Search Results - (( java application interface algorithm ) OR ( risk optimization method algorithm ))

Refine Results
  1. 1

    Algorithmic Loan Risk Prediction Method Based on PSO-EBGWO-Catboost by Chen, Suihai, Bong, Chih How, Chiu, Po Chan

    Published 2024
    “…PSO-EBGWO is used to optimize the parameters of the CatBoost model. In this method, the Gray Wolf optimized algorithm (EBGWO) is further optimized by particle swarm optimization (PSO), and when combined with it, the convergence performance of the model is improved, the parameters of the model are reduced, and the model is simplified. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Multi-Objective Portfolio Optimization Strategy using the SPEA-II Algorithm by Azarberahman, Alireza, Tohidinia, Malihe, Aliakbarzadeh, Hossein

    Published 2025
    “…The study highlights that the SPEA-II algorithm can serve as an effective and efficient method for stock portfolio selection and optimization, helping investors to identify portfolios with lower risk and higher return…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  5. 5

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    An Empirical Study on the Construction of A Non-Convex Risk Parity Portfolio using a Genetic Algorithm by Kusumawati, Rosita, Rosadi, Dedi, Abdurakhman, Abdurakhman

    Published 2025
    “…While conventional numerical methods can be applied, they often struggle with inefficiency and fail to deliver optimal results. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming by Altahir, A.A., Asirvadam, V.S., Sebastian, P., Hamid, N.H.B., Ahmed, E.F.

    Published 2022
    “…This article explores the efficiency of the visual sensor placement based on a combination of two methods namely, a deterministic risk estimation for the risk assessment and a dynamic programming for optimizing the placement of surveillance cameras. …”
    Get full text
    Get full text
    Article
  10. 10

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Integrated deep learning for cardiovascular risk assessment and diagnosis: An evolutionary mating algorithm-enhanced CNN-LSTM by Ahmed Alsarori, Ahmed Mohammed, Mohd Herwan, Sulaiman

    Published 2025
    “…EMA was applied for hyperparameter optimization, demonstrating improved convergence and generalization over conventional methods. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…Drawing from an extensive review of existing predictive models and cardiovascular health risk factors, this research proposes an enhanced ADAM optimization algorithm, integrated with advanced data processing and feature selection methodologies, to identify and refine key predictors for improved model performance. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani by Abdul Ghani, Nur Syafiqah

    Published 2021
    “…The results have shown that the Ant Colony Optimization Algorithm produced a better predictive accuracy. …”
    Get full text
    Get full text
    Student Project
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item