Search Results - (( developing transaction based algorithm ) OR ( java application during algorithm ))
Search alternatives:
- developing transaction »
- application during »
- transaction based »
- java application »
- during algorithm »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
Get full text
Get full text
Thesis -
3
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
4
Online Transaction Fraud Detection Using Backlogging On E-Commerce Website: A Review
Published 2024Article -
5
African Buffalo Optimization Algorithm Based T-Way Test Suite Generation Strategy for Electronic-Payment Transactions
Published 2021Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
African buffalo optimization algorithm based t-way test suite generation strategy for electronic-payment transactions
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Price prediction model of green building based on machine learning algorithms / Nur Syafiqah Jamil
Published 2021“…In addition, this research also develops price prediction model using Machine Learning Model based on green building datasets covering the District of Kuala Lumpur, Malaysia. …”
Get full text
Get full text
Thesis -
8
Enhanced kiosks mapping on traditional market using Apriori Algorithm / Ardiansyah Dores, and Tazkiyah Herdi
Published 2021“…The results in the F1 process with the 30 thresholds, obtained 6 categories, up to the F3 process with the determination of the 20 thresholds, obtained 3 categories. Based on the results of research in accelerate the process of forming item-set combinations of transactions. …”
Get full text
Get full text
Book Section -
9
-
10
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
11
A security payment model for financial payment using mykad
Published 2011“…ARSA will automatically change its security algorithm based on times and attacks. If there is no attack or intrusion detected, MPM will wait for the scheduled switching within 30 minutes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Reusability techniques in load-flow analysis computer program
Published 2004Get full text
Get full text
Article -
13
Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR)
Published 2013“…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
Get full text
Get full text
Get full text
Article -
14
Blockchain-enabled cybersecurity framework for healthcare domain
Published 2025“…It also formulates the algorithms for the development of the proposed blockchain-enabled healthcare framework and evaluates its performance in data transaction management through simulation. …”
Get full text
Get full text
Thesis -
15
Diamond price prediction using random forest algorithm / Nur Amirah Mohd Azmi
Published 2025“…Some of the broad steps of methodology involve data preprocessing, by means of which handling of missing values, outliers, and inconsistencies for quality were developed. Development for a customized Random Forest-based model and a library-based one is performed. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
Suspicious activities detection for anti-money laundering using machine learning techniques
Published 2025“…The final product is a web-based system, AMLGuard, which incorporates a machine learning model to detect suspicious transactions related to money laundering. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
-
20
Developing a prototype e-commerce application with credit card validation and secure transaction
Published 2005Get full text
Get full text
Undergraduates Project Papers
