Search Results - (( development financial function algorithm ) OR ( java optimization path algorithm ))
Search alternatives:
- financial function »
- function algorithm »
- java optimization »
- optimization path »
- path algorithm »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
2
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
3
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
4
Visdom: Smart guide robot for visually impaired people
Published 2025“…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
STOCK PREDICTION APP
Published 2022“…To address the issue, a mobile application for time series algorithms-based stock price prediction is developed. …”
Get full text
Get full text
Final Year Project -
6
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Currently, mobile botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. …”
Proceedings Paper -
7
Development of personal finance mobile application with Optical Character Recognition (OCR) technology for automated receipt management and expense tracking
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Uninterruptible power supply topology using single phase matrix converter with active power filter functionality / Muhammad Shawwal Mohamad Rawi
Published 2022“…The distorted supply current waveform due to the non-linear load is compensated through a proper switching algorithm of SPMC to function as an Active Power Filter (APF). …”
Get full text
Get full text
Thesis -
9
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
10
Pairwise test suite generator tool based on harmony search algorithm (HS-PTSGT)
Published 2014“…However, exhaustive testing that required lot of time and financial resources is normally impossible. This thesis is about the research on developing a pairwise test suite generator tool based on Harmony Search Algorithm (HS-PTSGT) to generate optimum test suite. …”
Get full text
Get full text
Undergraduates Project Papers -
11
-
12
Financial advisory and management system
Published 2025“…This study develops an Android application using Kotlin and Firebase (Firestore) to enhance expense categorization, financial literacy, and goal tracking. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
14
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept
Published 2024“…Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. This new system call classification can be used as a reference for other researcher in the same field to secure against mobile malware attacks by exploiting call logs. …”
Proceedings Paper -
15
Hybrid subjective evaluation of rule Exraction Algorithm using Weighted Subsethood-Based (WSBA)
Published 2013“…Fuzzy rules are important elements that being highlighted in any fuzzy expert system.This research proposes the framework of subjective performance evaluation using fuzzy technique for ranking the performance of the financial performance of a company under a multi criteria environment.There are a lot of techniques used such as fuzzy similarity function, fuzzy synthetic decision and satisfaction function have been adopted.The framework is based on fuzzy multi-criteria decision-making that consists of fuzzy rules.The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…This proposed algorithm is developed based on heuristic method named modified binary particle swarm optimization (MBPSO) with kernel fuzzy clustering method as a fitness function. …”
Get full text
Get full text
Get full text
Thesis -
17
Asset liability management model: The case of selected Islamic banks in Malaysia / Chong Hui Ling
Published 2017“…The study takes Bank Islam Malaysia Berhad‟s (BIMB) financial data to validate the model. The multi-faceted objectives consist of the bank‟s expected returns and risks tolerance with constraints (also known as restraining functions to reflect the limitations placed on the Islamic bank‟s operating requirements), established using computational mathematics and algorithms with the aid of the MATLAB programming software. …”
Get full text
Get full text
Get full text
Thesis -
18
Stock price monitoring system
Published 2024“…Algorithms trading is commonly practiced in the financial market due to high accuracy and least human error. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Conference Paper -
20
Intersection Features For Android Botnet Classification
Published 2019“…However, hackers are continuously developing malicious applications especially Android botnet to steal private information, causing financial losses and breach user privacy. …”
Get full text
Get full text
Get full text
Article
