Search Results - (( java implication based algorithm ) OR ( features mobile learning algorithm ))

Refine Results
  1. 1
  2. 2

    Designing algorithm visualization on mobile platform: The proposed guidelines by Supli, Ahmad Affandi, Shiratuddin, Norshuhada

    Published 2017
    “…In fact, mobile learning has been proved to enhance engagement in learning circumstances, and thus effect student’s performance.In addition, the researchers highly recommend including UI design and Interactivity in designing effective AV system.However, the discussions of these two aspects in previous AV design guidelines are not comprehensive.The UI design in this paper describes the arrangement of AV features in mobile environment, whereas interactivity is about the active learning strategy features based on learning experiences (how to engage learners). …”
    Get full text
    Get full text
    Article
  3. 3

    Algorithm visualization design guidelines for mobile leaning by Supli, Ahmad Affandi, Shiratuddin, Norshuhada

    Published 2018
    “…The guidelines are useful for AV designers in constructing AV mobile learning.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Machine learning model for performance prediction in mobile network management / Muhammad Hazim Wahid by Wahid, Muhammad Hazim

    Published 2022
    “…This study aims to propose the best machine learning algorithm for predicting mobile network performance. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Android mobile malware detection model based on permission features using machine learning approach by Sharfah Ratibah, Tuan Mat

    Published 2022
    “…Chi-square and information gain algorithms were used for features selection. The aim is to learn the behaviour of permission features that react to the accuracy according to the number of features. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
    Proceedings Paper
  8. 8

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…Static analysis is where the static features are examined. Too many features used, features extraction time consuming and the reliability of accuracy result by various machine learning algorithm are the main issues spotted in static analysis approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Behavioural Feature Extraction For Context-Aware Traffic Classification Of Mobile Applications by Aun, Yichiet

    Published 2018
    “…This thesis identified domain-specific features that are effective for accurate, large-scale and scalable mobile applications classification using machine learning techniques. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Age And Gender Recognition Mobile App by Wee, Quo Lung

    Published 2023
    “…Therefore, this study aimed to develop age and gender recognition mobile application using deep learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11
  12. 12

    Bio-inspired for Features Optimization and Malware Detection by Mohd Faizal, Ab Razak, Nor Badrul, Anuar, Fazidah, Othman, Ahmad, Firdaus, Firdaus, Afifi, Rosli, Salleh

    Published 2018
    “…A static analysis technique with machine learning classifier is developed from the permission features noted in the Android mobile device for detecting the malware applications. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Bio-inspired for Features Optimization and Malware Detection by Razak, Mohd Faizal Ab, Anuar, Nor Badrul, Othman, Fazidah, Firdaus, Ahmad, Afifi, Firdaus, Salleh, Rosli

    Published 2018
    “…A static analysis technique with machine learning classifier is developed from the permission features noted in the Android mobile device for detecting the malware applications. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning by Chimeleze C., Jamil N., Ismail R., Lam K.-Y., Teh J.S., Samual J., Akachukwu Okeke C.

    Published 2023
    “…Android (operating system); Android malware; Classification (of information); Feature Selection; Learning systems; Mobile security; Android apps; Classification models; Feature weight; Features selection; Machine learning algorithms; Machine-learning; Malware detection; Malwares; Memory usage; Selection techniques; Learning algorithms…”
    Article
  16. 16
  17. 17
  18. 18
  19. 19

    Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad by Mehdi , Jahanirad

    Published 2016
    “…Both models optimize acoustic features for source mobile device identification based on near-silent segments. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Mobile Learning: An Application Prototype for AVL Tree Learning Object by Ibrahim, Mohammad Noor, Mahamad, Saipunidzam, Chua, Edrea Ning Wei

    Published 2010
    “…Our approach is to incorporate video clips in presenting the algorithm systematically. With this mobile learning application, student could learn at his or her own pace, anywhere anytime. …”
    Get full text
    Get full text
    Conference or Workshop Item