Search Results - (( web application a algorithm ) OR ( mobile applications mining algorithm ))*

Refine Results
  1. 1
  2. 2

    Intuitive content management system via manipulation and duplication with if-else rules classification by Chan, Chung Hoong

    Published 2018
    “…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…Mobile data stream mining (MDSM) applications in MECC systems involve massive heterogeneity at application and platform levels. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia by Misinem, ., Tri Basuki, Kurniawan, Mohd Zaki, Zakaria, Muhammad Aqil Azfar, Uzailee

    Published 2022
    “…Data classification has become the region of interest in Data Mining research as it indicates the arising of technology's application that leads to increment data usage. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Integrated examination and analysis model for improving mobile cloud forensic investigation by Alnajjar, Ibrahim Ali Mohammad

    Published 2022
    “…Advanced forensic techniques become inevitable to investigate the malicious activities in Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific evidential artifact from the Mobile Cloud Computing (MCC) environment under forensically sound conditions. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…It is a windows application mixed with web connection protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A new algorithm to measure relevance among Web pages by Sadi, M.S., Rahman, M.M. Hafizur, Horiguchi, Susumu

    Published 2006
    “…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    MiMaLo: advanced normalization method for mobile malware detection by Sriyanto, Sahib @ Sahibuddin, Shahrin, Abdollah, Mohd Faizal, Suryana, Nanna, Suhendra, Adang

    Published 2022
    “…This research used a malware behavior observe approach on device calls on mobile devices operating gadget kernel. An application used to be mounted on mobile gadget to gather facts and processed them to get dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Design and evaluation on adaptive fuzzy speed control of mobile robot by Abdollahi, Mohammadreza

    Published 2011
    “…Wheeled mobile robots are widely used in various fields such as agriculture, industry, land mining, military, space explorations, and other applications in which the environment is inaccessible or hazardous to human, such as in nuclear plants. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan by Wan Chik, Wan Adnan

    Published 2006
    “…The Web Application System program is designed for the client to configure a system (e.g calculates a load flow). …”
    Get full text
    Get full text
    Thesis
  15. 15

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…In order to tackle above problem, a modified algorithm for Web page recommendation is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Furthermore, the web application could save the users’ past work, so that they may resume their work at a later time without skipping a beat.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18
  19. 19

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…Mobile devices are a gold mine of evidences for forensic investigators as they store valuable social networking data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
    thesis::doctoral thesis