Search Results - (( developing banking solution algorithm ) OR ( java optimization path algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Asset liability management model: The case of selected Islamic banks in Malaysia / Chong Hui Ling by Chong , Hui Ling

    Published 2017
    “…There have been questions recently about the ability of the Islamic bank as the main competitor of the conventional bank in preventing future banking crisis from recurring. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Clustering Based on Customers’ Behaviour in Accepting Personal Loan using Unsupervised Machine Learning by Lim, Wai Ping, Goh, Ching Pang

    Published 2023
    “…This research contributes novel insights into the application of clustering algorithms in banking, proposing pragmatic solutions for efficient data analysis and campaign optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…Grey Wolf Optimizer (GWO) is a recently developed meta-heuristic algorithm which is appealing to researcher owing to its demonstrated performance as cited in the scientific literature. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg by Zakaria, Yuslina

    Published 2006
    “…This research presents the integration of ontology and metabolic pathway prediction algorithm as a possible solution for predicting metabolic pathways. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…For a real problem application, we consider the data from Gulf Commercial Bank in Iraq. This study revealed that the GK along with the MBPSO algorithm showed a better performance as compared to the GK algorithm alone. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Deep learning model for predicting and detecting overlapping symptoms of cardiovascular diseases in hospitals of UAE by Abbas Alhadeethy, Najwa Fadhil, Khedher, Akram M Z M, Shah, Asadullah

    Published 2012
    “…Hence, the best clinical applications of DL require considerate problem solving solution, selection of the most suitable DL algorithms and information, and defining balance of outcome. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Indonesian Stock Price Prediction Using Neural Basis Expansion Analysis for Interpretable Time Series Method by Zein, Muhamad Harun, Yudistira, Novanto, Adikara, Putra Pandu

    Published 2024
    “…This study aims to evaluate another state-of-theart solution, Neural Basis Expansion Analysis for Interpretable Time Series (N-BEATS), in comparison with LSTM by utilising historical\ data of PT Bank Central Asia Tbk (one of the banking companies in Indonesia) from 25 March 2013 to 21 March 2023. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Design and performance analysis of a fast 4-way set associative cache controller using Tree Pseudo Least Recently Used algorithm by Hazlan, Mohamed Alfian Al-Zikry, Gunawan, Teddy Surya, Yaacob, Mashkuri, Kartiwi, Mira, Arifin, Fatchul

    Published 2023
    “…Central to this study is the development of an innovative cache controller for a 4-way set associative cache, meticulously crafted using VHDL and structured as a Finite State Machine. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Design and implementation of a private and public key crypto processor for next-generation it security applications by Hani, Mohamed Khalil, Wen, Hau Yuan, Paniandi, Arul

    Published 2006
    “…The successful deployment of these electronic systems for ecommerce, Internet banking, government online services, VPNs, mobile commerce, Public Key Infrastructure (PKI), etc., is dependent on the effectiveness of the security solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Dynamic android malware category classification using semi-supervised deep learning by Mahdavifar, Samaneh, Kadir, Andi Fitriah Abdul, Fatemi, Rasool, Alhadidi, Dima, Ghorbani, Ali A

    Published 2020
    “…We use dynamic analysis to craft dynamic behavior profiles as feature vectors. Furthermore, we develop a new dataset, namely CICMalDroid2020, which includes 17,341 most recent samples of five different Android apps categories: Adware, Banking, SMS, Riskware, and Benign. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper