Search Results - (( mobile applications among algorithm ) OR ( its application stemming algorithm ))*

Refine Results
  1. 1

    Pashto language stemming algorithm by Aslamzai, Sebghatullah, Saidah Saad

    Published 2015
    “…Therefore, the objective of the current thesis is to develop a rule-based stemming algorithm for the Pashto language. The Pashto corpus is directly used as the input and the stemming algorithm uses both inflectional and derivational morphemes. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Stemming Hausa text: using affix-stripping rules and reference look-up by Andrew Bimba, Norisma Idris, Norazlina Khamis, Nurul Fazmidar Mohd Noor

    Published 2016
    “…Stemming is a process of reducing a derivational or inflectional word to its root or stem by stripping all its affixes. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Stemming Hausa text: using affix-stripping rules and reference look-up by Bimba, A.T., Idris, N., Khamis, N., Mohd Noor, N.F.

    Published 2016
    “…Stemming is a process of reducing a derivational or inflectional word to its root or stem by stripping all its affixes. …”
    Get full text
    Get full text
    Article
  4. 4

    Mobile game application development using evolutionary algorithms by Ong, Jia Hui

    Published 2014
    “…Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…On the second level, TOPSIS algorithm allocates resources among an application’s user based on their criteria and the application’s preferences. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Context Aware Handover Algorithms For Mobile Positioning Systems by Zaman Khan, Sazid, Thilek, Silvadorai, Tan, Chen Wei, Ramadass, Sureswaran, Anwar, Toni

    Published 2014
    “…This work proposes context aware handover algorithms for mobile positioning systems. The algorithms perform handover among positioning systems based on important contextual factors related to position determination with efficient use of battery. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A Mobile Application For Stock Price Prediction by Choy, Yi Tou

    Published 2021
    “…The results show ARIMA has the least error among all five prediction algorithms. Therefore, ARIMA is the best prediction model to implement in the mobile application for stock price prediction. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…Unfortunately, the abundance of mobile applications and lax management of some app stores has led to potential risks for mobile users, including privacy breaches and malicious deductions of fees, among other adverse consequences. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…The algorithm consideration is sine qua non in setting-up the whole network system allowing the mobile devices to move freely among sub-networks. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX. by Mohd Ali, Borhanuddin, Ismail, Alyani, Noordin, Nor Kamariah, Ben-Mubarak, Mohammed A., Ng , Ben Chee Kyun

    Published 2013
    “…Among the challenging issues in mobile WiMAX handover are unnecessary handover, handover failure and handover delay, which may affect real-time applications. …”
    Get full text
    Get full text
    Article
  12. 12

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
    Proceedings Paper
  13. 13
  14. 14
  15. 15

    Mobile data gathering algorithms for wireless sensor networks by Ghaleb, Mukhtar Mahmoud Yahya

    Published 2014
    “…This algorithm enables shortened tour length for the respective mobile element. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Malay-language stemmer by Sankupellay, Mangalam, Valliappan, Subbu

    Published 2006
    “…Stemming is the removal of affixes (prefixes and suffixes) in a word in order to generate its root word. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20