Search Results - (( usage intention system algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- intention system »
- system algorithm »
- java application »
-
1
A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm.
Published 2009“…A variety of the recommender systems for online personalization through web usage mining have been proposed. …”
Get full text
Get full text
Article -
2
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…To provide online prediction effectively, this study has developed a Web based recommendation system to Predict User Movements, named as WebPUM, for online prediction through web usage mining system and proposed a novel approach for classifying user navigation patterns to predict users‘ future intentions. …”
Get full text
Get full text
Thesis -
3
WebPUM : a web-based recommendation system to predict user future movements.
Published 2010“…To effectively provide online prediction, we have developed a recommendation system called WebPUM, an action using Web usage mining system and propose a novel approach online prediction for classifying user navigation patterns to predict users’ future intentions. …”
Get full text
Get full text
Get full text
Article -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
5
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
6
An efficient unknown detection approach for RFID data stream management system
Published 2025“…The presence of unknown RFID tags can occur when new, unread tagged objects are introduced into the system, either accidentally or intentionally. Additionally, unknown tags can result from tag duplication errors, where multiple tags have the same identifier, or tag malfunctions, where a tag fails to transmit its identifier correctly. …”
Get full text
Get full text
Get full text
Article -
7
Kernel methods and support vector machines for handwriting recognition
Published 2023Conference paper -
8
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
