Search Results - (( new evaluation model algorithm ) OR ( user identification mining algorithm ))
Search alternatives:
- identification mining »
- user identification »
- mining algorithm »
- model algorithm »
- new evaluation »
-
1
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…This paper proposes an efficient Fuzzy Clustering algorithm for mining client session clusters from web access log information to find the groups of client profiles. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
3
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023“…In this paper, we propose an agent-based text mining algorithm to extract potential context of papers published in the WWW. …”
Article -
4
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…Therefore, this paper aims to analyze and cluster the log file data to get useful information that helps understand the users' behavior. A variety of data mining techniques were used to address the problem; three steps of data pre-processing were applied, namely the cleaning of data, the identification of users, and the identification of sessions. …”
Get full text
Get full text
Article -
5
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…Secondly, a modified πRKM algorithm is proposed to partition the user session data. …”
Get full text
Get full text
Get full text
Thesis -
6
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…In this paper, we analyze the literature and identify the text mining factors that influence the identification of relevant studies. …”
Article -
7
Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar
Published 2016“…FENL consists of four main phases: Accessing Requirements, Terms Extraction, Feature Identification and Formation of Feature Model. The proposed model is demonstrated through lab experiment and online software reviews are used as the input. …”
Get full text
Get full text
Thesis -
8
Dominance analyses reduction in skyline query processing over data stream with data mining technique
Published 2025“…DAR employs the Apriori algorithm, one of the most prevalent data mining algorithms, to identify the frequently occurring dominance analyses. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A Machine Learning Classification Application to Identify Inefficient Novice Programmers
Published 2023Conference Paper -
10
Context aware app recommendation using email semantic analysis
Published 2019“…The recommendation system is planned to develop by using data mining and machine learning. The email content as the raw data and sent to the test mining to perform text classification and category the data into differen t categories. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH
Published 2018“…The study of the multistep ahead forecast is significant for practical application purposes using the proposed statistical model. This study is proposing a new algorithm of Box-Jenkins and GARCH (or BJ-G) in evaluating the multistep forecasting performance of the BJ-G model for highly volatile time series data. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Formulating new enhanced pattern classification algorithms based on ACO-SVM
Published 2013“…This paper presents two algorithms that integrate new Ant Colony Optimization (ACO) variants which are Incremental Continuous Ant Colony Optimization (IACOR) and Incremental Mixed Variable Ant Colony Optimization (IACOMV) with Support Vector Machine (SVM) to enhance the performance of SVM.The first algorithm aims to solve SVM model selection problem. …”
Get full text
Get full text
Get full text
Article -
14
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
15
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…Then, this study aims to optimize the hyperparameters of the developed DNN model using the Arithmetic Optimization Algorithm (AOA) and, lastly, to evaluate the performance of the newly proposed deep learning model with Simulated Kalman Filter (SKF) algorithm in solving image encryption application. …”
Get full text
Get full text
Thesis -
16
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…We have evaluated the FaaSBid model and the proposed algorithms and pricing model by comparing with a number of existing models and algorithms using real-world datasets. …”
Get full text
Get full text
Get full text
Article -
17
Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam
Published 2017“…In the preliminary study, the algorithm is evaluated on the four different peak models of the three EEG signals using the artificial neural network (ANN) with particle swarm optimization (PSO) as learning algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…In addition, four types of intrusion detection evaluation datasets were applied to evaluate the proposed model in comparison to the others. …”
Get full text
Get full text
Get full text
Article -
19
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
20
The FPBA algorithm with controlled capture ICC2001
Published 2001“…The performance of the algorithm is evaluated using simulation models. Results show that the new priority scheme offers significant improvement to the throughput and the waiting time of the different priority classes, especially to high priority class packets.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
