Search Results - (( develop banking tool algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2

    Algorithm for Preprocessing Electrocardiosignal for a Wireless Holter Monitoring System by Gerasimova, Yuliya, Sidi, Fatimah, Abdullah, Lili Nurliyana, Ivel, Victor, Moldakhmetov, Sayat

    Published 2026
    “…The authors also present a real-virtual complex for setting up and implementing the algorithm of the developed system, providing a wide range of software and hardware tools, including specialised MATLAB system packages for setting up, debugging, and optimising operating modes. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Rational drug design using genetic algorithm: case of malaria disease by Al-Safi, Hassen Mohammed, Alshaikhli, Imad Fakhri Taha

    Published 2012
    “…With the rapid development in the amount of molecular biological structures, computational molecular docking (CMD) approaches become one of the crucial tools in rational drug design (RDD). …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…Hence, fuzzy clustering analysis such as the Gustafson-Kessel (GK) algorithm is seen to be a very important tool in the field of credit scoring. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Determining malaria risk factors in Abuja, Nigeria using various statistical approaches by Segun, Oguntade Emmanuel

    Published 2018
    “…The climate data were obtained from the data bank of Agricultural Development Project Gwagwalada, Abuja, Nigeria (1997-2014). …”
    Get full text
    Get full text
    Thesis
  11. 11

    A simultaneous spam and phishing attack detection framework for short message service based on text mining approach by Mohd Foozy, Cik Feresa

    Published 2017
    “…The Phishing Rule-Based algorithm is used to extract SMS Phishing. For Module 2, the SMS Attack Profiling algorithm is used in order to produce SMS Spam and Phishing words. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12