Search Results - (( mobile applications mining algorithm ) OR ( its application server algorithm ))*
Search alternatives:
- mobile applications »
- applications mining »
- application server »
- mining algorithm »
- server algorithm »
- its application »
-
1
-
2
Data mining in mobile ECG based biometric identification
Published 2014Get full text
Get full text
Get full text
Article -
3
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
4
-
5
-
6
-
7
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…Mobile data stream mining (MDSM) applications in MECC systems involve massive heterogeneity at application and platform levels. …”
Get full text
Get full text
Get full text
Thesis -
8
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia
Published 2022“…Data classification has become the region of interest in Data Mining research as it indicates the arising of technology's application that leads to increment data usage. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…This technique also introduces a multi thread based persistence layer, which supports early binding and parallel connection to the servers. All the replication servers established its connection through interfaces. …”
Get full text
Get full text
Thesis -
14
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…Advanced forensic techniques become inevitable to investigate the malicious activities in Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific evidential artifact from the Mobile Cloud Computing (MCC) environment under forensically sound conditions. …”
Get full text
Get full text
Thesis -
15
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Presently, many researches have been made on remote monitoring and its techniques. The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
16
MiMaLo: advanced normalization method for mobile malware detection
Published 2022“…This research used a malware behavior observe approach on device calls on mobile devices operating gadget kernel. An application used to be mounted on mobile gadget to gather facts and processed them to get dataset. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Design and evaluation on adaptive fuzzy speed control of mobile robot
Published 2011“…Wheeled mobile robots are widely used in various fields such as agriculture, industry, land mining, military, space explorations, and other applications in which the environment is inaccessible or hazardous to human, such as in nuclear plants. …”
Get full text
Get full text
Thesis -
19
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems
Published 2015“…These cloud servers treat robots as any other client computer offering them platform, infrastructure, process or algorithm as a service. …”
Get full text
Get full text
Article
