Search Results - (( mobile applications out algorithm ) OR ( some application mining algorithm ))*
Search alternatives:
- mobile applications »
- application mining »
- applications out »
- some application »
- mining algorithm »
- out algorithm »
-
1
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
Get full text
Get full text
Article -
2
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
-
5
-
6
Graphical user authentication algorithm for mobile banking user
Published 2018Get full text
Get full text
Get full text
Article -
7
An association rule mining approach in predicting flood areas
Published 2017“…This study focuses on the application of Association rules mining for the flood data in Terengganu. …”
Get full text
Get full text
Conference or Workshop Item -
8
Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System
Published 2017“…Further research can provide newer algorithm to handle cold start problem and sparse data from both text mining and mining computation perspectives.…”
Get full text
Get full text
Get full text
Article -
9
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…The objective of this study is to propose a prediction model based on bio-inspired algorithm for talent knowledge discovery through some experiments. …”
Get full text
Get full text
Research Reports -
10
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Outlier detection as a branch of data mining has many important applications, and deserves more attention from data mining community. …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
An Association Rule Mining Approach in Predicting Flood Areas
Published 2016“…This study focuses on the application of Association rules mining for the flood data in Terengganu. …”
Get full text
Get full text
Get full text
Book Section -
13
Optimization of mobile robot path planning in semi-dynamic environment using genetic algorithm
Published 2023“…In an Industry 4.0 framework, mobile robots are designed to perform tasks autonomously, allowing manufacturers to transform their operations which can be carried out through various integrated applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Improved autonomous charging of mobile multi-robots using honeybee-inspired algorithm
Published 2016“…It is also known as application that applies large number of mobile robot. …”
Get full text
Get full text
Thesis -
15
DESIGN AND IMPROVEMENT OF ALGORITHMS FOR AUTONOMOUS MOBILE ROBOT
Published 2013Get full text
Get full text
Final Year Project -
16
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
Published 2011“…There has been a rapid growth in using Artificial Immune Systems for applications in data mining and computational intelligence recently. …”
Get full text
Get full text
Thesis -
17
-
18
Mobile game application development using evolutionary algorithms
Published 2014“…Hence it has opened up a whole new market with its mass among users and attracted a large number of smartphone application developers. Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
Get full text
Get full text
Get full text
Thesis -
19
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…However, the increased security breaches of recent mental health applications that leaked the patient's profile. This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
Get full text
Get full text
Get full text
Academic Exercise -
20
