Search Results - (( developing navigation mining algorithm ) OR ( java validation study algorithm ))
Search alternatives:
- developing navigation »
- navigation mining »
- mining algorithm »
- java validation »
-
1
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…The approach in the offline phase is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining. …”
Get full text
Get full text
Thesis -
2
A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm.
Published 2009“…In this paper, to provide online predicting effectively, we develop a model for online predicting through web usage mining system and propose a novel approach for classifying user navigation patterns to predict users’ future intentions. …”
Get full text
Get full text
Article -
3
A new classification model for online predicting users' future movements
Published 2008“…The WUM can model user behavior and, therefore, to forecast their future movements by mining user navigation patterns. To provide online prediction efficiently, we advance architecture for online predicting in web usage mining system by proposing novel model based on Longest Common Subsequence algorithm for classifying user navigation patterns. …”
Get full text
Get full text
Conference or Workshop Item -
4
WebPUM : a web-based recommendation system to predict user future movements.
Published 2010“…The approach is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining phase. …”
Get full text
Get full text
Get full text
Article -
5
Organizational Culture Automated Audit System (OCAAS)
Published 2017“…Several state of the art technologies and techniques were used to design and developed OCAAS which include the use of machine learning and sentiment analysis based novel opinion mining algorithms for electronic opinion analysis and computerized statistics based mathematical algorithms for electronic data analysis as well as MySQL database integration for faster data processing and cognitive ergonomics system interface for user friendly interface navigation.…”
Get full text
Get full text
Get full text
Thesis -
6
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. …”
Get full text
Get full text
Get full text
Thesis -
7
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…For statistical analysis, a Wilcoxon non-parametric test is used to test and validate the results of the experiments. This study illustrated some contributions, 1. …”
Get full text
Get full text
Thesis -
8
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…Consequently, during peak hours, finding a vacant parking bay is more of a difficult task. This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
11
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
13
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
14
Simultaneous measurement of multiple soil properties through proximal sensor data fusion: a case study
Published 2019“…After choosing the optimal sensor combination for each soil property, the predictive capability was compared using different data mining algorithms, including support vector machines (SVM), random forest (RF), multivariate adaptive regression splines (MARS), and regression trees (CART). …”
Get full text
Get full text
Article -
15
Development of open platform controller for step-NC compliant CNC system
Published 2020“…However, conventional CNC machines could not find its place in the new era of machining under the conventional standard of ISO 6983 due to its limitation in compatibility, language difference and control has caused increase in terms of repurchase cost, reinstallations, reconfigurations and also training of operators. Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
Published 2016“…This research follows an empirical research methodology, where the proposed approach is validated using 40 object-oriented open-source software systems written in Java. …”
Get full text
Get full text
Thesis
