Search Results - (( _ application ((a algorithm) OR (new algorithm)) ) OR ( mobile application mining algorithm ))*

Refine Results
  1. 1
  2. 2

    A new mobile malware classification for SMS exploitation by Zaizi N.J.M., Khailani A., Madihah Mohd Saudi

    Published 2024
    “…This research has developed a new mobile malware classification for Android smartphone using a covering algorithm. …”
    Conference Paper
  3. 3

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…The algorithm assigns a life time for each newly created temporal micro clusters so that the new incoming batch of trajectories segments will interact only with the non-expired temporal micro clusters. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia by Misinem, ., Tri Basuki, Kurniawan, Mohd Zaki, Zakaria, Muhammad Aqil Azfar, Uzailee

    Published 2022
    “…A service offered by a bank or other financial institution that enables its users to execute financial transactions remotely using a mobile device, such as a smartphone or tablet, is known as mobile banking. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…For future work, the prototype can be further enhanced as one of the mobile application. Moreover, this study can be further applied for a larger size of message context (instead of SMS that is limited to 160 characters) and also tested in other languages.…”
    thesis::doctoral thesis
  9. 9

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…Mobile data stream mining (MDSM) applications in MECC systems involve massive heterogeneity at application and platform levels. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Design and evaluation on adaptive fuzzy speed control of mobile robot by Abdollahi, Mohammadreza

    Published 2011
    “…Both data acquisition and control algorithm are developed by using LabVIEW. A four-wheel mobile robot, PUTRABOT2, is used to conduct the experiments. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…Mobile devices are a gold mine of evidences for forensic investigators as they store valuable social networking data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    MiMaLo: advanced normalization method for mobile malware detection by Sriyanto, Sahib @ Sahibuddin, Shahrin, Abdollah, Mohd Faizal, Suryana, Nanna, Suhendra, Adang

    Published 2022
    “…An application used to be mounted on mobile gadget to gather facts and processed them to get dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…In order to improve the detection rate of malicious application on the Android platform, a novel knowledge-based database discovery model that improves apriori association rule mining of a priori algorithm with Particle Swarm Optimization (PSO) is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Intuitive content management system via manipulation and duplication with if-else rules classification by Chan, Chung Hoong

    Published 2018
    “…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Integrated examination and analysis model for improving mobile cloud forensic investigation by Alnajjar, Ibrahim Ali Mohammad

    Published 2022
    “…Advanced forensic techniques become inevitable to investigate the malicious activities in Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific evidential artifact from the Mobile Cloud Computing (MCC) environment under forensically sound conditions. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Application of a New Efficient Normal Parameter Reduction Algorithm of Soft Sets in Online Shopping by Ma, Xiuqin, Hongwu, Qin

    Published 2014
    “…A new efficient normal parameter reduction algorithm of soft set in decision making was proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A new fair marker algorithm for DiffServ networks by Elshaikh, M.A., Mohamed, Othman, Subramaniam, Shamala, Md. Desa, Jalil

    Published 2008
    “…Internet Engineering Task Force (IETF) has proposed many new technologies to cover the new real time applications which have become very important in today's Internet demands. …”
    Get full text
    Get full text
    Article
  18. 18

    Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks by Biju, Issac

    Published 2008
    “…Our contribution to mobility management is to propose a mobility prediction algorithm using location tracking and data mining, to propose a delay management approach that cuts down major delays, and to propose a two stage resource reservation scheme. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A new algorithm for routing and scheduling in optical omega network by Al-Shabi, Mohammed Abdulhameed Ali, Othman, Mohamed

    Published 2008
    “…We propose a new algorithm called the ZeroY algorithm (ZeroY) to avoid crosstalk and route the traffic in an OM IN more efficiently. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…The LP’s application is need to be further computed with a technique and Simplex algorithm is the one that commonly used. …”
    Get full text
    Get full text
    Get full text
    Thesis