Search Results - between banking algorithm

Refine Results
  1. 1

    Assessing the relationships between problem representation, capabilities and task performance fraud risk assessment by Nigerian deposit money banks' fraud investigators by Odukoya, Olusoji Olumide

    Published 2021
    “…Thirteen out of nineteen hypotheses were evaluated through PLS-SEM algorithm and bootstrapping, whilst Mann-Whitney U Test was deployed to evaluate six hypotheses related to differences in ranking between forensic accountants and bank examiners. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Towards quick response and secure online banking transactions: using data compression and cryptography by Abdullah Zammarh, Nuha, Shah, Asadullah

    Published 2013
    “…It has been found that the main problem is in the connection channel between the end-user and the bank. Data compression and cryptography are integrated to be used for securing the online banking transactions efficiently. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Asset liability management model: The case of selected Islamic banks in Malaysia / Chong Hui Ling by Chong , Hui Ling

    Published 2017
    “…There have been questions recently about the ability of the Islamic bank as the main competitor of the conventional bank in preventing future banking crisis from recurring. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Evaluating Machine Learning Algorithms for Fake Currency Detection by Keerthana, S.N, Chitra, K.

    Published 2024
    “…Due to the subtle similarities between genuine and fake notes, distinguishing between them can be challenging. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Monitoring and analysis part of river bank using unmanned aerial vehicle [UAV] at Terusan Besar, Jitra / Mohammad Amin Mohd Asli by Mohd Asli, Mohammad Amin

    Published 2019
    “…The result will show the changes of the river bank between the current and previous image captured data in 2015…”
    Get full text
    Get full text
    Thesis
  6. 6

    Wavelet-based compression of medical images: Filter-bank selection and evaluation by Saffor, A., Bin Ramli, A.R., Ng, K.H.

    Published 2003
    “…Wavelet-based image coding algorithms (lossy and lossless) use a fixed perfect reconstruction filter-bank built into the algorithm for coding and decoding of images. …”
    Get full text
    Get full text
    Article
  7. 7

    Detecting resource consumption attack over MANET using an artificial immune algorithm by Abdelhaq, Maha, Hassan, Rosilah, Ismail, Mahamod, Israf Ali, Daud Ahmad

    Published 2011
    “…The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Scaled Conjugate Gradient using strong Wolfe line search for portfolio selection / Nurfatihah Anizan by Anizan, Nurfatihah

    Published 2024
    “…Then, the scaled LAMR method is applied in portfolio selection problems, to determine the more suitable investment between CIMB Bank and Maybank. The results showed that CIMB Bank has a lower risk than Maybank, making it the better investment. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Magnetic Optimization Algorithm Approach For Travelling Salesman Problem by Ismail, Mohd Muzafar, Zakaria, Muhammad Iqbal, Zainal Abidin, Amar Faiz, Mad Juliani, Juwita, Lit, Asrani, Mirjalili, Seyedali, Nordin, Nur Anis, Mohamed Saaid, Muhammad Faiz

    Published 2012
    “…The performance of the proposed approach is benchmarked with a case study taken from a well-known test bank.…”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14

    Artificial neural network modeling studies to predict the amount of carried weight by rail transportation system / Nur Syuhada Muhammat Pazil, Siti Nor Nadrah Muhamad and Hanis Sya... by Muhammat Pazil, Nur Syuhada, Muhamad, Siti Nor Nadrah, Nor Azahar, Hanis Syazana

    Published 2018
    “…On November 23, a cargo train had an accident when 12 cargo trains traveling southward slipped between National Bank Station and Kuala Lumpur Station due to heavy weight and oversized loads carried by the cargo train. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Predicting credit risk of the small medium enterprises using modified KMV model / Shakila Saad by Saad, Shakila

    Published 2022
    “…For validation purpose, the correlation between the company’s rating which is determined by the model and the risk category provided by bank officers is calculated. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Artificial neural network modeling studies to predict the amount of carried weight by Rail Transportation System / Nur Syuhada Muhammat Pazil, Siti Nor Nadrah Muhamad & Hanis Syaza... by Muhammat Pazil, Nur Syuhada, Muhamad, Nor Nadrah, Nor Azahar, Hanis Syazana

    Published 2018
    “…On November 23, a cargo train had an accident when 12 cargo trains traveling southward slipped between National Bank Station and Kuala Lumpur Station due to heavy weight and oversized loads carried by the cargo train. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…For a real problem application, we consider the data from Gulf Commercial Bank in Iraq. This study revealed that the GK along with the MBPSO algorithm showed a better performance as compared to the GK algorithm alone. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Cut-off solar charge controller as an alternative towards system efficiency optimization by Sabry, Ahmad H., Almassri, Ahmed M., Wan Hasan, Wan Zuha, Mohd Radzi, Mohd Amran, Ab Kadir, Mohd Zainal Abidin, Shafie, Suhaidi

    Published 2014
    “…A Simulink Matlab simulator is attempted in the simulation phase of this research. The main difference between the method used in the proposed Cut-Off controller and other technique used in the past is that PV array output power is used directly through a bypass MOSFET to charge the battery bank when the voltage of the battery bank at lower level that its maximum while switching on another path when the batteries reaches its full charge value through another MOSFET to transfer this surplus power to what is called as an Auxiliary load ,fans or auxiliary battery used for system ventilation or solar tracking to reduce the ambient temperature for the system components, so adding more improvements on system performance, this would reduce the complexity of the system on one hand and produce a competitive efficiency, low cost and can be easily modified on the other hand.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…The appliances are classified according to their compatibility with the DC environment to determine the efficient operating voltage range. The algorithm of the proposed charge controller uses that voltage to be assigned as the value of the full charge voltage for the battery bank. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
    Get full text
    Get full text
    Thesis