Search Results - (( web application path algorithm ) OR ( mobile application mining algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software by Nik Yusoff, Nik Mohd Ramli

    Published 2014
    “…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman by Muhammad Habib , Ur Rehman

    Published 2016
    “…Mobile data stream mining (MDSM) applications in MECC systems involve massive heterogeneity at application and platform levels. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia by Misinem, ., Tri Basuki, Kurniawan, Mohd Zaki, Zakaria, Muhammad Aqil Azfar, Uzailee

    Published 2022
    “…Data classification has become the region of interest in Data Mining research as it indicates the arising of technology's application that leads to increment data usage. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Integrated examination and analysis model for improving mobile cloud forensic investigation by Alnajjar, Ibrahim Ali Mohammad

    Published 2022
    “…Advanced forensic techniques become inevitable to investigate the malicious activities in Cloud-based Mobile Applications (CMA). It is challenging to analyse the casespecific evidential artifact from the Mobile Cloud Computing (MCC) environment under forensically sound conditions. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Dijkstra’s Mobile Web Application Engine for Generating Integrated Light Rail Transit Route by Haziq Lim, AM, Wan Sazli, NS, Hussin, B., Azlianor, A. A., Suhaizan, SM, Massila, K

    Published 2010
    “…In previous research we are implemented the mobile web application using rules based algorithm where the destination-oriented routes need to be dynamically generated by determining the nearest station according to the specific places. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Optimization of LRT Route for Mobile Web Application Engine by Lim, A. M. H., Sazli, N. S. W., Hussin, B., Azlianor, A. A., Suhaizan, S. M., Massila, K.

    Published 2009
    “…In this paper, we proposed the used of Dijkstra’s Algorithms to provide more effective and intelligent shortest path system to provide the solution for traveler to reach the desired destination. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    MiMaLo: advanced normalization method for mobile malware detection by Sriyanto, Sahib @ Sahibuddin, Shahrin, Abdollah, Mohd Faizal, Suryana, Nanna, Suhendra, Adang

    Published 2022
    “…This research used a malware behavior observe approach on device calls on mobile devices operating gadget kernel. An application used to be mounted on mobile gadget to gather facts and processed them to get dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Design and evaluation on adaptive fuzzy speed control of mobile robot by Abdollahi, Mohammadreza

    Published 2011
    “…Wheeled mobile robots are widely used in various fields such as agriculture, industry, land mining, military, space explorations, and other applications in which the environment is inaccessible or hazardous to human, such as in nuclear plants. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A Mobile Web Application Engine for Generating Destination-oriented LRT Route by Abdullah, Muhammad Haziq Lim, Saifudin, Wan Sazli Nasaruddin, Hussin, Burairah, Abdul-Aziz, Azlianor, Sulong, Muhammad Suhaizan, Kamalrudin, Massila

    Published 2009
    “…In this paper, we proposed the used of Dijkstra’s Algorithms to provide more effective and intelligent shortest path system to provide the solution for traveler to reach the desired destination.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…Mobile devices are a gold mine of evidences for forensic investigators as they store valuable social networking data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
    thesis::doctoral thesis