Search Results - (( java implementation phase algorithm ) OR ( pattern application customization algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5

    Market prices trend forecasting supported by Elliott Wave's theory by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2017
    “…The trend prediction is supported by application of recognized Elliot waves which was performed by custom developed algorithm based on available knowledge about the patterns. …”
    Get full text
    Get full text
    Article
  6. 6

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat by Mohammad Ahmad, Jomah Tubishat

    Published 2019
    “…Our results from the conducted experiments revealed that the proposed algorithm outperform the state-of-the-art aspect extraction algorithms and optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…The significance of the project is to help the credit card issuer in classifying the customer behavior in the payment pattern of credit card. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Sentiment analysis of customer review for Tina Arena Beauty by Amri, Nur Najwa Shahirah

    Published 2025
    “…This study demonstrates the practical application of sentiment analysis and business intelligence tools in transforming unstructured customer review data into strategic business knowledge for decision-making.…”
    Get full text
    Get full text
    Student Project
  12. 12

    Comparative study of apriori-variant algorithms by Mutalib, Sofianita, Abdul Subar, Ammar Azri, Abdul Rahman, Shuzlina, Mohamed, Azlinah

    Published 2016
    “…One of data mining methods is frequent itemset mining that has been implemented in real world applications, such as identifying buying patterns in grocery and online customers’ behavior.Apriori is a classical algorithm in frequent itemset mining, that able to discover large number or itemset with a certain threshold value. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    Genetic Algorithm for vehicle routing problem / W.Nurfahizul Ifwah W.Alias, Mohd Shaiful Sharipudin and Shamsunarnie Mohamed Zukri. by W.Alias, W.Nurfahizul Ifwah, Sharipudin, Mohd Shaiful, Mohamed Zukri, Shamsunarnie

    Published 2012
    “…Among these early applications of GA were those developed by Bagley for a game-playing program, by Rosenberg in simulating biological processes, and by Cavicchio for solving pattern-recognition problems. …”
    Get full text
    Get full text
    Research Reports
  16. 16

    Influence of shortest route approximation on relegating urban area’s transportation network priorities by Farid Morsidi, Haldi Budiman

    Published 2023
    “…This greedy pathfinding algorithm is regarded as proactive for application in several known neighboring routing characteristics, including customer clustering aspects in vehicle routing and location-allocation instances for optimal resource allocation.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20

    Efficient and effective automated surveillance agents using kernel tricks by Ahmed, Tarem, Wei, Xianglin, Ahmed, Supriyo, Pathan, Al-Sakib Khan

    Published 2012
    “…However, these schemes typically need custom equipment, or involve significant complexity and storage requirements. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article