Search Results - (( user evaluation model algorithm ) OR ( user identification mining algorithm ))*
Search alternatives:
- identification mining »
- user identification »
- mining algorithm »
- user evaluation »
- model algorithm »
-
1
Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman
Published 2020“…To realise this approach, the semantic image retrieval prototype is developed based on the existing foundation algorithm and customised to provide the ability for user engagement in order to enhance the retrieval performance. …”
Get full text
Get full text
Thesis -
2
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…This paper proposes an efficient Fuzzy Clustering algorithm for mining client session clusters from web access log information to find the groups of client profiles. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
4
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023“…In this paper, we propose an agent-based text mining algorithm to extract potential context of papers published in the WWW. …”
Article -
5
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…Therefore, this paper aims to analyze and cluster the log file data to get useful information that helps understand the users' behavior. A variety of data mining techniques were used to address the problem; three steps of data pre-processing were applied, namely the cleaning of data, the identification of users, and the identification of sessions. …”
Get full text
Get full text
Article -
6
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…In this paper, we analyze the literature and identify the text mining factors that influence the identification of relevant studies. …”
Article -
7
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…Secondly, a modified πRKM algorithm is proposed to partition the user session data. …”
Get full text
Get full text
Get full text
Thesis -
8
Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar
Published 2016“…FENL consists of four main phases: Accessing Requirements, Terms Extraction, Feature Identification and Formation of Feature Model. The proposed model is demonstrated through lab experiment and online software reviews are used as the input. …”
Get full text
Get full text
Thesis -
9
Dominance analyses reduction in skyline query processing over data stream with data mining technique
Published 2025“…DAR employs the Apriori algorithm, one of the most prevalent data mining algorithms, to identify the frequently occurring dominance analyses. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A Machine Learning Classification Application to Identify Inefficient Novice Programmers
Published 2023Conference Paper -
11
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
12
Context aware app recommendation using email semantic analysis
Published 2019“…The recommendation system is planned to develop by using data mining and machine learning. The email content as the raw data and sent to the test mining to perform text classification and category the data into differen t categories. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
14
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
Get full text
Get full text
Thesis -
16
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…We have evaluated the FaaSBid model and the proposed algorithms and pricing model by comparing with a number of existing models and algorithms using real-world datasets. …”
Get full text
Get full text
Get full text
Article -
17
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
18
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
19
Predicting user trajectories using deep learning algorithms / Ahmad Zaki Aiman Abdul Rashid, Azita Laily Yusof and Norsuzila Ya’acob
Published 2025“…These conclude that LSTM model are the most suitable model for predicting user trajectories among DL algorithms. …”
Get full text
Get full text
Get full text
Article -
20
An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms
Published 2015“…There is a technique known as normalization which develops models like user involvement in subject matter or user likeness according to the details of item to predict ratings to user. …”
Get full text
Get full text
Thesis
