Filters








18,274 Hits in 6.5 sec

Personalized Advertising Computational Techniques: A Systematic Literature Review, Findings, and a Design Framework

Iosif Viktoratos, Athanasios Tsadiras
2021 Information  
Finally, a design framework for personalized advertisement systems has been designed based on these findings.  ...  This work conducts a systematic literature review about the domain of personalized advertisement, and more specifically, about the techniques that are used for this purpose.  ...  Works where the aim is to design and implement a personalized advertisement model.  ... 
doi:10.3390/info12110480 fatcat:53wmlsdlp5bmhffnv2fjst5vtq

Context-Aware Recommender Systems Using Data Mining Techniques

Kyoung-Jae Kim, Hyunchul Ahn, Sangwon Jeong
2010 Zenodo  
Our proposed model is designed to apply a modified collaborative filtering (CF) algorithm with regard to the several dimensions for the personalization of mobile devices – location, time and the user-s  ...  Experimental results show that the proposed system makes more accurate and satisfactory advertisements than comparative systems.  ...  Section 3 proposes our recommendation model -Location-based Advertisement Recommender for Mobile Users (LARMU). Section 4 presents the explanation for the experimental design and results.  ... 
doi:10.5281/zenodo.1070733 fatcat:yumj5wd76zf7rkgcdzfpz5a7i4

A systematic mapping study of mobile application testing techniques

Samer Zein, Norsaremah Salleh, John Grundy
2016 Journal of Systems and Software  
Mobile applications require a different approach to application quality and dependability and require an effective testing approach to build high quality and more reliable software.  ...  research in real-world development environments; specific testing techniques targeting application life-cycle conformance and mobile services testing; and comparative studies for security and usability  ...  S4 A testing approach based on modeling the application from a black-box perspective and presenting a distance metric for test cases of mobile applications.  ... 
doi:10.1016/j.jss.2016.03.065 fatcat:gi7ctvbs3jeshidovg737xn44y

A survey on next location prediction techniques, applications, and challenges

Ayele Gobezie Chekol, Marta Sintayehu Fufa
2022 EURASIP Journal on Wireless Communications and Networking  
In this manuscript, we have discussed various location prediction approaches, applications, and challenges, and it sheds light on important points regarding future research directions.  ...  This work offers an extensive overview of location prediction enveloping basic definitions and concepts, data sources, approaches, and applications.  ...  Techniques and approaches appropriate for next location prediction are reviewed. Research questions There are three important research questions that we need to address in this study.  ... 
doi:10.1186/s13638-022-02114-6 fatcat:s2ixs3ftibaobighbik6ikgfce

D6.2 Behavioural change techniques for hackAIR community

Katharina Hoelck, Carina Veeckman, Gavin McCrory, Laurence Claeys, Wiebke Harding, Panagiota Syropoulou
2018 Zenodo  
This deliverable is concerned with the development of an effective strategy for promoting the adoption and usage of the hackAIR platform.  ...  The present document is a deliverable of the hackAIR project, funded by the European Commission under the Horizon 2020 programme.  ...  -2020) iSPEX x Attachable iSPEX, Web and Mobile Application x Complete (2015) D6.2 Behavioural change techniques for hackAIR community  ... 
doi:10.5281/zenodo.2275354 fatcat:wdkrmjlwd5azrbrvpwqlmjjzde

Simulation Tools and Techniques for Vehicular Communications and Applications [chapter]

Christoph Sommer, Jérôme Härri, Fatma Hrizi, Björn Schünemann, Falko Dressler
2015 Vehicular ad hoc Networks  
To provide guidelines for efficient and scalable simulations of IVC applications, we discuss the appropriate selection of models and their level of granularity as function of the IVC application requirements  ...  Yet, they require a very specific methodology as well as adapted tools and models not straightforwardly found in other domains.  ...  The combination of precise channel and access models, behavior, and mobility feedback enables capturing a wide range of aspects necessary for, e.g., investigating intersection collision avoidance approaches  ... 
doi:10.1007/978-3-319-15497-8_13 fatcat:aplizdtjorhcljkt3cxix6nkba

A Model for Filtering Spam SMS Using Deep Machine Learning Technique

J. Palimote, V.I.E Anireh, N.D Nwiabu
2021 IJARCCE  
This study presents model for SMS spam filtering classification using Deep Machine Learning Techniques.  ...  Bootstrap framework (HTML and CSS) was use to design the Front End, while for the Backend, python programming language was use.  ...  The SMS spam threat is very clear, because users feel the mobile phone is a personal piece of technology that should be kept useful, personal and free from invasions such as spam and viruses [5] .  ... 
doi:10.17148/ijarcce.2021.10403 fatcat:powfkl2hp5dcljql2pccoi3qt4

Leveraging Market Research Techniques in IS - A Review of Conjoint Analysis in IS Research

Dana Naous, Christine Legner
2017 International Conference on Information Systems  
Based on this review, we develop a reference framework for application areas in IS that serves as foundation for future studies.  ...  We argue that CA can be leveraged in requirements management, business model design, and systems evaluation.  ...  We see empirically validated user preference models as a prerequisite for leveraging CA in the design and evaluation of mass-market IS.  ... 
dblp:conf/icis/NaousL17 fatcat:djbntlxgqfbkdkgfmhrvqmpf2y

