Search Results - (( web application bat algorithm ) OR ( _ application ((mobile algorithm) OR (mining algorithm)) ))
Search alternatives:
- mobile algorithm »
- mining algorithm »
- web application »
- application bat »
- bat algorithm »
-
1
Data mining in mobile ECG based biometric identification
Published 2014Get full text
Get full text
Get full text
Article -
2
-
3
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
4
-
5
-
6
A new mobile malware classification for SMS exploitation
Published 2024“…This research has developed a new mobile malware classification for Android smartphone using a covering algorithm. …”
Conference Paper -
7
Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia
Published 2022“…Data classification has become the region of interest in Data Mining research as it indicates the arising of technology's application that leads to increment data usage. …”
Get full text
Get full text
Get full text
Article -
8
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
9
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…Mobile data stream mining (MDSM) applications in MECC systems involve massive heterogeneity at application and platform levels. …”
Get full text
Get full text
Get full text
Thesis -
10
Design and evaluation on adaptive fuzzy speed control of mobile robot
Published 2011“…Both data acquisition and control algorithm are developed by using LabVIEW. A four-wheel mobile robot, PUTRABOT2, is used to conduct the experiments. …”
Get full text
Get full text
Thesis -
11
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…Advanced forensic techniques become inevitable to investigate the malicious activities in Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific evidential artifact from the Mobile Cloud Computing (MCC) environment under forensically sound conditions. …”
Get full text
Get full text
Thesis -
12
Intuitive content management system via manipulation and duplication with if-else rules classification
Published 2018“…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
Get full text
Get full text
Thesis -
13
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…A comprehensive experimental analysis was conducted to evaluate the efficiency and effectiveness of the proposed algorithms (ONF-TRS, CC-TRS). The results shows that the algorithm ONF-TRS has low computational cost and high compression rate as compared with the existing works. …”
Get full text
Get full text
Thesis -
14
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…Mobile devices are a gold mine of evidences for forensic investigators as they store valuable social networking data. …”
Get full text
Get full text
Get full text
Thesis -
15
MiMaLo: advanced normalization method for mobile malware detection
Published 2022“…This research used a malware behavior observe approach on device calls on mobile devices operating gadget kernel. An application used to be mounted on mobile gadget to gather facts and processed them to get dataset. …”
Get full text
Get full text
Get full text
Article -
16
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks
Published 2008“…Our contribution to mobility management is to propose a mobility prediction algorithm using location tracking and data mining, to propose a delay management approach that cuts down major delays, and to propose a two stage resource reservation scheme. …”
Get full text
Get full text
Get full text
Thesis -
18
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
19
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…Since rerunning mining algorithms from scratch is very costly and time-consuming, researchers have introduced interactive mining of frequent patterns. …”
Get full text
Get full text
Article -
20
Clustering algorithm for market-basket analysis : the underlying concept of data mining technology
Published 2003“…The author used a data mining software called PolyAnalyst 4.5 to perform analysis on the set of items that customers have bought in supermarket for market-basket application. …”
Get full text
Get full text
Thesis
