Search Results - (( banking application based algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- banking application »
- data normalization »
- application based »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
Analysis and comparison of classification algorithms for credit approval in Islamic banks
Published 2025“…Using a dataset from an Islamic bank, the algorithms were assessed through precision, sensitivity, and accuracy metrics. …”
Get full text
Get full text
Get full text
Article -
5
Utilizing Classifier Algorithms to Analyze Lending Activity at The Sumsel Babel Bank's Pagar Alam Branch
Published 2023“…In this research, a classifier algorithm was applied to create a prediction model to predict the customer before the lending application was used and process to pass the lending process in Bank Sumsel, branch Pagar Alam. …”
Get full text
Get full text
Get full text
Article -
6
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
7
Clustering Based on Customers’ Behaviour in Accepting Personal Loan using Unsupervised Machine Learning
Published 2023“…This research contributes novel insights into the application of clustering algorithms in banking, proposing pragmatic solutions for efficient data analysis and campaign optimization. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Energy cost and carbon emission minimization for hybrid grid-independent microgrid using rule-based energy management scheme
Published 2024“…Based on this motivation, the application of the rule-based algorithm is applied to the design microgrid in this paper. …”
Conference Paper -
9
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
10
Capacitor bank placement in radial distribution system using particle swarm optimization algorithm
Published 2023text::Final Year Project -
11
-
12
Genetic-local hybrid optimizer for solving advance layout problem
Published 2006Get full text
Get full text
Get full text
Article -
13
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
14
Uncovering user perceptions toward digital banks in Indonesia: A Naïve Bayes sentiment analysis of twitter data
Published 2023“…User responses to digital banks vary depending on their experience throughout their transactions on the application, which may result in satisfaction or dissatisfaction. …”
Get full text
Get full text
Get full text
Article -
15
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis -
16
Constructing a shariah document screening prototype based on serverless architecture
Published 2023“…This research first forms an algorithm for document matching based Vector Space Model (VCM) and adopts Levenshtein Distance for similarity setting. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013Get full text
Get full text
Article -
18
-
19
Speech enhancement using deep neural network based on mask estimation and harmonic regeneration noise reduction for single channel microphone
Published 2022“…In order to overcome these issues, a supervised Deep Neural Network (DNN) algorithm predicted constrained Wiener Filter (cWF) target mask algorithm based on extracted Gammatone filter bank power spectrum (GF-TF) features and trained model is developed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
DC-based PV-powered home energy system
Published 2017“…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
Get full text
Get full text
Thesis
