Search Results - (( use intention method algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- intention method »
- method algorithm »
- java application »
- mining algorithm »
- use intention »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Predicting Customer Buying Decisions for Online Shopping with Unbalanced Data Set
Published 2022“…In this project, the realtime online shoppers purchasing intention data set from Sakar et al. (2018) was used. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
10
Effective predicate identification algorithm for XML retrieval
Published 2018“…Finally, an effective predicate identification algorithm (EPIA) which uses EBQS and STPS to return relevant predicates is introduced. …”
Get full text
Get full text
Conference or Workshop Item -
11
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
Published 2013“…Similar attack strategies have been estimated by using one of the two proposed methods. The first method creates a new model that uses evidence when the intentions for a cyber crime are undetected. …”
Get full text
Get full text
Thesis -
12
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…The results show a detection rate of 91% using Android Intent against 83% using Android permission. …”
Get full text
Get full text
Get full text
Thesis -
13
Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm
Published 2024“…In this context, it has become an important topic to study the relationship between the authenticity of online CSR communication messages and consumers’ purchase intentions. This work proposes an algorithm based on PSO-1DCNN joint optimization to analyze the impact of online CSR information authenticity on consumers’ purchase intention in social media on the Internet platform. …”
Get full text
Get full text
Article -
14
Consumers' intention to use e-money mobile using the decomposed theory of planned behavior
Published 2016“…The Partial Least Squares Method (PLS) series PLS 2.0 M3 for algorithm and bootstrap techniques and SPSS 18 was used to test the hypothesis that has been developed. …”
Get full text
Get full text
Get full text
Thesis -
15
Simulation Of Path Optimisation Algorithms
Published 2017“…Likewise, when comparing between Bidirectional Searching with Replanning and Unidirectional Searching with Replanning, a decrease of 41.08%, 25.57% and 14.41% on algorithm total time can be seen. Thus, in this final year project, the optimum algorithm to use is A* algorithm with Bidirectional Searching method and Replanning method included during the searching process. …”
Get full text
Get full text
Monograph -
16
An early warning detection system of terrorism in indonesia from Twitter contents using naïve bayes algorithm
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Optimal allocation of battery energy storage system using whale optimization algorithm
Published 2023Conference Paper -
18
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Performance Analysis of Hexagon-Diamond Search Algorithm for Motion Estimation using MATLAB
Published 2010“…One of ME techniques, known as Block Matching Algorithm (BMA), has been widely used in various video coding standards. …”
Get full text
Get full text
Article -
20
Correlation model in the adoption of E-payment services: A machine learning approach
Published 2022“…To extract highly correlated features, several pairwise correlation methods were used, such as Pearson’s Correlation, and Spearman’s Correlation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
