Search Results - (( mobile validation study algorithm ) OR ( user identification clustering algorithm ))

Refine Results
  1. 1

    An efficient fuzzy clustering algorithm for mining user session clusters on web log data by Mallik, M. A., Zulkurnain, Nurul Fariza

    Published 2021
    “…This paper proposes an efficient Fuzzy Clustering algorithm for mining client session clusters from web access log information to find the groups of client profiles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Big Data Mining Using K-Means and DBSCAN Clustering Techniques by Fawzia Omer, A., Mohammed, H.A., Awadallah, M.A., Khan, Z., Abrar, S.U., Shah, M.D.

    Published 2022
    “…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
    Get full text
    Get full text
    Article
  3. 3

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…Hence, this study carried out several objectives to augment the support of modified clustering algorithm. Firstly, an extended K-Means clustering algorithm (called X-Means algorithm) is proposed to filter/remove the noise from user session data to eliminate outliers or irrelevant pages. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Dynamic path planning algorithm in mobile robot navigation by Yun, S.C., Parasuraman, S., Ganapathy, V.

    Published 2011
    “…This study is focused on exploring the algorithm that avoids acute obstacles in the environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    User interface and interactivity design guidelines of algorithm visualization on mobile platform by Supli, Ahmad Affandi

    Published 2019
    “…Students can watch and observe through the elaboration of dynamic animation. Previous studies show that AV mobile study is still limited. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Modelling of Crowd Evacuation with Communication Strategy Using Social Force Model by Norhaida, Hussain, Wai Shiang, Cheah

    Published 2022
    “…As reported in many studies, real drill experiments have been conducted to validate the mobile crowd steering application. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…The validation results show that Random Forest with 10-folds cross validation spitting dataset achieved 8 highest performance compared to benchmark study and two other classifiers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Q-learning based vertical handover decision algorithm in LTE-A two-tier macrocell-femtocell systems / Ammar Bathich by Bathich, Ammar

    Published 2019
    “…The proposed handover algorithms are validated using the LTE-Sim simulator under an urban environment. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Android mobile malware detection model based on permission features using machine learning approach by Sharfah Ratibah, Tuan Mat

    Published 2022
    “…This study focused on the permission feature of Android mobile devices. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…First, this research analyses the existing mobile underwater node deployment algorithms to identify the significant problems in existing solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks by Salmah Fattah

    Published 2022
    “…First, this research analyses the existing mobile underwater node deployment algorithms to identify the significant problems in existing solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20