Search Results - (( mobile application usage algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- application usage »
- java application »
- mining algorithm »
- usage algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Context Aware Handover Algorithms For Mobile Positioning Systems
Published 2014“…Battery usage of the proposed solution is less than one third of the battery usage of two other applications. …”
Get full text
Get full text
Get full text
Article -
8
Embedded parallel distributed artificial intelligent processors for adaptive beam forming in WCDMA system
Published 2023“…Adaptive antenna has dynamic beam to cater for users' needs and provides better capacity for mobile communication but requires more intelligent and advance beam forming algorithm such as genetic algorithm. …”
Conference paper -
9
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
Get full text
Get full text
Final Year Project -
10
-
11
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023Conference paper -
12
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
13
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
14
Novel scheduling algorithm for optimizing real-time multimedia performance in Long-Term Evolution Advanced
Published 2017“…Real-time multimedia applications are becoming increasingly popular among mobile cellular users. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
16
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
17
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…Offering mobile services to nomadic users involved the limited display and networking capacity of the mobile devices. …”
Get full text
Get full text
Thesis -
18
Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia
Published 2022“…Data classification has become the region of interest in Data Mining research as it indicates the arising of technology's application that leads to increment data usage. In this research, collection data and experiments are conducted, and results are shown. …”
Get full text
Get full text
Get full text
Article -
19
RSA algorithm performance in short messaging system exchange environment
Published 2011“…Short Message Service (SMS) is a widely service for brief communication.With the rise of mobile usage it has become a popular tool for transmitting sensitive information. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A new mobile malware classification for call log exploitation
Published 2024journal::journal article
