Search Results - (( develop banking method algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- method algorithm »
- mining algorithm »
- develop banking »
- banking method »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
9
Prediction of customer churn for ABC Multistate Bank using machine learning algorithms / Hui Shan Hon ... [et al.]
Published 2023“…Customer churn is defined as the tendency of customers to cease doing business with a company in a given period. ABC Multistate Bank faces the challenges to hold clients. The purpose of this study is to apply machine learning algorithms to develop the most effective model for predicting bank customer churn. …”
Get full text
Get full text
Article -
10
Capacitor bank placement in radial distribution system using Firefly algorithm method
Published 2023text::Final Year Project -
11
-
12
Asset liability management model: The case of selected Islamic banks in Malaysia / Chong Hui Ling
Published 2017“…Specifically, this research has been conducted with the core objective to develop a customised programming model for multi-purpose optimisation using this penalty cost method that ties together divergent objectives unique to Islamic banks. …”
Get full text
Get full text
Get full text
Thesis -
13
Genetic-local hybrid optimizer for solving advance layout problem
Published 2006“…This research describes a novel method, based on genetic algorithms(GA) to solve the machine layout problem, where developing machine layout is an important step designing manufacturing, renovation of factories, distribution centers, hospitals, banks, department stores, military supply, depots, universities, etc. …”
Get full text
Get full text
Get full text
Article -
14
Algorithm for Preprocessing Electrocardiosignal for a Wireless Holter Monitoring System
Published 2026“…The proposed methods and algorithms ensure high-quality, multi-day wireless transmission of ECG signals with low energy consumption.…”
Get full text
Get full text
Get full text
Article -
15
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…This proposed algorithm is developed based on heuristic method named modified binary particle swarm optimization (MBPSO) with kernel fuzzy clustering method as a fitness function. …”
Get full text
Get full text
Get full text
Thesis -
16
Clustering Based on Customers’ Behaviour in Accepting Personal Loan using Unsupervised Machine Learning
Published 2023“…This research contributes novel insights into the application of clustering algorithms in banking, proposing pragmatic solutions for efficient data analysis and campaign optimization. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Loss minimization in load flow simulation in power system
Published 2009Get full text
Learning Object -
18
Predicting credit risk of the small medium enterprises using modified KMV model / Shakila Saad
Published 2022“…Hence, it is necessary for banks to develop a mechanism to gauge the credit risk of its borrowers. …”
Get full text
Get full text
Thesis -
19
Evaluating Machine Learning Algorithms for Fake Currency Detection
Published 2024“…Additionally, we examine the performance of LightGBM, a gradientboosting algorithm, in comparison to these traditional methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Review of the machine learning methods in the classification of phishing attack
Published 2019“…This study focused on an algorithm that was thoroughly made and the methods in implementing this algorithm are discussed in detail.…”
Get full text
Get full text
Get full text
Article