Differential Privacy Techniques for Cyber Physical Systems: A Survey [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
2019 arXiv   pre-print
Furthermore, we present open issues, challenges, and future research direction for differential privacy techniques for CPSs.  ...  In this paper, we present a comprehensive survey of differential privacy techniques for CPSs.  ...  The authors in [184] proposed a light weight differential privacy approach that generated a random masking value based upon empirical model and error value.  ... 
arXiv:1812.02282v3 fatcat:bnapnprldnaetjnjedz473lrme

Data Mining Techniques for Wireless Sensor Networks: A Survey

Azhar Mahmood, Ke Shi, Shaheen Khatoon, Mi Xiao
2013 International Journal of Distributed Sensor Networks  
The taxonomy together with the comparative tables can be used as a guideline to select a technique suitable for the application at hand.  ...  Recently, data management and processing for wireless sensor networks (WSNs) has become a topic of active research in several fields of computer science, such as the distributed systems, the database systems  ...  Mobility. Node mobility increases the complexity of designing an appropriate data mining technique for WSNs.  ... 
doi:10.1155/2013/406316 fatcat:wdrq5vffqbcylcdqvqinx4vjui

Heterogeneous Systems Testing Techniques: An Exploratory Survey [chapter]

Ahmad Nauman Ghazi, Kai Petersen, Jürgen Börstler
2015 Lecture Notes in Business Information Processing  
In particular, testing for interoperability and conformance is a challenge. Furthermore, the complexities of such systems amplify traditional testing challenges.  ...  Search-based testing has been used by 14 out of 27 respondents, indicating the practical relevance of the approach for testing heterogeneous systems, which itself is relatively new and has only recently  ...  They propose a technique to model requirements, a technique for automated generation of tests using combination strategies, and a technique for prioritization of existing test cases for regression testing  ... 
doi:10.1007/978-3-319-13251-8_5 fatcat:egojrq2xh5bjvlaeghoicgar3q

Different samples, different results? How sampling techniques affect the results of field experiments on ethnic discrimination

Katrin Auspurg, Andreas Schneck, Fabian Thiel
2020 Research in Social Stratification and Mobility  
There was only a slight tendency that discrimination was higher for small suppliers and offers advertised for a relatively short time (i.e. new vacancies).  ...  This probably led to an over-representation of small suppliers and apartments that had already been advertised for a long time, resulting in an under-representation of large suppliers and new vacancies  ...  Data Note We used data collected in the research project "Ethnic Discrimination and Segregation in German Housing Markets" funded by a small non-profit foundation in Germany, the Wolfgang and Anita Bürkle  ... 
doi:10.1016/j.rssm.2019.100444 fatcat:n7lj4p2c3jafbkwbmzb2fwubbm

Applications of Fusion Techniques in E-Commerce Environments: A Literature Review

Emmanouil Daskalakis, Konstantina Remoundou, Nikolaos Peppes, Theodoros Alexakis, Konstantinos Demestichas, Evgenia Adamopoulou, Efstathios Sykas
2022 Sensors  
In this regard, various fusion techniques can play a crucial role in addressing such challenges and are extensively used in numerous e-commerce applications.  ...  For categorizing the solutions, a novel 4-fold categorization approach is introduced including product-related, economy-related, business-related, and consumer-related solutions, followed by relevant subcategorizations  ...  Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s22113998 pmid:35684619 pmcid:PMC9182987 fatcat:63ztbmzfuvdk3hjagtss5iihey

User Centered Design of Interaction Techniques for VR-Based Automotive Design Reviews

Matthias de Clerk, Manfred Dangelmaier, Gernot Schmierer, Dieter Spath
2019 Frontiers in Robotics and AI  
Incorporating the results, the second iteration explores three interaction techniques for Model Comparison utilizing (1) a portable touch remote, (2) hand and body gestures, and (3) a multimodal mix of  ...  In this paper, we report insights of our user centered approach aiming at appropriate VR interaction techniques supporting designers, engineers, and management executives optimally in design assessment  ...  AUTHOR CONTRIBUTIONS All authors listed have made a substantial, direct and intellectual contribution to the work, and approved it for publication.  ... 
doi:10.3389/frobt.2019.00013 pmid:33501029 pmcid:PMC7805915 fatcat:cnvp3zbs7rdgjhyhyecrly7jte

Literature Survey On Clustering Techniques

B.G.Obula Reddy
2012 IOSR Journal of Computer Engineering  
Clustering techniques have been discussed extensively in similarity search, Segmentation, Statistics ,Machine Learning ,Trend Analysis, Pattern Recognition and classification.  ...  clustering methods by taking some example for each classification.  ...  Rupali Mankar and Ms.Amruta Faude who have also contributed a great deal for the initial completion of the work.  ... 
doi:10.9790/0661-0310112 fatcat:cflw4gkk6fgqxf6xoyztofhqfa
« Previous Showing results 1 — 15 out of 18,274 results