Search Results - (( java simulation optimization algorithm ) OR ( user mining techniques algorithm ))
Search alternatives:
- mining techniques »
- java simulation »
- user mining »
-
1
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
A new classification model for online predicting users' future movements
Published 2008“…The WUM applies data mining techniques for extracting knowledge from user log files in the particular web server. …”
Get full text
Get full text
Conference or Workshop Item -
3
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…Client access patterns can be mined from web access log information using Web Usage Mining (WUM) techniques. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Web usage mining for UUM learning care using association rules
Published 2004“…With the powerful of data mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E�Learning portal. …”
Get full text
Get full text
Thesis -
5
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…Association rule mining is one of the data mining techniques which discovers strong association or correlation relationships among data. …”
Get full text
Get full text
Thesis -
7
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…In SWAC technique active user's access transaction pattern is matched with user access transaction pattern discovered from user access history based on mining techniques. …”
Get full text
Get full text
Thesis -
8
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…A variety of data mining techniques were used to address the problem; three steps of data pre-processing were applied, namely the cleaning of data, the identification of users, and the identification of sessions. …”
Get full text
Get full text
Article -
9
Dynamic modeling by usage data for personalization systems
Published 2009“…Although, there are various techniques of personalization, in this paper we concentrate on using data mining algorithms to personalize web sites' usage data. …”
Get full text
Get full text
Conference or Workshop Item -
10
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…During the mining process, the mining algorithm reduces the number of candidate patterns and comparisons by using a new candidate set called candidate head set and several efficient pruning techniques. …”
Get full text
Get full text
Article -
11
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…Secondly, a modified πRKM algorithm is proposed to partition the user session data. …”
Get full text
Get full text
Get full text
Thesis -
12
Data pre-processing on web server logs for generalized association rules mining algorithm
Published 2008“…Log file data can offer valuable insight into web site usage.It reflects actual usage in natural working condition, compared to the artificial setting of a usability lab.It represents the activity of many users, over potentially long period of time, compared to a limited number of users for an hour or two each.This paper describes the pre-processing techniques on IIS Web Server Logs ranging from the raw log file until before mining process can be performed. …”
Get full text
Get full text
Article -
13
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
14
-
15
Comparison of Statistic Prediction Results in Weka Explorer Interface and Experimenter Environment Interface on Dataset
Published 2019“…Study confirm is to categorize data and help users mining useful data and easily identify an appropriate algorithm for an accurate predictive model, to access the best-performing algorithms, minimize errors and minimum time to build models through the Explorer interface and Experimental Environment Interface to get accurate.…”
Get full text
Get full text
Get full text
Article -
16
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
17
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
18
A collaborative filtering recommender system for infrequently purchased product using slope-one algorithm and association rule mining
Published 2015“…This project implement the collaborative filtering using slope-one algorithm and also implement association rule mining in recommending hotels for tourist. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno
Published 2015“…Similar data mining techniques are suggested to be employed in different library settings and even enterprises as to make more effective use of organizational resources…”
Get full text
Get full text
Thesis -
20
