Search Results - (( _ intention ((method algorithm) OR (path algorithm)) ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- method algorithm »
- java application »
- mining algorithm »
- path algorithm »
-
1
Simulation Of Path Optimisation Algorithms
Published 2017“…The benchmark for comparing the effectiveness of each algorithm are thoroughly defined with the intention of finding the best algorithm in the designed environment. …”
Get full text
Get full text
Monograph -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
Empirical analysis and optimization suggestions of Peking Opera audience's use intention of Kuaishou app
Published 2026“…The test of the moderating effect finds that Peking Opera exposure experience produces a significant moderating effect in all paths where independent variables influence usage intention, while age only exerts a specific moderating effect in the paths of effort expectancy and algorithm recommendation on usage intention. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
6
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
Analysis of Moderating Effect of Turnover Intention on the Relationship of Intrinsic Motivation and Employee Performance
Published 2024“…The first stage involved a bootstrapping process to generate and determine the significance level and strength of the path. The second stage employed the PLS Algorithm process, generating a simple slope graph. …”
Get full text
Get full text
Get full text
Article -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
Published 2020“…Two algorithms are proposed, utilizing single-path and multipath in transmission flow. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
Null positioning of dipole antenna array considering coupling effect
Published 2017“…An efficient method utilizing Genetic Algorithm (GA) is used to position the nulls in the direction of interference of circular array dipole antennas. …”
Get full text
Get full text
Get full text
Article -
13
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…To achieve such a goal, this research improves the Intention-driven ICMP traceback model by filtering normal flow in the specific short time and two new algorithms in UDP-based and TCP-based attack are applied. …”
Get full text
Get full text
Thesis -
14
Predicting Customer Buying Decisions for Online Shopping with Unbalanced Data Set
Published 2022“…Ensemble learning methods AdaBoost and Bagging were tested but showed no improvement on this online shoppers purchasing intention data set.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
16
Effective predicate identification algorithm for XML retrieval
Published 2018“…Thus, the systems return irrelevant user search intentions. A search intention consists of entity nodes and predicate nodes of XML data. …”
Get full text
Get full text
Conference or Workshop Item -
17
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…Recent research has focused on analysing Android Intent in the XML file. We propose a new method of analysing Android Intent in Java code, which includes implicit intent and explicit intent. …”
Get full text
Get full text
Get full text
Thesis -
18
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
Published 2013“…Similar attack strategies have been estimated by using one of the two proposed methods. The first method creates a new model that uses evidence when the intentions for a cyber crime are undetected. …”
Get full text
Get full text
Thesis -
19
Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm
Published 2024“…In this context, it has become an important topic to study the relationship between the authenticity of online CSR communication messages and consumers’ purchase intentions. This work proposes an algorithm based on PSO-1DCNN joint optimization to analyze the impact of online CSR information authenticity on consumers’ purchase intention in social media on the Internet platform. …”
Get full text
Get full text
Article -
20
Algebraic Net Class Rewriting Systems, Syntax and Semantics for Knowledge Representation and Automated Problem Solving
Published 2013“…New results are obtained within construction of problem solving systems where solution algorithms are derived parallel with other candidates applied to the same net classes. …”
Get full text
Get full text
Journal
