Search Results - (( developing banking techniques algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Detection and extraction features for signatures images via different techniques by Fatma Susilawati, M., Alsuhimat, F.M., Iqtait, M.

    Published 2019
    “…Over time, a number of techniques have been developed to identify and extract a set of features from the signature image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Development of unconstrained handwritten digit extraction, segmentation and recognition on bank cheques using artificial neural network by Francis, Adam

    Published 2005
    “…The third objective is to perform Vertical Splitting Algorithm technique for digit segmentation. And lastly, to develop an Artificial Neural Network for digit recognition. …”
    Get full text
    Student Project
  8. 8

    Optimal allocation and sizing of capacitor bank and distributed generation using particle swarm optimization by El Tawil, Naji Ammar Mansour

    Published 2021
    “…Moreover, the optimal allocation and sizing of the capacitor bank (C) and distributed generation (DG) were studied with the particle swarm optimization (PSO) technique to maintain the profile of bus voltages while reducing the energy loss of the network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…The Linear-PSO algorithm was the first version of improvement. However due to the longer time required for complete execution of this algorithm, the Binary Search technique was integrated and a new version of the algorithm was developed, namely the Linear-PSO with Binary Search (LPBS) algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    The Determinant Factors for the Issuance of Central Bank Digital Currency (CBDC) in Malaysia using Machine Learning Framework by Normi Sham Awang, Abu Bakar, Norzariyah, Yahya, Norbik Bashah, Idris, Engku Rabiah Adawiah, Engku Ali, Jasni, Mohamad Zain, Erni Eliana, Khairuddin, Ahmad Firdaus, Zainal Abidin, Murtaj, Sheikh Mohammad Tahsin, Siti Sarah, Maidin

    Published 2024
    “…The overall CentralBank Digital Currency Project Index (CBDCPI) was selected as a target variable,while two machine learning algorithms, Random Forest and XGBoost were utilized to identify the determining variables. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…For a real problem application, we consider the data from Gulf Commercial Bank in Iraq. This study revealed that the GK along with the MBPSO algorithm showed a better performance as compared to the GK algorithm alone. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. This application is using the data from a Taiwan bank which is obtained from the UCI data repository website. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Asset liability management model: The case of selected Islamic banks in Malaysia / Chong Hui Ling by Chong , Hui Ling

    Published 2017
    “…There have been questions recently about the ability of the Islamic bank as the main competitor of the conventional bank in preventing future banking crisis from recurring. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Sentiment analysis using clonal selection algorithm for Twitter’s data / Fatimah Mamat by Mamat, Fatimah

    Published 2012
    “…Clonal selection algorithm was used in this project because there are no researcher are focus on that technique for classify twitter’s data. …”
    Get full text
    Get full text
    Thesis
  15. 15

    The determinant factors for the issuance of Central Bank Digital Currency (CBDC) in Malaysia using machine learning framework by Awang Abu Bakar, Normi Sham, Yahya, Norzariyah, Idris, Norbik Bashah, Engku Ali, Engku Rabiah Adawiah, Mohamad Zain, Jasni, Khairuddin, Erni Eliana, Zainal Abidin, Ahmad Firdaus, Murtaj, Sheikh Mohammad Tahsin, Maidin, Siti Sarah

    Published 2024
    “…The overall Central Bank Digital Currency Project Index (CBDCPI) was selected as a target variable, while two machine learning algorithms, Random Forest and XGBoost were utilized to identify the determining variables. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Algorithm for Preprocessing Electrocardiosignal for a Wireless Holter Monitoring System by Gerasimova, Yuliya, Sidi, Fatimah, Abdullah, Lili Nurliyana, Ivel, Victor, Moldakhmetov, Sayat

    Published 2026
    “…The article describes the principles of developing a preprocessing algorithm for electro cardio signals in an in-house wireless automated Holter cardiac activity monitoring system. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Suspicious activities detection for anti-money laundering using machine learning techniques by Lim, Aun Chir

    Published 2025
    “…To solve money laundering, more effective techniques for detecting suspicious transactions must be developed. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Rational drug design using genetic algorithm: case of malaria disease by Al-Safi, Hassen Mohammed, Alshaikhli, Imad Fakhri Taha

    Published 2012
    “…Currently, number of researchers are working in this filed to overcome the recent issues of docking by using genetic algorithm approach. Moreover, Genetic Algorithm facilities the researchers and scientists in molecular docking experiments. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis