نتایج جستجو برای: usage pattern
تعداد نتایج: 440362 فیلتر نتایج به سال:
In many cases, normal uses of a system form patterns that will repeat. The most common patterns can be collected into a prediction model which will essentially predict that usage patterns common in the past will occur again in the future. Systems can then use the prediction models to provide advance notice to their implementations about how they are likely to be used in the near future. This te...
Streptococcus agalactiae is an important human and animal pathogen. To better understand the genetic features and evolution of S. agalactiae, multiple factors influencing synonymous codon usage patterns in S. agalactiae were analyzed in this study. A- and U-ending rich codons were used in S. agalactiae function genes through the overall codon usage analysis, indicating that Adenine (A)/Thymine ...
We assess within-study invariance of key UTAUT scales considering a total of six respondent group characteristics: five variables pertaining to users’ two technology engagement facets (prior technology knowledge and technology usage pattern) and one variable pertaining to their gender. Data collected from 250 respondents about their perceptions and usage of online blogs were analyzed to test si...
Workload modeling enables performance analysis and simulation of cloud resource management policies, which allows cloud providers to improve their systems’ Quality of Service (QoS) and researchers to evaluate new policies without deploying expensive large scale environments. However, workload modeling is challenging in the context of cloud computing due to the virtualization layer overhead, ins...
Nowadays, WWW (World Wide Web) becomes more popular and user friendly for transferring information. Therefore people are more interested in analyzing log files which can offer more useful insight into web site usage. Web usage mining is one of the data mining fields, which deals with the discovery and extract useful information from web logs. There are three phases in web usage mining, preproce...
In recent years, emerging applications introduced new constraints for data mining methods. These constraints are typical of a new kind of data: the data streams. In a data stream processing, memory usage is restricted, new elements are generated continuously and have to be considered as fast as possible, no blocking operator can be performed and the data can be examined only once. At this time ...
Home Energy Management System (HEMS), which makes the residential consumers, contribute to the demand response is attracting attention in recent years. An aim of HEMS is to minimize their electricity cost by controlling the use of their appliances according to electricity price. The use of appliances in HEMS may be affected by some conditions such as external temperature and electricity price. ...
OBJECTIVE Nowadays smartphone overuse has become a social and medical concern. For the diagnosis and treatment, clinicians use the self-report information, but the report data often does not match actual usage pattern. The paper examines the similarity and variance in smartphone usage patterns between the measured data and self-reported data. METHODS Together with the self-reported data, the ...
Patterns generated by conventional Web Usage Mining methods do not provide explicit insight into the user’s underlying interest and preferences. Hence there is a need to incorporate semantic information in web usage model to understand web user’s navigational behavior at conceptual level. This motivated us to propose the semantically enriched web usage model. The proposed work integrates domain...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید