Search Results - (( customer integration based algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…The computational results also show that the algorithms of population based ACO performs better than the algorithms of non-population based ACO. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Neural Network with Genetic Algorithm Prediction Model of Energy Consumption for Billing Integrity in Gas Pipeline by Hasbullah, Aidil Fazlina Binti

    Published 2012
    “…By monitoring and maintaining using metering system, the reliability and billing integrity can be ensured and trustworthy can be developed between distributors and customers. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing by Ch'ng, Heng Sun

    Published 2007
    “…It has been shown that the performance of a graph-based shortest path algorithm can severely be affected by the performance of its priority queue. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Development of integrated models for distribution network design of perishable products by Firoozi, Zahra

    Published 2015
    “…A memetic algorithm (MA) is developed to solve the integrated model, and the Lingo software is applied to solve the decoupled model. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Vader lexicon and support vector machine algorithm to detect customer sentiment orientation by Vivine Nurcahyawati, ., Zuriani, Mustaffa

    Published 2023
    “…Background: The concept of customer orientation, which is based on a set of fundamental beliefs that prioritize the interests of the customer, requires companies to detect these interests in order to maintain a high level of quality in their products or services. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Automate customer support handling E-Commerce enquiry using ChatGPT by Teo, Wen Jin

    Published 2024
    “…The primary objective of this thesis is to improve customer support on e-commerce platform by proposing an innovative solution that integrates advanced technologies and methodologies. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Artificial intelligent integrated into sun-tracking system to enhance the accuracy, reliability and long-term performance in solar energy harnessing by Tan, Jun You

    Published 2022
    “…The proposed AI algorithm integrates two deep learning models which are object detection algorithm and reinforcement learning. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    An ensemble method with cost function on churn prediction by Mohd Khalid, Awang, Mohammad Afendee, Mohamed, Mokhairi, Makhtar

    Published 2019
    “…Accurate customer churn classification is vital in any business organisation due to the higher cost involved in getting new customers. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    An Efficient Genetic Algorithm for Large Scale Vehicle Routing Problem Subject to Precedence Constraints by Noraini, Mohd Razali

    Published 2015
    “…In order to obtain feasible solution which does not violate precedence constraints, a route repair based topological sort technique is used and integrated in the genetic algorithm procedure. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Asic design of a kohonen neural network microchip by Rajah, Avinash, Hani, Mohamed Khalil

    Published 2004
    “…The ASIC design of the KNN processor adopts a novel implementation approach whereby the computation of the KNN algorithm is performed on the custom ASIC microchip and its operations are governed by a FPGA based controller. …”
    Get full text
    Get full text
    Get full text
    Book Section
  18. 18

    Web based personalized university timetable for UiTM students using genetic algorithm / Mohd Radhi Fauzan Jamli and Ahmad Firdaus Ahmad Fadzil by Jamli, Mohd Radhi Fauzan, Ahmad Fadzil, Ahmad Firdaus

    Published 2024
    “…Future work entails enhancing system robustness through comprehensive contingency planning, real-time data integration, and algorithmic optimization, with a focus on refining the genetic algorithm and exploring parallel processing techniques to further enhance efficiency and scalability.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Mypesananlive: The development of facebook live order management system using natural language processing approach by Muhammad Danial Aiman Mohd Hanif

    Published 2022
    “…The objective of this project is: (i) To investigate the process of capturing order commands using a combination of rule-based algorithm and regular expression from live video comments and convert them into orders. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  20. 20

    Enhanced Storage Mechanism for Secured Parallel Network File System by K J, Latesh Kumar

    Published 2018
    “…The challenges faced translates how the new techniques, lease and delegation algorithm for file locking, snapshot enabled locks and layouts for data state, integration of highly secured Kerberos security on storage for pNFS locks and layouts, data block size algorithm enabled deduplication on file, block and object patterns and the redundant array of independent disk data protection can create impact on storage computing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis