Search Results - pervasive ((computing techniques) OR (mining techniques))
Search alternatives:
- mining techniques »
-
1
A user profile for information filtering using RFID-SIM card in pervasive network
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
2
A conceptual framework for measuring the acceptance of pervasive learning
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
3
HMM as an inference technique for context awareness
Published 2015Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
GOPE: A MVC driven mobile framework using HTML5 for pervasive device container
Published 2013Get full text
Get full text
Conference or Workshop Item -
5
A conceptual framework for measuring the acceptance of pervasive learning
Published 2015Get full text
Get full text
Get full text
Proceeding Paper -
6
The trend of mobile malwares and effective detection techniques
Published 2015Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
7
Detection and avoidance technique of anomalous congestion at the network gateways
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Mobile user location prediction enabled services in ubiquitous computing: determination user location using MFN algorithm
Published 2009“…The past decade has seen a rapid development of many applications in the field of pervasive or ubiquitous computing. This is made possible by rapid development in mobile and handheld devices. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
iMSL: Malay sign language for the deaf and hearing-impaired
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Mobile cloud computing & mobile's battery efficiency approaches: A review
Published 2015“…This paper provide an overview of the software side by summarizing the background, techniques of battery augmentation, and on-going research on computational offloading to remote servers (Cloud); sending heavy computation to remote servers and receiving the result back on mobile screen. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Design and development of intelligent and easy home/office system
Published 2006“…An Intelligent Home (I-Home) System is envisioned as the by-product of pervasive computing and the availability of smart computer technology which making human interaction with the system a better home life experience. …”
Get full text
Get full text
Monograph -
13
-
14
-
15
Accelerating graph algorithms with priority queue processor
Published 2006“…Graphs are a pervasive data structure in computer science, and algorithms working with them are fundamental to the field. …”
Get full text
Get full text
Article -
16
Potential antigen in combating the pervasive threat of the Malaysian foot and mouth disease virus (FMDV) in ruminant
Published 2024Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
MLMO-HSM: Multi-label Multi-output Hybrid Sequential Model for multi-resident smart home activity recognition
Published 2022“…Smart home automation is protective and preventive measures that are taken to monitor elderly people in a non-intrusive manner using simple and pervasive sensors termed Ambient Assistive Living. …”
Get full text
Get full text
Article -
19
Crime Map Book
Published 2024“…Crime is a pervasive social phenomenon that profoundly impacts the well-being and security of communities. …”
Get full text
Get full text
Get full text
Book -
20
