor demand methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…By harnessing natural language processing techniques and data visualization tools, the project seeks to provide user-friendly solution for early detection and prevention of suicidal intentions expressed on social media. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Enhancing navigation for the visually impaired: a Mamdani type 1 fuzzy logic approach to obstacle detection by Ibharim, Aisyah, Toha, Siti Fauziah, Nordin, Nor Hidayati Diyana, Mohammad O., Tokhi

    Published 2025
    “…This study proposes an innovative solution through the combination of haptic feedback with a Fuzzy Logic Controller (FLC) for the better detection of obstacles and user notification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Terrain awareness mobility model to support outdoor mobility for people with vision impairment by Yousef, Malkawi Abeer Dirar

    Published 2023
    “…For the prototyping phase, the study employed the deep learning detection framework YOLOv4-tiny algorithm to implement a real-time terrain detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A deep learning approach for facial detection in targeted billboard advertising / Lau Sian En by Lau , Sian En

    Published 2025
    “…The study indicates that using facial recognition technologies in advertising tactics can transform conventional advertising methods, providing real-time, adaptive solutions customised for diverse audiences. …”
    Get full text
    Get full text
    Get full text
    Thesis