Search Results - (( developing formative customization algorithm ) OR ( java implications based algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    A New Cell Formation Method Considering Operation Sequences And Production Volumes by Abedini, Panteha

    Published 2013
    “…This research, presents an algorithm for cell formation to minimize intercellular movements. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Customer behavior analysis based on purchasing history and reviews using automated decision-making systems by Allur, Naga Sushma, Deevi, Durga Praveen, Dondapati, Koteswararao, Chetlapalli, Himabindu, Kodadi, Sharadha, Perumal, Thinagaran

    Published 2025
    “…This makes it easy to find online customer factorization. Techniques: Then, the decision-making process is used to analyze the customer’s data using the regression algorithm. …”
    Get full text
    Get full text
    Article
  4. 4

    Sentiment analysis of customer reviews for Konda Kondi Cafe & Bistro by Abd Azizul Rahman, Munirah Syafiqah

    Published 2025
    “…This project presents the development of a sentiment analysis system to analyze customer reviews for Konda-Kondi Cafe & Bistro. …”
    Get full text
    Get full text
    Student Project
  5. 5

    A microscopic swarm model simulation and fractal approach towards swarm agent behaviour by Widyarto, Setyawan, Abd. Latiff, Muhammad Shafie

    Published 2006
    “…The collision avoidance algorithm is influenced by existing algorithm flock which uses the steering behaviour to animate birds. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Mypesananlive: The development of facebook live order management system using natural language processing approach by Muhammad Danial Aiman Mohd Hanif

    Published 2022
    “…Another problem is that orders through comments can be missed due to typos and incorrect format by customers when commenting, leading to orders not being detected by existing OMS systems. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…There is also a need to develop a tool that contains the three approaches where the developer can customize the protection of the source code.…”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Design, development and evaluation of a game-based learning application for room housekeeping by Tan, Fui Ming, Siti Normaziah, Ihsan, Nor Maizana, Mat Nawi, Mohd Razali, Nor Amira

    Published 2024
    “…The methodology was structured into three phases: design, development, and evaluation. In the design phase, the game was tailored to meet educational objectives pertinent to hospitality studies, focusing on essential skills such as attention to detail, customer service, and operational efficiency. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno by Karno, Md Razib

    Published 2015
    “…With nearly 1 million records of collection in various formats, the Library of Universiti Teknologi Malaysia has been chosen as the case study for the research. …”
    Get full text
    Get full text
    Thesis