Search Results - (( java implication based algorithm ) OR ( _ intention ((using algorithm) OR (mining algorithm)) ))

Refine Results
  1. 1

    A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm. by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2009
    “…The approach is based on the using longest common subsequence algorithm to classify current user activities to predict user next movement. …”
    Get full text
    Get full text
    Article
  2. 2

    Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin by Raja Kamarudin, Raja Muhammad Hafiz

    Published 2012
    “…However, this is a step stone towards developing a biological-inspired Sentiment Mining algorithm…”
    Get full text
    Get full text
    Thesis
  3. 3

    A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining by Jalali, Mehrdad

    Published 2009
    “…The approach in the offline phase is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Predicting Customer Buying Decisions for Online Shopping with Unbalanced Data Set by Yap, Chau Tean

    Published 2022
    “…In this project, the realtime online shoppers purchasing intention data set from Sakar et al. (2018) was used. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    WebPUM : a web-based recommendation system to predict user future movements. by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2010
    “…Furthermore, longest common subsequence algorithm is used for classifying current user activities to predict user next movement. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…In order to overcome this problem, a classification model for intent recognition is developed. Dataset from Kaggle which contains English reviews from Shopee is downloaded to be used for the modelling process. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Comparative analysis of K-Means and K-Medoids for clustering exam questions / Nurul Zafirah Mokhtar by Mokhtar, Nurul Zafirah

    Published 2016
    “…The cluster detection algorithm searches for clusters of data which are similar to one another by using similarity measures. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Classification of stock market index based on predictive fuzzy decision tree by Khokhar, Arashid Hafeez

    Published 2005
    “…After constructing predictive FDT, Weighted Fuzzy Production Rules (WFPRs) are extracted from predictive FDT, and then more significant WFPR’s are mined by using similarity-based fuzzy reasoning method. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Classification with degree of importance of attributes for stock market data mining by Khokhar, Rashid Hafeez, Md. Sap, Mohd. Noor

    Published 2004
    “…Many statistical and data mining techniques have been used to predict time series stock market. …”
    Get full text
    Get full text
    Article
  11. 11

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
    thesis::doctoral thesis
  12. 12
  13. 13

    Power system intentional islanding for different contingency scenarios using discrete optimization technique by Nur Zawani Binti Saharuddin

    Published 2023
    “…The initial intentional islanding solution was determined using graph theory approach, to facilitate the proposed MDEP algorithm in determining the optimal intentional islanding strategy. …”
    text::Thesis
  14. 14

    Using Text Analytics on Social Media Posts to Identify Cues or Features of Depressive Behavior by Ibrahim A.H., Cob Z.C., Drus S.M., Latif A.A., Radzi H.M., Anwar R.M.

    Published 2023
    “…This study used the cross-industry process for data mining (crisp-dm) methodology for developing the depression detection model. …”
    Conference Paper
  15. 15
  16. 16

    The moderating effect of algorithm literacy on Over-The-Top platform adoption by Liu, Lu, Mohd Faris De Costa, Mohd Feroz Shah De Costa, Muhammad, Muhamad Sufri, Gong, Shuhui, Liu, Bin

    Published 2024
    “…Meanwhile, eight of those various theories and models of technology adoption were integrated to form the Unified Theory of Acceptance and Use of Technology (UTAUT), which offers a unified perspective for exploring behavioral intention to use new technology. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm by Li, Man, Liu, Fang, Abdullah, Zulhamri

    Published 2024
    “…In this context, it has become an important topic to study the relationship between the authenticity of online CSR communication messages and consumers’ purchase intentions. This work proposes an algorithm based on PSO-1DCNN joint optimization to analyze the impact of online CSR information authenticity on consumers’ purchase intention in social media on the Internet platform. …”
    Get full text
    Get full text
    Article
  18. 18

    Effective predicate identification algorithm for XML retrieval by Roko, Abubakar, C. Doraisamy, Shyamala, Nakone, Bello

    Published 2018
    “…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics by Mosa, Mohammad Rasmi Hassun

    Published 2013
    “…The intentions are identified through a new algorithm called Attack Intention Analysis, which predicts cyber crime intentions by combining Dempster-Shafer theory and a causal network. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
    Get full text
    Get full text
    Get full text
    Thesis