Search Results - (( vr application learning algorithm ) OR ( mobile applications mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…Mobile data stream mining (MDSM) applications in MECC systems involve massive heterogeneity at application and platform levels. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia by Misinem, ., Tri Basuki, Kurniawan, Mohd Zaki, Zakaria, Muhammad Aqil Azfar, Uzailee

    Published 2022
    “…Data classification has become the region of interest in Data Mining research as it indicates the arising of technology's application that leads to increment data usage. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Integrated examination and analysis model for improving mobile cloud forensic investigation by Alnajjar, Ibrahim Ali Mohammad

    Published 2022
    “…Advanced forensic techniques become inevitable to investigate the malicious activities in Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific evidential artifact from the Mobile Cloud Computing (MCC) environment under forensically sound conditions. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A dataset for emotion recognition using virtual reality and EEG (DER-VREEG): Emotional state classification using low-cost wearable VR-EEG headsets by Nazmi Sofian Suhaimi, James Mountstephens, Teo, Jason Tze Wi

    Published 2022
    “…Secondly, we use a low-cost wearable EEG headset that is both compact and small, and can be attached to the scalp without any hindrance, allowing freedom of movement for participants to view their surroundings inside the immersive VR stimulus. Finally, we evaluate the emotion recognition system by using popular machine learning algorithms and compare them for both intra-subject and inter-subject classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    MiMaLo: advanced normalization method for mobile malware detection by Sriyanto, Sahib @ Sahibuddin, Shahrin, Abdollah, Mohd Faizal, Suryana, Nanna, Suhendra, Adang

    Published 2022
    “…This research used a malware behavior observe approach on device calls on mobile devices operating gadget kernel. An application used to be mounted on mobile gadget to gather facts and processed them to get dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Eye fixation versus pupil diameter as eye- tracking features for virtual reality emotion classification by Lim Jia Zheng, James Mountstephens, Jason Teo

    Published 2022
    “…The usage of eye-tracking technology is becoming increasingly popular in machine learning applications, particularly in the area of affective computing and emotion recognition. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  13. 13

    Design and evaluation on adaptive fuzzy speed control of mobile robot by Abdollahi, Mohammadreza

    Published 2011
    “…Wheeled mobile robots are widely used in various fields such as agriculture, industry, land mining, military, space explorations, and other applications in which the environment is inaccessible or hazardous to human, such as in nuclear plants. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…Mobile devices are a gold mine of evidences for forensic investigators as they store valuable social networking data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
    thesis::doctoral thesis
  16. 16

    Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks by Biju, Issac

    Published 2008
    “…Our contribution to mobility management is to propose a mobility prediction algorithm using location tracking and data mining, to propose a delay management approach that cuts down major delays, and to propose a two stage resource reservation scheme. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Intuitive content management system via manipulation and duplication with if-else rules classification by Chan, Chung Hoong

    Published 2018
    “…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Robotics in Education by Norashikin, M. Thamrin, Addie, Irawan, Zurita, Zulkifli, Syed Abdul Mutalib, Al Junid, Megat Syahirul Amin, Megat Ali, Anwar P. P., Abdul Majeed

    Published 2026
    “…The AI section discusses machine learning, path-planning algorithms (e.g., A* search, SLAM), and classroom case studies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  20. 20

    An enhanced android botnet detection approach using feature refinement by Anwar, Shahid

    Published 2019
    “…These features are able to disclose the sensitive information stored on the Android mobile devices. The botware applications used in this study containing 3535 samples were obtained from the Contagio and Drebin datasets, as well as the benign applications containing 3500 samples. …”
    Get full text
    Get full text
    Thesis