Search Results - (( _ application mining algorithm ) OR ( mobile applications a algorithm ))*
Search alternatives:
- mobile applications »
- application mining »
- mining algorithm »
- applications a »
- a algorithm »
-
1
Data mining in mobile ECG based biometric identification
Published 2014Get full text
Get full text
Get full text
Article -
2
-
3
-
4
-
5
A new mobile malware classification for SMS exploitation
Published 2024“…This research has developed a new mobile malware classification for Android smartphone using a covering algorithm. …”
Conference Paper -
6
Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia
Published 2022“…A service offered by a bank or other financial institution that enables its users to execute financial transactions remotely using a mobile device, such as a smartphone or tablet, is known as mobile banking. …”
Get full text
Get full text
Get full text
Article -
7
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…For future work, the prototype can be further enhanced as one of the mobile application. Moreover, this study can be further applied for a larger size of message context (instead of SMS that is limited to 160 characters) and also tested in other languages.…”
thesis::doctoral thesis -
8
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…Mobile data stream mining (MDSM) applications in MECC systems involve massive heterogeneity at application and platform levels. …”
Get full text
Get full text
Get full text
Thesis -
9
Design and evaluation on adaptive fuzzy speed control of mobile robot
Published 2011“…Both data acquisition and control algorithm are developed by using LabVIEW. A four-wheel mobile robot, PUTRABOT2, is used to conduct the experiments. …”
Get full text
Get full text
Thesis -
10
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…Mobile devices are a gold mine of evidences for forensic investigators as they store valuable social networking data. …”
Get full text
Get full text
Get full text
Thesis -
11
MiMaLo: advanced normalization method for mobile malware detection
Published 2022“…An application used to be mounted on mobile gadget to gather facts and processed them to get dataset. …”
Get full text
Get full text
Get full text
Article -
12
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…In order to improve the detection rate of malicious application on the Android platform, a novel knowledge-based database discovery model that improves apriori association rule mining of a priori algorithm with Particle Swarm Optimization (PSO) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Intuitive content management system via manipulation and duplication with if-else rules classification
Published 2018“…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
Get full text
Get full text
Thesis -
14
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…Advanced forensic techniques become inevitable to investigate the malicious activities in Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific evidential artifact from the Mobile Cloud Computing (MCC) environment under forensically sound conditions. …”
Get full text
Get full text
Thesis -
15
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…However, it is a vital process for many applications such as traffic management, studying of animal behavior, and weather forecasting. …”
Get full text
Get full text
Thesis -
16
Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks
Published 2008“…Our contribution to mobility management is to propose a mobility prediction algorithm using location tracking and data mining, to propose a delay management approach that cuts down major delays, and to propose a two stage resource reservation scheme. …”
Get full text
Get full text
Get full text
Thesis -
17
An enhanced android botnet detection approach using feature refinement
Published 2019“…A botnet is a network of infected mobile devices such as smartphones, smart watches, notepads, which are remotely controlled by the bot-herder (botmaster). …”
Get full text
Get full text
Thesis -
18
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
19
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…Since rerunning mining algorithms from scratch is very costly and time-consuming, researchers have introduced interactive mining of frequent patterns. …”
Get full text
Get full text
Article -
20
Clustering algorithm for market-basket analysis : the underlying concept of data mining technology
Published 2003“…The author used a data mining software called PolyAnalyst 4.5 to perform analysis on the set of items that customers have bought in supermarket for market-basket application. …”
Get full text
Get full text
Thesis
