Search Results - (( develop banking optimization algorithm ) OR ( java data detection algorithm ))
Search alternatives:
- banking optimization »
- develop banking »
- data detection »
- java »
-
1
Capacitor bank placement in radial distribution system using Firefly algorithm method
Published 2023“…Nevertheless, a Firefly Algorithm (FA) has been proposed to find the optimal size of capacitor. …”
text::Final Year Project -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
3
Optimal allocation and sizing of capacitor bank and distributed generation using particle swarm optimization
Published 2021“…The research work presented in this thesis had investigated the effect of two additional weather parameters, namely wind speed and rainfall, in addition to the temperature and relative humidity using artificial neural network (ANN) and adaptive neuro-fuzzy inference system (ANFIS) in predicting the values of load demands. Moreover, the optimal allocation and sizing of the capacitor bank (C) and distributed generation (DG) were studied with the particle swarm optimization (PSO) technique to maintain the profile of bus voltages while reducing the energy loss of the network. …”
Get full text
Get full text
Get full text
Thesis -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
5
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Genetic-local hybrid optimizer for solving advance layout problem
Published 2006“…Results are achieved through the use of local optimizer, separation algorithm with genetic algorithm also called hybrid simple genetic. …”
Get full text
Get full text
Get full text
Article -
8
A Hybrid Adaptive Leadership GWO Optimization with Category Gradient Boosting on Decision Trees Algorithm for Credit Risk Control Classification
Published 2024“…Initially, the Grey Wolf algorithm (GWO) is leveraged to exploit its advantages in identifying optimal parameters. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
10
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…Grey Wolf Optimizer (GWO) is a recently developed meta-heuristic algorithm which is appealing to researcher owing to its demonstrated performance as cited in the scientific literature. …”
Get full text
Get full text
Thesis -
11
-
12
Machine learning based return prediction for digital financial portfolios
Published 2025“…The machine learning algorithm is introduced to optimize the digital financial portfolio investment return prediction system. …”
Get full text
Get full text
Get full text
Article -
13
Clustering Based on Customers’ Behaviour in Accepting Personal Loan using Unsupervised Machine Learning
Published 2023“…This research contributes novel insights into the application of clustering algorithms in banking, proposing pragmatic solutions for efficient data analysis and campaign optimization. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
15
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…This proposed algorithm is developed based on heuristic method named modified binary particle swarm optimization (MBPSO) with kernel fuzzy clustering method as a fitness function. …”
Get full text
Get full text
Get full text
Thesis -
16
Charging and discharging control of Li-Ion battery energy management for Electric vehicle application
Published 2023“…An intelligent charge control algorithm is used for this purpose. Backtracking search optimization algorithm (BSA) is implemented to optimize the parameters for generating regulated PWM signal. …”
Article -
17
Techno-economic analysis of an optimized photovoltaic and diesel generator hybrid power system for remote houses in a tropical climate
Published 2023“…The results indicated that the optimal scenario is the one that consists of a combination of the PV panels, battery bank and a diesel generator. …”
Article -
18
Asset liability management model: The case of selected Islamic banks in Malaysia / Chong Hui Ling
Published 2017“…There have been questions recently about the ability of the Islamic bank as the main competitor of the conventional bank in preventing future banking crisis from recurring. …”
Get full text
Get full text
Get full text
Thesis -
19
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
Get full text
Get full text
Get full text
Article -
20
