Search Results - (( developers financial function algorithm ) OR ( java implementation mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    STOCK PREDICTION APP by GUNALAN, THANESWARAN

    Published 2022
    “…To address the issue, a mobile application for time series algorithms-based stock price prediction is developed. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Currently, mobile botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. …”
    Proceedings Paper
  10. 10
  11. 11

    Uninterruptible power supply topology using single phase matrix converter with active power filter functionality / Muhammad Shawwal Mohamad Rawi by Mohamad Rawi, Muhammad Shawwal

    Published 2022
    “…The distorted supply current waveform due to the non-linear load is compensated through a proper switching algorithm of SPMC to function as an Active Power Filter (APF). …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Pairwise test suite generator tool based on harmony search algorithm (HS-PTSGT) by Lai, Yi Xiang

    Published 2014
    “…However, exhaustive testing that required lot of time and financial resources is normally impossible. This thesis is about the research on developing a pairwise test suite generator tool based on Harmony Search Algorithm (HS-PTSGT) to generate optimum test suite. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14
  15. 15

    Financial advisory and management system by Low, Xin Yin

    Published 2025
    “…This study develops an Android application using Kotlin and Firebase (Firestore) to enhance expense categorization, financial literacy, and goal tracking. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept by Madihah Mohd Saudi, Farida Hazwani Mohd Ridzuan, Nurlida Basir, Nur Fatin Nabila Mohd Rafei Heng, Sakinah Ali Pitchay, Ahmad, IN

    Published 2024
    “…Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. This new system call classification can be used as a reference for other researcher in the same field to secure against mobile malware attacks by exploiting call logs. …”
    Proceedings Paper
  17. 17

    Hybrid subjective evaluation of rule Exraction Algorithm using Weighted Subsethood-Based (WSBA) by Othman, Mahmod, Ku-Mahamud, Ku Ruhana, Hawani, Shezrin, Hamzah, Amir, Khalid, Shaiful Annuar, Abdullah, Fader

    Published 2013
    “…Fuzzy rules are important elements that being highlighted in any fuzzy expert system.This research proposes the framework of subjective performance evaluation using fuzzy technique for ranking the performance of the financial performance of a company under a multi criteria environment.There are a lot of techniques used such as fuzzy similarity function, fuzzy synthetic decision and satisfaction function have been adopted.The framework is based on fuzzy multi-criteria decision-making that consists of fuzzy rules.The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…This proposed algorithm is developed based on heuristic method named modified binary particle swarm optimization (MBPSO) with kernel fuzzy clustering method as a fitness function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Asset liability management model: The case of selected Islamic banks in Malaysia / Chong Hui Ling by Chong , Hui Ling

    Published 2017
    “…The study takes Bank Islam Malaysia Berhad‟s (BIMB) financial data to validate the model. The multi-faceted objectives consist of the bank‟s expected returns and risks tolerance with constraints (also known as restraining functions to reflect the limitations placed on the Islamic bank‟s operating requirements), established using computational mathematics and algorithms with the aid of the MATLAB programming software. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Stock price monitoring system by Ng, Chun Ming

    Published 2024
    “…Algorithms trading is commonly practiced in the financial market due to high accuracy and least human error. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis