Search Results - (( _ application ((a algorithm) OR (new algorithm)) ) OR ( mobile application mining algorithm ))*
Search alternatives:
- application mining »
- mining algorithm »
- new algorithm »
- a algorithm »
-
1
-
2
A new mobile malware classification for SMS exploitation
Published 2024“…This research has developed a new mobile malware classification for Android smartphone using a covering algorithm. …”
Conference Paper -
3
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The algorithm assigns a life time for each newly created temporal micro clusters so that the new incoming batch of trajectories segments will interact only with the non-expired temporal micro clusters. …”
Get full text
Get full text
Thesis -
4
Data mining in mobile ECG based biometric identification
Published 2014Get full text
Get full text
Get full text
Article -
5
-
6
-
7
Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia
Published 2022“…A service offered by a bank or other financial institution that enables its users to execute financial transactions remotely using a mobile device, such as a smartphone or tablet, is known as mobile banking. …”
Get full text
Get full text
Get full text
Article -
8
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…For future work, the prototype can be further enhanced as one of the mobile application. Moreover, this study can be further applied for a larger size of message context (instead of SMS that is limited to 160 characters) and also tested in other languages.…”
thesis::doctoral thesis -
9
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…Mobile data stream mining (MDSM) applications in MECC systems involve massive heterogeneity at application and platform levels. …”
Get full text
Get full text
Get full text
Thesis -
10
Design and evaluation on adaptive fuzzy speed control of mobile robot
Published 2011“…Both data acquisition and control algorithm are developed by using LabVIEW. A four-wheel mobile robot, PUTRABOT2, is used to conduct the experiments. …”
Get full text
Get full text
Thesis -
11
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…Mobile devices are a gold mine of evidences for forensic investigators as they store valuable social networking data. …”
Get full text
Get full text
Get full text
Thesis -
12
MiMaLo: advanced normalization method for mobile malware detection
Published 2022“…An application used to be mounted on mobile gadget to gather facts and processed them to get dataset. …”
Get full text
Get full text
Get full text
Article -
13
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…In order to improve the detection rate of malicious application on the Android platform, a novel knowledge-based database discovery model that improves apriori association rule mining of a priori algorithm with Particle Swarm Optimization (PSO) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
Intuitive content management system via manipulation and duplication with if-else rules classification
Published 2018“…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
Get full text
Get full text
Thesis -
15
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…Advanced forensic techniques become inevitable to investigate the malicious activities in Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific evidential artifact from the Mobile Cloud Computing (MCC) environment under forensically sound conditions. …”
Get full text
Get full text
Thesis -
16
Application of a New Efficient Normal Parameter Reduction Algorithm of Soft Sets in Online Shopping
Published 2014“…A new efficient normal parameter reduction algorithm of soft set in decision making was proposed. …”
Get full text
Get full text
Get full text
Article -
17
A new fair marker algorithm for DiffServ networks
Published 2008“…Internet Engineering Task Force (IETF) has proposed many new technologies to cover the new real time applications which have become very important in today's Internet demands. …”
Get full text
Get full text
Article -
18
Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks
Published 2008“…Our contribution to mobility management is to propose a mobility prediction algorithm using location tracking and data mining, to propose a delay management approach that cuts down major delays, and to propose a two stage resource reservation scheme. …”
Get full text
Get full text
Get full text
Thesis -
19
A new algorithm for routing and scheduling in optical omega network
Published 2008“…We propose a new algorithm called the ZeroY algorithm (ZeroY) to avoid crosstalk and route the traffic in an OM IN more efficiently. …”
Get full text
Get full text
Get full text
Article -
20
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…The LP’s application is need to be further computed with a technique and Simplex algorithm is the one that commonly used. …”
Get full text
Get full text
Get full text
Thesis
