Search Results - (( developing consumer intention algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- developing consumer »
- intention algorithm »
- consumer intention »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…In this research, we are focusing on customer intent through their reviews. The main problem is with the large-scale manufacturer relies on consumer reviews, ratings, and opinions regarding the quality and design of the products and the manual analysis of these ratings is time-consuming, hence diminishing effectiveness. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm
Published 2024“…In this context, it has become an important topic to study the relationship between the authenticity of online CSR communication messages and consumers’ purchase intentions. This work proposes an algorithm based on PSO-1DCNN joint optimization to analyze the impact of online CSR information authenticity on consumers’ purchase intention in social media on the Internet platform. …”
Get full text
Get full text
Article -
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
Consumers' intention to use e-money mobile using the decomposed theory of planned behavior
Published 2016“…The purpose of this study is to understand consumers’ behavior on their intention to use e-money mobile.The study of the intention to use e-money mobile is still at the early stage in payment transaction. …”
Get full text
Get full text
Get full text
Thesis -
10
Power system intentional islanding for different contingency scenarios using discrete optimization technique
Published 2023“…In addition, the results of the case studies (with critical line outage) showed that the MDEP algorithm was able to obtain the optimal intentional islanding strategy with minimal power flow disruption.…”
text::Thesis -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
Modeling purchase intention towards edible bird's nest products among Malaysians
Published 2018“…Despite an ever-growing number of EBN products and options available in the market, there are still fewer purchasers among Malaysian consumers as compared to other countries. This study aims to determine factors that influence consumers’ intention in purchasing EBN products. …”
Get full text
Get full text
Get full text
Article -
13
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
Published 2013“…The proposed framework aims to use cyber crime evidence to reconstruct attack intentions and estimate similar attack strategies. The intentions are identified through a new algorithm called Attack Intention Analysis, which predicts cyber crime intentions by combining Dempster-Shafer theory and a causal network. …”
Get full text
Get full text
Thesis -
14
Electroencephalogram signal interpretation system for mobile robot
Published 2013“…The aim of this project is to develop an algorithm that can choose optimal four electrodes for signal recording, and convert one thought into multiple commands with the chosen electrodes. …”
Get full text
Get full text
Thesis -
15
The influence of Robo-advisory services on Malaysia university student’s investment intention
Published 2025“…As financial technology (fintech) continues to advance, understanding the behavioral intentions of young investors toward these services is crucial. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
From AI to Experience How Personalization Shapes Online Shopping Journeys in E-Marketplaces
Published 2025“…Using the recent development of social commerce integration into e-commerce, particularly the merger of TikTok and Tokopedia, as a contextual backdrop, the research highlights how recommendation algorithms, chatbots, and personalized content contribute to consumer decision-making processes. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
Application of machine learning approach on halal meat authentication principle, challenges, and prospects: a review
Published 2024“…Meat is a source of essential amino acids that are necessary for human growth and development, meat can come from dead, alive, Halal, or non-Halal animal species which are intentionally or economically (adulteration) sold to consumers. …”
Get full text
Get full text
Get full text
Article -
19
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…To achieve such a goal, this research improves the Intention-driven ICMP traceback model by filtering normal flow in the specific short time and two new algorithms in UDP-based and TCP-based attack are applied. …”
Get full text
Get full text
Thesis -
20
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
Get full text
Get full text
Thesis
