Search Results - (( process using mobile algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The optimization on ANPR was performed on the pre-processing step using our own Java code as currently there is no image processing library available on the standard Android mobile phone. …”
    Get full text
    Get full text
    Get full text
    Book
  8. 8
  9. 9
  10. 10

    Improving the security of mobile IPV6 signalling using KECCAK / SHA-3 by Supriyanto Praptodiyono, Teguh Firmansyah, Raja Kumar Murugesan, Mudrik Alaydrus, Randy Aprilia, Leau, Yu-Beng

    Published 2021
    “…Hence, the signalling process on the Mobile IPv6 is vulnerable. The aim of this paper is to find a hash algorithm that is resistant to both attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Non-probabilistic approach to cooperative position tracking in large swarm of simple mobile robots using triangular cross-observation by Din, Abdul Sattar

    Published 2013
    “…The update process is done using a fixed update gain calculated that will give the best performance for the proposed algorithm, which keeps the complexity of the algorithm to a minimum of 0(1) as compared to 0(N²) of an extended Kalman filter (EKF). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management by Vivaldi, Indra, Habaebi, Mohamed Hadi, Mohd Ali, Borhanuddin, V., Prakash

    Published 2003
    “…Our design objective is to re-establish the communication traffic flow quickly and to minimize the service disruption delay that occnrs during handover process in a macro mobility environment. This handover algorithm is based on the modification of the HMIPv6 protocol using the multicast technique concept. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    AUTONOMOUS MOBILE ROBOT VISION BASED SYSTEM: HUMAN DETECTION BY COLOR by Mohd Shah, Hairol Nizam, Ab Rashid, Mohd Zamzuri, Mohd Sobran, Nur Maisarah

    Published 2013
    “…One of the unique advantages in this project, the detection of human by color only uses image processing that generated by the algorithms itself without additional sensor like sonar or IF sensor.…”
    Get full text
    Get full text
    Article
  15. 15

    Review on ubiquitous education system with multi-agent synchronization on mobile learning application environment by Mwinyi, Amir Kombo, Syed Mohamed, Syed Abdul Rahman Al Haddad, Abdullah, Rusli, Hashim, Shaiful Jahari

    Published 2012
    “…The sync agent (Multi-agent system) proposed algorithm is based on the use of mobile agents which runs from the host (sender) computer and then migrates to the receiving (receiver) mobile computer to continue the process of updating learning contents before coming back to the sender for completing the process. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm by Uddin, Mueen, Abdul Rahman, Azizah, Alarifi, Abdulrahman, Talha, Muhammad, Shah, Asadullah, Iftikhar, Mohsin, Zomaya, Albert

    Published 2012
    “…It also describes the design of a novel on-demand routing algorithm. Most of the proposed algorithms use a blind ooding technique during the route discovery process. …”
    Get full text
    Get full text
    Article
  17. 17

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…A security criteria, outlines the authentication algorithm and key to be used during the registration process. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Mobile technology generations and cryptographic algorithms: analysis study by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2016
    “…This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and cryptographic algorithms used in these generations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Outdoor marker-less tracking and pose calculating system for mobile augmented reality by Rehman, Ullah Khan

    Published 2014
    “…Marker-less systems still offer challenges due to increased processing requirements. Some researchers use mobile AR browsers but AR browsers don’t have recognition capability and can only use location data to provide information. …”
    Get full text
    Get full text
    Thesis
  20. 20

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
    Get full text
    Get full text
    Conference or Workshop Item