Search Results - (( mobile application mining algorithm ) OR ( _ applications using algorithms ))*
Search alternatives:
- application mining »
- applications using »
- mining algorithm »
- using algorithms »
- _ applications »
-
1
Data mining in mobile ECG based biometric identification
Published 2014Get full text
Get full text
Get full text
Article -
2
-
3
-
4
-
5
A new mobile malware classification for SMS exploitation
Published 2024“…The experiment was conducted using Drebin dataset which contains 5560 malware applications. …”
Conference Paper -
6
Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia
Published 2022“…Data classification has become the region of interest in Data Mining research as it indicates the arising of technology's application that leads to increment data usage. …”
Get full text
Get full text
Get full text
Article -
7
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…Mobile data stream mining (MDSM) applications in MECC systems involve massive heterogeneity at application and platform levels. …”
Get full text
Get full text
Get full text
Thesis -
8
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
9
Design and evaluation on adaptive fuzzy speed control of mobile robot
Published 2011“…Both data acquisition and control algorithm are developed by using LabVIEW. A four-wheel mobile robot, PUTRABOT2, is used to conduct the experiments. …”
Get full text
Get full text
Thesis -
10
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis -
11
MiMaLo: advanced normalization method for mobile malware detection
Published 2022“…An application used to be mounted on mobile gadget to gather facts and processed them to get dataset. …”
Get full text
Get full text
Get full text
Article -
12
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…In this method, the candidate detectors generated by particle swarm optimization form rules using apriori association rule. These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…In this context, proposing Forensic Examination and Analysis Methodology using Data mining (FED) and Forensic Examination and analysis methodology using Data mining and Optimization (FEDO) models address these issues. …”
Get full text
Get full text
Thesis -
14
Intuitive content management system via manipulation and duplication with if-else rules classification
Published 2018“…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
Get full text
Get full text
Thesis -
15
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…On the other hand, the offline phase is evoked when the user requests to view the overall clustering results. The DBSCAN algorithm is used to perform the macro clustering task by replacing the distance between trajectories segments with the distance between the temporal micro-clusters. …”
Get full text
Get full text
Thesis -
16
Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks
Published 2008“…Our contribution to mobility management is to propose a mobility prediction algorithm using location tracking and data mining, to propose a delay management approach that cuts down major delays, and to propose a two stage resource reservation scheme. …”
Get full text
Get full text
Get full text
Thesis -
17
An enhanced android botnet detection approach using feature refinement
Published 2019“…These features are able to disclose the sensitive information stored on the Android mobile devices. The botware applications used in this study containing 3535 samples were obtained from the Contagio and Drebin datasets, as well as the benign applications containing 3500 samples. …”
Get full text
Get full text
Thesis -
18
Simultaneous measurement of multiple soil properties through proximal sensor data fusion: a case study
Published 2019“…Predictions of pH and LBC were only feasible using MARS and PLSR, respectively. In this field, it was not possible to predict extractable P and K using all tested sensor combinations or algorithms. …”
Get full text
Get full text
Article -
19
Schelkunoff array synthesis methods using adaptive-iterative algorithm
Published 2003“…By the co-emergence of these algorithms, a better performance and wider application are hoped to be achieved since each of these algorithms has its own advantages respectively. …”
Get full text
Get full text
Get full text
Thesis -
20
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Application of genetic algorithm method to optimize flow shop sequencing problem as the title of this project is the study about the method used in order to optimize flow shop sequencing problem. …”
Get full text
Get full text
Undergraduates Project Papers
