Search Results - (( develop banking optimization algorithm ) OR ( java data function algorithm ))
Search alternatives:
- banking optimization »
- function algorithm »
- develop banking »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Capacitor bank placement in radial distribution system using Firefly algorithm method
Published 2023“…Nevertheless, a Firefly Algorithm (FA) has been proposed to find the optimal size of capacitor. …”
text::Final Year Project -
3
Optimal allocation and sizing of capacitor bank and distributed generation using particle swarm optimization
Published 2021“…The research work presented in this thesis had investigated the effect of two additional weather parameters, namely wind speed and rainfall, in addition to the temperature and relative humidity using artificial neural network (ANN) and adaptive neuro-fuzzy inference system (ANFIS) in predicting the values of load demands. Moreover, the optimal allocation and sizing of the capacitor bank (C) and distributed generation (DG) were studied with the particle swarm optimization (PSO) technique to maintain the profile of bus voltages while reducing the energy loss of the network. …”
Get full text
Get full text
Get full text
Thesis -
4
Genetic-local hybrid optimizer for solving advance layout problem
Published 2006“…Results are achieved through the use of local optimizer, separation algorithm with genetic algorithm also called hybrid simple genetic. …”
Get full text
Get full text
Get full text
Article -
5
A Hybrid Adaptive Leadership GWO Optimization with Category Gradient Boosting on Decision Trees Algorithm for Credit Risk Control Classification
Published 2024“…Initially, the Grey Wolf algorithm (GWO) is leveraged to exploit its advantages in identifying optimal parameters. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
8
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…Grey Wolf Optimizer (GWO) is a recently developed meta-heuristic algorithm which is appealing to researcher owing to its demonstrated performance as cited in the scientific literature. …”
Get full text
Get full text
Thesis -
9
-
10
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
11
Machine learning based return prediction for digital financial portfolios
Published 2025“…The machine learning algorithm is introduced to optimize the digital financial portfolio investment return prediction system. …”
Get full text
Get full text
Get full text
Article -
12
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
13
Clustering Based on Customers’ Behaviour in Accepting Personal Loan using Unsupervised Machine Learning
Published 2023“…This research contributes novel insights into the application of clustering algorithms in banking, proposing pragmatic solutions for efficient data analysis and campaign optimization. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…This proposed algorithm is developed based on heuristic method named modified binary particle swarm optimization (MBPSO) with kernel fuzzy clustering method as a fitness function. …”
Get full text
Get full text
Get full text
Thesis -
15
Charging and discharging control of Li-Ion battery energy management for Electric vehicle application
Published 2023“…An intelligent charge control algorithm is used for this purpose. Backtracking search optimization algorithm (BSA) is implemented to optimize the parameters for generating regulated PWM signal. …”
Article -
16
Techno-economic analysis of an optimized photovoltaic and diesel generator hybrid power system for remote houses in a tropical climate
Published 2023“…The results indicated that the optimal scenario is the one that consists of a combination of the PV panels, battery bank and a diesel generator. …”
Article -
17
Asset liability management model: The case of selected Islamic banks in Malaysia / Chong Hui Ling
Published 2017“…There have been questions recently about the ability of the Islamic bank as the main competitor of the conventional bank in preventing future banking crisis from recurring. …”
Get full text
Get full text
Get full text
Thesis -
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
19
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
