Search Results - (( exploring consumer patterns algorithm ) OR ( java implication force algorithm ))
Search alternatives:
- consumer patterns »
- implication force »
- java implication »
- force algorithm »
-
1
Sequential pattern mining using PrefixSpan with pseudoprojection and separator database
Published 2008“…Nevertheless, Pseudoprojection technique, which requires maintaining and visiting the in-memory sequence database frequently until all patterns are found, consumes a considerable amount of memory and induces the algorithm to undertake redundant and unnecessary checks to this copy of original database into memory when the candidate patterns are examined. …”
Get full text
Get full text
Conference or Workshop Item -
2
Study on the influence of knowledge-driven technology on predicting consumer repurchase behaviour
Published 2023“…Consumer purchase behaviour has become a potential research area in business analytics, as exploring micro-level details would increase the business's profitability. …”
Get full text
Get full text
Article -
3
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Nevertheless, peudoprojection technique, which requires maintaining and visiting the in-memory sequenced database frequently until all patterns are found, consumes a considerable amount of memory space and induces the algorithm to undertake many redundant and unnecessary checks to this copy of original database into memory when the candidate patterns are examined. …”
Get full text
Thesis -
4
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Nevertheless, peudoprojection technique, which requires maintaining and visiting the in-memory sequenced database frequently until all patterns are found, consumes a considerable amount of memory space and induces the algorithm to undertake many redundant and unnecessary checks to this copy of original database into memory when the candidate patterns are examined. …”
Get full text
Get full text
Thesis -
5
Predicting energy consumption pattern based on top trending videos YouTube 2021 using machine learning techniques
Published 2022“…This project will cover the methodology, concept, and design of utilising machine learning language to anticipate energy consumption patterns. The process of putting a machine learning pipeline into action will be explored and analysed. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
7
-
8
Generation of the batik Terengganu motifs using Bezier curve and Dejdumrong curve / Nuralea Natasya Amir Hamdan, Nur Fatin Natasya Ramdzan and Nurul Ain Nabila Mohamad Latif
Published 2023“…However, this manual process is time-consuming and limits the exploration of complex designs. …”
Get full text
Get full text
Student Project -
9
“SEGMENTATION OF ANTI NEUTROPHIL CYTOPLASMIC ANTIBODIES (ANCA) IMAGES BASED ON WATERSHED AND WAVELET”
Published 2013“…Recommendation for future work is to explore on automatic determination of noise variance inside images.…”
Get full text
Get full text
Final Year Project -
10
Car recognition using Bayes Classifier / Nur Atiqah Mat Samadi
Published 2017Get full text
Get full text
Thesis -
11
Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology
Published 2025“…By leveraging both public and private blockchain technologies, SongketChain offers a novel approach to securing pattern rights and supply chain logistics, ensuring that each Songket product's journey from weaver to consumer is documented and verifiable. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Hybrid harmony search-artificial intelligence models in credit scoring
Published 2019Get full text
Get full text
Thesis -
13
Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study
Published 2025“…To address this limitation, the present study proposes a self-learning model using reinforcement learning techniques, specifically the Q-Learning algorithm, to classify network intrusions based on learned behavioural patterns autonomously. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Prediction of rice biomass using machine learning algorithms
Published 2022“…However, they are destructive, laborious, time-consuming, impractical for large fields, and subject to human error. …”
Get full text
Get full text
Thesis
