Search Results - (( java application mining algorithm ) OR ( pattern mobile learning algorithm ))*
Search alternatives:
- application mining »
- learning algorithm »
- java application »
- mining algorithm »
- mobile learning »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
The Potential of a Classification-based Algorithm to Calculate Calories in Real-Time Via Pattern Recognition
Published 2016“…The ELM algorithm will be applied to an ultra-mobile Near Infrared (NIR) spectrometer. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mobile app of mood prediction based on menstrual cycle using machine learning algorithm / Nur Hazirah Amir
Published 2019“…With this project creates a mobile app that analyse the mood pattern which also correspond with menstrual cycle to be able to predict mood. …”
Get full text
Get full text
Thesis -
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
A framework of modified adaptive neuro-fuzzy inference engine
Published 2012“…The performance of MANFIE was compared with existing methods in a diversity of practical benchmark applications such as pattern classifications, time series predictions, modeling with inverse learning control and mobile robot navigation. …”
Get full text
Get full text
Thesis -
10
The development and implementation of web content adaptation and negotiation based on user, device and network profiles / Harizah Sazali
Published 2006“…Based on the experiment results, it is proved that content adaptation under e-learning environment can be achieved by the algorithms effectively.…”
Get full text
Get full text
Student Project -
11
Predicting energy consumption pattern based on top trending videos YouTube 2021 using machine learning techniques
Published 2022“…This project is about predicting energy consumption patterns based on trending videos on YouTube 2021 by using machine learning techniques. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
Published 2012“…A lightweight, low-computation, distributed intrusion detection scheme termed the distributed hierarchical graph neuron (DHGN) was proposed to be incorporated into a cooperative intrusion detection system (IDS) in mobile ad hoc networks (MANETs). Its one-cycle learning and divide and distribute recognition task approach allows DHGN to detect similar patterns in short of time. …”
Get full text
Book Section -
13
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
14
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…In recent studies, we seen developers and researchers proposing solutions on deep learning algorithms like YOLO, EfficientNet, CNN, MobileNet etc. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
18
An integrated priority-based cell attenuation model for dynamic cell sizing
Published 2012“…Real-time predicted mobile traffic from the EFuNN structure was used to control the size of all the cells.Results obtained demonstrate the robustness of the integrated module in recognizing the temporal pattern of the mobile traffic and dynamically controlling the cell size in order to reduce the number of calls dropped.…”
Get full text
Get full text
Get full text
Article -
19
Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar
Published 2016“…Hagras et al. formulated Fuzzy-Genetic technique to adapt the learning behaviour of an autonomous mobile robot in unstructured and changing environments.…”
Get full text
Get full text
Thesis -
20
An enhanced android botnet detection approach using feature refinement
Published 2019“…That adopts machine learning techniques to classify botware and benign applications. …”
Get full text
Get full text
Thesis
