Search Results - (( developing web mining algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- mining algorithm »
- level algorithm »
- developing web »
-
1
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…To provide online prediction effectively, this study has developed a Web based recommendation system to Predict User Movements, named as WebPUM, for online prediction through web usage mining system and proposed a novel approach for classifying user navigation patterns to predict users‘ future intentions. …”
Get full text
Get full text
Thesis -
2
WebPUM : a web-based recommendation system to predict user future movements.
Published 2010“…To effectively provide online prediction, we have developed a recommendation system called WebPUM, an action using Web usage mining system and propose a novel approach online prediction for classifying user navigation patterns to predict users’ future intentions. …”
Get full text
Get full text
Get full text
Article -
3
A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm.
Published 2009“…In this paper, to provide online predicting effectively, we develop a model for online predicting through web usage mining system and propose a novel approach for classifying user navigation patterns to predict users’ future intentions. …”
Get full text
Get full text
Article -
4
A new classification model for online predicting users' future movements
Published 2008“…We can exploit Web Usage Mining for Knowledge extracting based on user behavior during the web navigation. …”
Get full text
Get full text
Conference or Workshop Item -
5
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System
Published 2017“…Text mining is considered the most related field to database management and web search queries. …”
Get full text
Get full text
Get full text
Article -
8
An Automated System For Classifying Conference Papers
Published 2021“…The best classification model was then deployed to a web-based research conference system. The web-based system was developed using the Django web framework, based on a system architecture defined in this project called the Enhanced 3-Tier Web-based System with a Data Mining Layer. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
10
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…Many data mining techniques can be used to analyze log files to extract knowledge and valuable information for both organizations and web developers. …”
Get full text
Get full text
Article -
11
Direct approach for mining association rules from structured XML data
Published 2012“…Having the ability to extract information from XML data would answer the problem of mining the web contents which is a very useful and required power nowadays. …”
Get full text
Get full text
Thesis -
12
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
Get full text
Get full text
Thesis -
14
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
15
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
16
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
17
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Using Markov Model and Association Rules for Web Access Prediction
Published 2006“…This task requires the development of models that can predicts a user’s next request to a web server. …”
Get full text
Get full text
Conference or Workshop Item -
19
Stock price monitoring system
Published 2024“…Consequently, Root Mean Squared Error (RMSE) and Mean Absolute Percentage Error (MAPE) are used to evaluate the performance of the prediction algorithms. The methodology used in this project is Cross-Industry Standard Process for Data Mining (CRISP-DM), which is a common standard for data mining projects. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item
