2021
DOI: 10.5815/ijmecs.2021.05.03
|View full text |Cite
|
Sign up to set email alerts
|

Log-File Analysis to Identify Internet-addiction in Children

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…The developers insert print statements into the source code, to save the runtime information of the application. With the use of the generated log files, crucial information can be retrieved, which then can be used for several objectives, like business model mining [1], [2], user behavior identification [3], [4], office tracking [5], performance monitoring [6], [7], or reliability engineering [8].…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…The developers insert print statements into the source code, to save the runtime information of the application. With the use of the generated log files, crucial information can be retrieved, which then can be used for several objectives, like business model mining [1], [2], user behavior identification [3], [4], office tracking [5], performance monitoring [6], [7], or reliability engineering [8].…”
mentioning
confidence: 99%
“…In [3] they use machine learning VOLUME 4, 2016 and linear regression to identify students that are likely to fail a subject. The authors of [4] also use machine learning in pair with Weighted Support-vector Machine (SVM), BernoulliNB, logistic regression, and MLPClassifier to detect "internet addiction" in the case of children.…”
mentioning
confidence: 99%