Search Results - (( exploring consumer patterns algorithm ) OR ( java implication tree algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Sequential pattern mining using PrefixSpan with pseudoprojection and separator database by Saputra, D., Rambli, D.R.A., Foong, Oi Mean

    Published 2008
    “…Nevertheless, Pseudoprojection technique, which requires maintaining and visiting the in-memory sequence database frequently until all patterns are found, consumes a considerable amount of memory and induces the algorithm to undertake redundant and unnecessary checks to this copy of original database into memory when the candidate patterns are examined. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Study on the influence of knowledge-driven technology on predicting consumer repurchase behaviour by Chen, Yajing, Leong, Yee Choy, Yiing, Lee Shin, Xiao, Yunxia

    Published 2023
    “…Consumer purchase behaviour has become a potential research area in business analytics, as exploring micro-level details would increase the business's profitability. …”
    Get full text
    Get full text
    Article
  3. 3

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…Nevertheless, peudoprojection technique, which requires maintaining and visiting the in-memory sequenced database frequently until all patterns are found, consumes a considerable amount of memory space and induces the algorithm to undertake many redundant and unnecessary checks to this copy of original database into memory when the candidate patterns are examined. …”
    Get full text
    Thesis
  4. 4

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Saputra , Dhany, Rambli, Dayang R.A., Foong, Oi Mean

    Published 2008
    “…Nevertheless, peudoprojection technique, which requires maintaining and visiting the in-memory sequenced database frequently until all patterns are found, consumes a considerable amount of memory space and induces the algorithm to undertake many redundant and unnecessary checks to this copy of original database into memory when the candidate patterns are examined. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Predicting energy consumption pattern based on top trending videos YouTube 2021 using machine learning techniques by Ng, Jiun Shen

    Published 2022
    “…This project will cover the methodology, concept, and design of utilising machine learning language to anticipate energy consumption patterns. The process of putting a machine learning pipeline into action will be explored and analysed. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    “SEGMENTATION OF ANTI NEUTROPHIL CYTOPLASMIC ANTIBODIES (ANCA) IMAGES BASED ON WATERSHED AND WAVELET” by Nasir Nasir, Muhamad Hasyeme

    Published 2013
    “…Recommendation for future work is to explore on automatic determination of noise variance inside images.…”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11

    Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology by Muhammad Hassif Imran, Muhammad Harris Irwan, Johari, Abdullah, Adnan Shahid, Khan, Nayeem Ahmad, Khan

    Published 2025
    “…By leveraging both public and private blockchain technologies, SongketChain offers a novel approach to securing pattern rights and supply chain logistics, ensuring that each Songket product's journey from weaver to consumer is documented and verifiable. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study by Daru, April Firman, Hirzan, Alauddin Maulana, Mahmod Attar Bashi, Zainab Senan, Fanani, Fajriannoor

    Published 2025
    “…To address this limitation, the present study proposes a self-learning model using reinforcement learning techniques, specifically the Q-Learning algorithm, to classify network intrusions based on learned behavioural patterns autonomously. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Prediction of rice biomass using machine learning algorithms by Radhwane, Derraz

    Published 2022
    “…However, they are destructive, laborious, time-consuming, impractical for large fields, and subject to human error. …”
    Get full text
    Get full text
    Thesis