Search Results - (( model evaluation _ algorithm ) OR ( user identification mining algorithm ))
Search alternatives:
- identification mining »
- user identification »
- model evaluation »
- mining algorithm »
-
1
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…This paper proposes an efficient Fuzzy Clustering algorithm for mining client session clusters from web access log information to find the groups of client profiles. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
3
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023“…In this paper, we propose an agent-based text mining algorithm to extract potential context of papers published in the WWW. …”
Article -
4
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…Therefore, this paper aims to analyze and cluster the log file data to get useful information that helps understand the users' behavior. A variety of data mining techniques were used to address the problem; three steps of data pre-processing were applied, namely the cleaning of data, the identification of users, and the identification of sessions. …”
Get full text
Get full text
Article -
5
Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman
Published 2020“…To realise this approach, the semantic image retrieval prototype is developed based on the existing foundation algorithm and customised to provide the ability for user engagement in order to enhance the retrieval performance. …”
Get full text
Get full text
Thesis -
6
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…Secondly, a modified πRKM algorithm is proposed to partition the user session data. …”
Get full text
Get full text
Get full text
Thesis -
7
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…In this paper, we analyze the literature and identify the text mining factors that influence the identification of relevant studies. …”
Article -
8
Dominance analyses reduction in skyline query processing over data stream with data mining technique
Published 2025“…DAR employs the Apriori algorithm, one of the most prevalent data mining algorithms, to identify the frequently occurring dominance analyses. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A Machine Learning Classification Application to Identify Inefficient Novice Programmers
Published 2023Conference Paper -
10
Context aware app recommendation using email semantic analysis
Published 2019“…The recommendation system is planned to develop by using data mining and machine learning. The email content as the raw data and sent to the test mining to perform text classification and category the data into differen t categories. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar
Published 2016“…FENL consists of four main phases: Accessing Requirements, Terms Extraction, Feature Identification and Formation of Feature Model. The proposed model is demonstrated through lab experiment and online software reviews are used as the input. …”
Get full text
Get full text
Thesis -
12
-
13
Sentiment-analysis to detect early depressive symptom in Bangla language from social media: a review study
Published 2021“…The review shows that the mostly used method in Sentiment-analysis is Machine Learning in the field of Opinion-mining. Furthermore, we have identified another variable that can be included to improve the existing algorithm.…”
Get full text
Get full text
Article -
14
Evaluation of MLP-ANN Training Algorithms for Modeling Soil Pore-Water Pressure Responses to Rainfall
Published 2013“…The performance of four artificial neural network (ANN) training algorithms was evaluated to identify the training algorithm appropriate for modeling the dynamics of soil pore-water pressure responses to rainfall patterns using multilayer perceptron (MLP) ANN. …”
Get full text
Get full text
Citation Index Journal -
15
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…Mobile devices are a gold mine of evidences for forensic investigators as they store valuable social networking data. …”
Get full text
Get full text
Get full text
Thesis -
16
Neural Networks Ensemble: Evaluation of Aggregation Algorithms for Forecasting
Published 2013“…The outputs from the individual NN models were combined by four different aggregation algorithms in NNs ensemble. …”
Get full text
Get full text
Thesis -
17
Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary
Published 2024“…To evaluate the model, the model accuracy, precision, recall, F1- score, and confusion matrix were used. …”
Get full text
Get full text
Thesis -
18
Analytical Study Of Machine Learning Models For Stock Trading In Malaysian Market
Published 2024“…Therefore, this study focused to contribute on evaluating different algorithm models such as traditional ML and deep learning models with big stock data of multiple parameters from selected companies in Bursa Malaysia. …”
thesis::master thesis -
19
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
20
Unifying the evaluation criteria of many objectives optimization using fuzzy Delphi method
Published 2021“…Lastly, the most suitable criteria outcomes are formulated in the unifying model and evaluate by experts to verify the appropriateness and suitability of the model in assessing the MaOO algorithms fairly and effectively.…”
Get full text
Get full text
Article
