Search Results - (( web application mining algorithm ) OR ( mobile application ((new algorithm) OR (_ algorithm)) ))
Search alternatives:
- application mining »
- mining algorithm »
- web application »
- new algorithm »
-
1
-
2
A new efficient checkpointing algorithm for distributed mobile computing
Published 2015“…In fact, it is necessary now to think about other techniques or at least adapt those to devise effective and well suited techniques for the mobile environment. Considering this issue, the contribution in this paper is a proposal of a new checkpointing algorithm suitable for mobile computing systems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
-
4
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…Application of data mining techniques to the World Wide Web referred as Web mining where this term has been used in three distint ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
5
Web usage mining for UUM learning care using association rules
Published 2004“…Application of data milling techniques to the World Wide Web referred as Web mining where this term has been used in three distinct ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Thesis -
6
Graphical user authentication algorithm for mobile banking user
Published 2018Get full text
Get full text
Get full text
Article -
7
-
8
A new Doppler Spread Estimation Algorithm Based on Zero Crossings of The Auto-correlation
Published 2010“…A precise estimation of the mobile speed and/or velocity is of great significance in wireless mobile applications which needs the acquaintance of the rate of the channel variations. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
10
Dynamic path planning algorithm in mobile robot navigation
Published 2011“…In this research, Genetic Algorithm (GA) is used to assist mobile robot to move, identify the obstacles in the environment, learn the environment and reach the desired goal in an unknown and unrecognized environment. …”
Get full text
Get full text
Conference or Workshop Item -
11
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…This thesis proposes a Case-Based Reasoning model for medical diagnosis,particularly for Thalassaemia diagnosis. CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
Get full text
Get full text
Undergraduates Project Papers -
12
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Online prediction is one Web Usage Mining application. However, the accuracy of the prediction and classification in the current architecture of predicting users' future requests systems can not still satisfy users especially in huge Web sites. …”
Get full text
Get full text
Article -
13
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…Three different optimization algorithms which are Bat Algorithm (BA), Bat Algorithm with Mutation (BAM) and Extended Bat Algorithm (EBA) are implemented to optimize the value of PID controller gain for wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
14
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
15
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
16
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Application of a New Efficient Normal Parameter Reduction Algorithm of Soft Sets in Online Shopping
Published 2014“…However, up to the present, few documents have focused on real-life applications of this algorithm. Accordingly, we apply a New Efficient Normal Parameter Reduction algorithm into real-life datasets of online shopping, such as Blackberry Mobile Phone Dataset. …”
Get full text
Get full text
Get full text
Article -
18
Intuitive content management system via manipulation and duplication with if-else rules classification
Published 2018“…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
Get full text
Get full text
Thesis -
19
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
20
