Search Results - (( java implementation using algorithm ) OR ( usage (patterns OR pattern) _ algorithm ))

Refine Results
  1. 1
  2. 2

    A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining by Jalali, Mehrdad

    Published 2009
    “…The approach in the offline phase is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm. by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2009
    “…In this paper, to provide online predicting effectively, we develop a model for online predicting through web usage mining system and propose a novel approach for classifying user navigation patterns to predict users’ future intentions. …”
    Get full text
    Get full text
    Article
  5. 5

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Expectation maximization clustering algorithm for user modeling in web usage mining system by Mustapha, Norwati, Jalali, Manijeh, Jalali, Mehrdad

    Published 2009
    “…Web usage mining algorithms have been widely utilized for modeling user web navigation behavior. …”
    Get full text
    Get full text
    Article
  7. 7

    Exploring High Resolution Test Pattern To Improve The Cache Failure Analysis by Ong, Chein Ee

    Published 2017
    “…The generated high resolution test pattern is integrated for Automated Test Equipment (ATE) usage so that the test pattern can be applied in real silicon device testing. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Web usage mining: A review of recent works by Omar, Rosli, Md Tap, Abu Osman, Abdullah, Zainatul Shima

    Published 2015
    “…Our objective is to provide an overview of web usage mining concepts relevant to pattern mining phase of web usage mining process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication by 'Aqilah, Abd. Ghani, Syifak Izhar, Hisham, Nurul Wahidah, Arshad

    Published 2021
    “…We proposed a Zigzag SCAN pattern algorithm and compared it with the proposed Hilbert-Peano scheme. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    WebPUM : a web-based recommendation system to predict user future movements. by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2010
    “…The approach is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining phase. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  14. 14
  15. 15

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Most of the previous works explore Apriori approach which is not efficient in mining plentiful and long patterns. In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Mining Sequential Patterns using I-PrefixSpan by Saputra , Dhany, Dayang R.A. Rambli, Foong, Oi Mean

    Published 2008
    “…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. …”
    Get full text
    Get full text
    Citation Index Journal
  17. 17
  18. 18

    Creating Extraction Pattern by Combining Part of Speech Tagger and Grammatical Parser by Sari, Y., Hassan, M.F., Zamin, N.

    Published 2009
    “…Most of the previous works in the field of extraction pattern are based on the usage of syntactic analyzer and semantic tagger to create a pattern that could extract relevant information from free text documents or more structured documents like web pages. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph