Search Results - (( its application based algorithm ) OR ( phone application among algorithm ))*
Search alternatives:
- application based »
- phone application »
- application among »
- its application »
- among algorithm »
-
1
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
2
-
3
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…As many human currently depend on technologies to assist with daily tasks, there are more and more applications which have been developed to be fit in one small gadget such as smart phone and tablet. …”
Get full text
Get full text
Thesis -
4
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…Unfortunately, the abundance of mobile applications and lax management of some app stores has led to potential risks for mobile users, including privacy breaches and malicious deductions of fees, among other adverse consequences. …”
Get full text
Get full text
Thesis -
5
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…Cross-site scripting vulnerabilities are among the top ten security vulnerabilities affecting web applications for the past decade and mobile version web applications more recently. …”
Get full text
Get full text
Get full text
Article -
6
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
Get full text
Get full text
Final Year Project -
7
Comprehensive review of the development of the harmony search algorithm and its applications
Published 2019“…This paper presents a comprehensive overview of the development of the harmony search (HS) algorithm and its applications. HS is a well-known human-based meta-heuristic algorithm that mimics the process of creating a new harmony in music. …”
Get full text
Get full text
Get full text
Article -
8
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
9
-
10
Fast decryption method for a Rabin primitive-based cryptosystem
Published 2014“…It seems that its current decryption algorithm is significantly slower than its encryption process. …”
Get full text
Get full text
Get full text
Article -
11
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
12
Recent Advances and Applications of Spiral Dynamics Optimization Algorithm: A Review
Published 2022“…The growth of the SDO algorithm and its application in various areas, theoretical analysis, and comparison with its preceding and other algorithms are also described in detail. …”
Get full text
Get full text
Article -
13
Recent Advances and Applications of Spiral Dynamics Optimization Algorithm: A Review
Published 2022“…The growth of the SDO algorithm and its application in various areas, theoretical analysis, and comparison with its preceding and other algorithms are also described in detail. …”
Get full text
Get full text
Article -
14
-
15
-
16
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article -
17
-
18
A modified generalized RBF model with EM-based learning algorithm for medical applications
Published 2006“…Moreover, GRBF trained by the new algorithm has an apparent statistical meaning. Experimental results show potentials for real-life applications.…”
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…However, the HKA algorithm has its own flaws. Although it was introduced as a population-based stochastic optimization algorithm, HKA is not exactly a population-based algorithm because it initializes and updates only a single solution. …”
Get full text
Get full text
Thesis
