Search Results - (( usage intention using algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- intention using »
- using algorithm »
-
1
A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm.
Published 2009“…The approach is based on the using longest common subsequence algorithm to classify current user activities to predict user next movement. …”
Get full text
Get full text
Article -
2
Empirical analysis and optimization suggestions of Peking Opera audience's use intention of Kuaishou app
“…The test of the moderating effect finds that Peking Opera exposure experience produces a significant moderating effect in all paths where independent variables influence usage intention, while age only exerts a specific moderating effect in the paths of effort expectancy and algorithm recommendation on usage intention. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…In the online phase, the longest common subsequence algorithm is used as a new approach in recommendation system for classifying current user activities to predict user next movements. …”
Get full text
Get full text
Thesis -
4
WebPUM : a web-based recommendation system to predict user future movements.
Published 2010“…Furthermore, longest common subsequence algorithm is used for classifying current user activities to predict user next movement. …”
Get full text
Get full text
Get full text
Article -
5
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…This research tries to utilize biological-inspired computing algorithm, Immune Network algorithm, in this sentiment analysis field. …”
Get full text
Get full text
Thesis -
6
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Detection of multiple mangoes using histogram of oriented gradient technique in aerial monitoring
Published 2016“…The project uses shape identification algorithm and Histogram of Oriented Gradient principle to detect and count the total number of mango on its tree using a quad copter with an attachable webcam. …”
Get full text
Get full text
Get full text
Article -
9
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
10
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Kernel methods and support vector machines for handwriting recognition
Published 2023“…The support vector machine (SVM) as one of the methods in machine learning to make use of kernels is first discussed with the intention of applying it to handwriting recognition. …”
Conference paper -
12
Predicting factors of library traffic for UiTMCTKKT Cendekiawan Library using predictive analytics / Azzatul Husna Abdul Aziz
Published 2025“…Key findings highlight the role of attributes, such as study year, week 13, week 10, week 14, age, week 12, open access, and Theory Of Reasoned Action, like student attitudes, intention, and subjective norms in influencing library usage and satisfaction. …”
Get full text
Get full text
Thesis
