Search Results - (( usage intention using algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- java application »
- intention using »
- using algorithm »
-
1
A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm.
Published 2009“…The approach is based on the using longest common subsequence algorithm to classify current user activities to predict user next movement. …”
Get full text
Get full text
Article -
2
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…In the online phase, the longest common subsequence algorithm is used as a new approach in recommendation system for classifying current user activities to predict user next movements. …”
Get full text
Get full text
Thesis -
3
WebPUM : a web-based recommendation system to predict user future movements.
Published 2010“…Furthermore, longest common subsequence algorithm is used for classifying current user activities to predict user next movement. …”
Get full text
Get full text
Get full text
Article -
4
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…This research tries to utilize biological-inspired computing algorithm, Immune Network algorithm, in this sentiment analysis field. …”
Get full text
Get full text
Thesis -
5
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
6
Detection of multiple mangoes using histogram of oriented gradient technique in aerial monitoring
Published 2016“…The project uses shape identification algorithm and Histogram of Oriented Gradient principle to detect and count the total number of mango on its tree using a quad copter with an attachable webcam. …”
Get full text
Get full text
Get full text
Article -
7
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
8
Kernel methods and support vector machines for handwriting recognition
Published 2023“…The support vector machine (SVM) as one of the methods in machine learning to make use of kernels is first discussed with the intention of applying it to handwriting recognition. …”
Conference paper -
9
Predicting factors of library traffic for UiTMCTKKT Cendekiawan Library using predictive analytics / Azzatul Husna Abdul Aziz
Published 2025“…Key findings highlight the role of attributes, such as study year, week 13, week 10, week 14, age, week 12, open access, and Theory Of Reasoned Action, like student attitudes, intention, and subjective norms in influencing library usage and satisfaction. …”
Get full text
Get full text
Thesis
