Search Results - (( using mobile data algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- java application »
- data algorithm »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
-
4
Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: a review paper
Published 2017“…More importantly, the review showed that theses algorithms did not take into account the security of the data gathered by the mobile agent. …”
Get full text
Get full text
Get full text
Article -
5
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…In this research, a Mobile Data Gathering based Network Layout (MDG-NL) algorithm is proposed. …”
Get full text
Get full text
Thesis -
6
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…This approach tunes the parameters of the linear programming models that are used in the other algorithms by using a dynamic element. …”
Get full text
Get full text
Thesis -
7
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
9
Secure mobile AES encryptor (SMAE)
Published 2016“…When a user wants to send a file which contains confidential and important information, the user can protect the data inside the file by encrypting the data using the application developed using their mobile phones and send it to the person they intended to send the data. …”
Get full text
Get full text
Undergraduates Project Papers -
10
An Analysis of Node/Peer Discovery Approach and Routing Algorithms in Mobile & Traditional Peer-to-Peer Networks
Published 2012“…A qualitative methodology approach was used for data sources. Documents related to node/peer discovery approach and routing algorithms were studied. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Extreme learning machine for user location prediction in mobile environment
Published 2011“…There have been various approaches to location positioning to further improve mobile user location determination accuracy. This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Multi-dimensional Data Visualisation using Mobile Augmented Reality
Published 2020“…This research proposes and develops a multi-display data visualisation algorithm using mobile augmented reality, as augmented reality (AR) is beyond the two-dimensional screen. …”
Get full text
Get full text
Get full text
Article -
13
A comparison study of classifier algorithms for mobile-phone’s accelerometer based activity recognition
Published 2012“…The training and testing data were done using Weka 3.6.6 data mining tool. …”
Get full text
Get full text
Get full text
Article -
14
Extreme learning machine for user location prediction in mobile environment
Published 2011“…There have been various approaches to location positioning to further improve mobile user location determination accuracy. This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
16
Non-probabilistic approach to cooperative position tracking in large swarm of simple mobile robots using triangular cross-observation
Published 2013“…This algorithm, which is term triangular cross-observation (TCO), involves three mobile robots simultaneously in every update decision making process, which provides two observation data for every robot. …”
Get full text
Get full text
Thesis -
17
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
Get full text
Get full text
Thesis -
18
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…Boruta algorithm is used to select features automatically for assisting the machine learning. …”
Get full text
Get full text
Get full text
Article -
19
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
Get full text
Get full text
Conference or Workshop Item -
20
A spawn mobile agent itinerary planning approach for energy-efficient data gathering in wireless sensor networks
Published 2017“…The MA-based approach employs two algorithms: Single-agent Itinerary Planning (SIP) and Multi-mobile agent Itinerary Planning (MIP) for energy-efficient data gathering. …”
Get full text
Get full text
Get full text
Article
