Search Results - (( developers financial function algorithm ) OR ( java implication bees algorithm ))

Refine Results
  1. 1

    STOCK PREDICTION APP by GUNALAN, THANESWARAN

    Published 2022
    “…To address the issue, a mobile application for time series algorithms-based stock price prediction is developed. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Currently, mobile botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. …”
    Proceedings Paper
  3. 3
  4. 4

    Uninterruptible power supply topology using single phase matrix converter with active power filter functionality / Muhammad Shawwal Mohamad Rawi by Mohamad Rawi, Muhammad Shawwal

    Published 2022
    “…The distorted supply current waveform due to the non-linear load is compensated through a proper switching algorithm of SPMC to function as an Active Power Filter (APF). …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Pairwise test suite generator tool based on harmony search algorithm (HS-PTSGT) by Lai, Yi Xiang

    Published 2014
    “…However, exhaustive testing that required lot of time and financial resources is normally impossible. This thesis is about the research on developing a pairwise test suite generator tool based on Harmony Search Algorithm (HS-PTSGT) to generate optimum test suite. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8

    Financial advisory and management system by Low, Xin Yin

    Published 2025
    “…This study develops an Android application using Kotlin and Firebase (Firestore) to enhance expense categorization, financial literacy, and goal tracking. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept by Madihah Mohd Saudi, Farida Hazwani Mohd Ridzuan, Nurlida Basir, Nur Fatin Nabila Mohd Rafei Heng, Sakinah Ali Pitchay, Ahmad, IN

    Published 2024
    “…Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. This new system call classification can be used as a reference for other researcher in the same field to secure against mobile malware attacks by exploiting call logs. …”
    Proceedings Paper
  10. 10

    Hybrid subjective evaluation of rule Exraction Algorithm using Weighted Subsethood-Based (WSBA) by Othman, Mahmod, Ku-Mahamud, Ku Ruhana, Hawani, Shezrin, Hamzah, Amir, Khalid, Shaiful Annuar, Abdullah, Fader

    Published 2013
    “…Fuzzy rules are important elements that being highlighted in any fuzzy expert system.This research proposes the framework of subjective performance evaluation using fuzzy technique for ranking the performance of the financial performance of a company under a multi criteria environment.There are a lot of techniques used such as fuzzy similarity function, fuzzy synthetic decision and satisfaction function have been adopted.The framework is based on fuzzy multi-criteria decision-making that consists of fuzzy rules.The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…This proposed algorithm is developed based on heuristic method named modified binary particle swarm optimization (MBPSO) with kernel fuzzy clustering method as a fitness function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Asset liability management model: The case of selected Islamic banks in Malaysia / Chong Hui Ling by Chong , Hui Ling

    Published 2017
    “…The study takes Bank Islam Malaysia Berhad‟s (BIMB) financial data to validate the model. The multi-faceted objectives consist of the bank‟s expected returns and risks tolerance with constraints (also known as restraining functions to reflect the limitations placed on the Islamic bank‟s operating requirements), established using computational mathematics and algorithms with the aid of the MATLAB programming software. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Stock price monitoring system by Ng, Chun Ming

    Published 2024
    “…Algorithms trading is commonly practiced in the financial market due to high accuracy and least human error. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14
  15. 15

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…However, hackers are continuously developing malicious applications especially Android botnet to steal private information, causing financial losses and breach user privacy. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    AUTO-MANAGE PARKING SYSTEM (AMPS) by KHAIRUDDIN, MUHAMMAD AMIRUL SYAFIQ

    Published 2019
    “…For functionality, the system only able to serve its basic function and it still need few improvements. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Enhanced foreign exchange volatility forecasting using CEEMDAN with optuna-optimized ensemble deep learning model by Kausar, Rehan, Iqbal, Farhat, Raziq, Abdul, Sheikh, Naveed, Rehman, Abdul

    Published 2024
    “…Furthermore, the hyperparameters for the DL models are optimized using the Optuna algorithm. Finally, a hybrid ensemble model for forecasting exchange rate volatility is developed by combining the predictions of three distinct DL models. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Modeling The Modified Internal Rate Of Return (Mirr) For Long-Term Investment Strategy By The Assumption Of Gamma Distribution by Sayed, Amani Idris A

    Published 2023
    “…However, simultaneously estimating all three parameters (shape, scale, and growth) through the maximum-likelihood function is computationally complex. Alternative approaches such as the Simulated Annealing (SA) algorithm, which maximizes the log-likelihood function, and Bayesian MCMC estimation are considered. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…This research aims are to develop an open-source Arduino based sEMG data acquisition device by formulating hybrid automata algorithm to differentiate MUAP activity during wheelchair propulsion. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers by Alwi @ Suhaimi, Saifulza, Salleh, Mohd Rizal, Jaafar, Hazriq Izzuan, Ab Ghani, Mohd Ruddin, Md Fauadi, Muhammad Hafidz Fazli

    Published 2019
    “…It is well known that Programmable Logic Controller (PLC) related processes in manufacturing lines are safety-critical systems because of the increasing number of embedded functions and features. Any failure of these process control systems might not only result in a significant financial loss but also lead to casualties as well. …”
    Get full text
    Get full text
    Get full text
    Technical Report