Search Results - (( user detection method algorithm ) OR ( using solution using algorithm ))
Search alternatives:
- method algorithm »
- using algorithm »
- user detection »
- using solution »
- solution using »
-
1
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…This research presents a mobile malware static detection method based on Naive Bayes. The approach aims to offer a solution to protect users from potential threats such as Banking Trojan malware. …”
Get full text
Get full text
Thesis -
2
DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM
Published 2022“…To contribute to the existing works of driver drowsiness detection systems, this project aims to develop a more useful drowsiness detection algorithm with low complexity and high performance using Python 3.10.1 software. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
3
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…Subsequently, the security alert mechanism is formulated by integrating with the detection algorithm to alert Twitter users. The overall result significantly indicates that a novel security alert framework using dynamic tweet-based features for phishing detection on Twitter has been formulated. …”
Get full text
Get full text
Thesis -
4
Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors
Published 2020“…The Amplitude Pace Switching (APS) detection algorithm is introduced to detect the amplitude of the user’s body movement for pace switching. …”
Get full text
Get full text
Thesis -
5
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…This Artificial Neural Network (ANN) is an algorithm that is used to determine the type of fault and the severity level as well as isolate the fault from the system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…In addition, DL-based malware detection methods often entail single classifiers. …”
Get full text
Get full text
Get full text
Article -
7
Detection of multiple mangoes using histogram of oriented gradient technique in aerial monitoring
Published 2016“…The project uses shape identification algorithm and Histogram of Oriented Gradient principle to detect and count the total number of mango on its tree using a quad copter with an attachable webcam. …”
Get full text
Get full text
Get full text
Article -
8
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
9
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…It consists of a device database and two processing components: (1) device identification module and (2) device capabilities detection module. The content negotiation and adaptation architecture was implemented and validated through various laboratory experiments and field studies which the results highlight the importance of using token attributes matcher by eliminating the need of using the entire user agent strings for device identification and capabilities detection. …”
Get full text
Get full text
Thesis -
10
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…The goal of this study is to investigate and develop a reliable and accurate method for detecting gait activities on an inclined surface such as stairs using smartphones as the sensing device. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Fish pellet measurement system for food industry
Published 2025“…Then, the image will be processed in a trained model to detect the fish pellet. Then, an algorithm will be used to determine the fish pellet's diameter based on the result of the detection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
13
DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi
Published 2025“…This could include for instance a systematic literature review on theories available to understand the current problem and its possible solution, analysis of the users need gathered from interviews, and of course the application development using Flutter within Visual Studio Code. …”
Get full text
Get full text
Thesis -
14
Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection
Published 2019“…However, such detection method still lacks in differentiate the malware behaviours and cause the rate of falsely identified rate, i.e., false positive and false negative increased. …”
Get full text
Get full text
Get full text
Article -
15
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
Self routing traffic light for traffic light controller using priority method based on volume of vehicles
Published 2015“…The aim is to improve the efficiency of conventional traffic light system in terms of reduction of the waiting and travelling times of road users. Normally, there are two methods used to control the conventional traffic light system which are sequencing and sensor demand methods. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…By harnessing natural language processing techniques and data visualization tools, the project seeks to provide user-friendly solution for early detection and prevention of suicidal intentions expressed on social media. …”
Get full text
Get full text
Thesis -
18
Enhancing navigation for the visually impaired: a Mamdani type 1 fuzzy logic approach to obstacle detection
Published 2025“…This study proposes an innovative solution through the combination of haptic feedback with a Fuzzy Logic Controller (FLC) for the better detection of obstacles and user notification. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Terrain awareness mobility model to support outdoor mobility for people with vision impairment
Published 2023“…For the prototyping phase, the study employed the deep learning detection framework YOLOv4-tiny algorithm to implement a real-time terrain detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
A deep learning approach for facial detection in targeted billboard advertising / Lau Sian En
Published 2025“…The study indicates that using facial recognition technologies in advertising tactics can transform conventional advertising methods, providing real-time, adaptive solutions customised for diverse audiences. …”
Get full text
Get full text
Get full text
Thesis
