Search Results - (( wave application testing algorithm ) OR ( mobile applications mining algorithm ))
Search alternatives:
- application testing »
- mobile applications »
- applications mining »
- testing algorithm »
- wave application »
- mining algorithm »
-
1
Data mining in mobile ECG based biometric identification
Published 2014Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…Mobile data stream mining (MDSM) applications in MECC systems involve massive heterogeneity at application and platform levels. …”
Get full text
Get full text
Get full text
Thesis -
5
An algorithm for Elliott Waves pattern detection
Published 2018“…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
Get full text
Get full text
Article -
6
An algorithm for Elliott Waves pattern detection
Published 2018“…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
Get full text
Get full text
Article -
7
-
8
Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia
Published 2022“…Data classification has become the region of interest in Data Mining research as it indicates the arising of technology's application that leads to increment data usage. …”
Get full text
Get full text
Get full text
Article -
9
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…Usually, one sinusoidal wave is used for one inverter. In this design, SPWM is used for multilevel inverter application in photovoltaic (PV) system. …”
Get full text
Get full text
Student Project -
10
-
11
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…Advanced forensic techniques become inevitable to investigate the malicious activities in Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific evidential artifact from the Mobile Cloud Computing (MCC) environment under forensically sound conditions. …”
Get full text
Get full text
Thesis -
12
Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection
Published 2015“…The signals were then clustered using the feature extraction algorithms. This paper tested two feature extraction algorithms namely Principal Component Analysis (PCA) and Auto-Regressive (AR). …”
Get full text
Get full text
Get full text
Article -
13
Improvement of Auditory Brainstem Response (ABR) wave V amplitude using novel MLS nonlinear algorithm
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
14
-
15
MiMaLo: advanced normalization method for mobile malware detection
Published 2022“…This research used a malware behavior observe approach on device calls on mobile devices operating gadget kernel. An application used to be mounted on mobile gadget to gather facts and processed them to get dataset. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Design and evaluation on adaptive fuzzy speed control of mobile robot
Published 2011“…Wheeled mobile robots are widely used in various fields such as agriculture, industry, land mining, military, space explorations, and other applications in which the environment is inaccessible or hazardous to human, such as in nuclear plants. …”
Get full text
Get full text
Thesis -
18
Use of a non-linear algorithm to improve the maximum length sequence auditory brainstem response
Published 2012Get full text
Get full text
Proceeding Paper -
19
Use of a non-linear algorithm to improve the maximum length sequence auditory brainstem response
Published 2012Get full text
Get full text
Proceeding Paper -
20
Iterative And Single-Step Solutions Of Two Dimensional Time-Domain Inverse Scattering Problem Featuring Ultra Wide Band Sensors
Published 2010“…First, the algorithms‘ performances were evaluated using numerical simulation employing two different scanning geometries: limited and full view scanning geometries, where the applicability of these algorithms was accessed by comparing the reconstructed images with actual model. …”
Get full text
Get full text
Thesis
