Search Results - (( based detection method algorithm ) OR ( risk optimization method algorithm ))
Search alternatives:
- risk optimization »
- method algorithm »
- based detection »
-
1
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…In summary, this study advances the field by delivering an effective, optimized predictive algorithm for early heart disease detection, thereby offering valuable insights that could enhance healthcare outcomes, support proactive cardiovascular risk management, and pave the way for future innovations in personalized medicine…”
Get full text
Get full text
Get full text
Article -
2
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Most of researches in IDS which use k-centroids-based clustering methods like K-means, K-medoids, Fuzzy, Hierarchical and agglomerative algorithms to baseline network traffic suffer from high false positive rate compared to signature-based IDS, simply because the nature of these algorithms risk to force some network traffic into wrong profiles depending on K number of clusters needed. …”
Get full text
Get full text
Get full text
Article -
3
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
Get full text
Get full text
Student Project -
4
Metacarpal phantom radiograph edge detection using genetic algorithm gradient based genotype / Norharyati Md Ariff
Published 2007“…The image processing is one of the methods to measure the bone strength. It is need to get the optimal result of osteoperosis or osteopenia detection. …”
Get full text
Get full text
Thesis -
5
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
Get full text
Get full text
Get full text
Thesis -
6
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…The method adapts the original Non-Dominated Sorting Genetic Algorithm II (NSGA-II) by introducing a hybridisation of adaptive multi-parent crossover genetic algorithm and fuzzy dominance-based decomposition techniques. …”
Get full text
Get full text
Get full text
Thesis -
7
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…Also, six techniques: Ant Colony Optimization (ACO), Gain Ratio (GR), Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), Random forest (RF), and Correlation-based Feature Selection (CFS) were used for the feature selection. …”
Get full text
Get full text
Get full text
Thesis -
8
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
9
CT reconstruction algorithm and low contrast detectability of phantom study: a systematic review and meta-analysis
Published 2022“…Background: For almost three decades, computed tomography (CT) has been extensively used in medical diagnosis, which led researchers to conduct linking of CT dose exposure with image quality. Methods: In this study, a systematic review and a meta-analysis study were conducted on CT phantom for resolution study especially based on the low contrast detectability (LCD). …”
Get full text
Get full text
Article -
10
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
11
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
12
Integrating Information Gain and Chi-Square for Enhanced Malware Detection Performance
Published 2025“…Recent studies have shown that this challenge can be addressed by employing machine learning algorithms for detection. Some studies have also implemented various feature selection methods to optimize detection efficiency. …”
Get full text
Get full text
Get full text
Article -
13
Bioelectrical impedance analysis-derived phase angle as a pragmatic screening tool for assessing sarcopenia in multi-ethnic peritoneal dialysis patients
Published 2024“…Receiver operating characteristics analysis was used to evaluate the discriminative performance of PhA in detecting sarcopenia. Optimal gender-specific PhA cut-off values for sarcopenia detection were determined based on desired sensitivity and specificity. …”
Get full text
Get full text
Get full text
Article -
14
Radiomics analysis and supervised machine learning model for classification of cervical cancer images using diffusion weighted imaging-MRI
Published 2024“…Additionally, the SVM algorithm was evaluated based on its performance across different DWI bvalues, aiming to optimize scanning time. …”
Get full text
Get full text
Get full text
Thesis -
15
Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran
Published 2015“…DRASTIC model was applied as a vulnerability assessment method based on the physical environmental aquifer parameters for assessing potential risk zone of aquifer to contamination, which showed more than 88% of the total area was classified as low to moderate risk to pollutant. …”
Get full text
Get full text
Thesis -
16
Development of a hybrid machine learning model for rockfall source and hazard assessment using laser scanning data and GIS
Published 2019“…The proposed BANN model achieved the best training accuracies of (95%) and best prediction accuracies of (92%) based on testing data compared to other employed methods. …”
Get full text
Get full text
Thesis -
17
Algorithmic Loan Risk Prediction Method Based on PSO-EBGWO-Catboost
Published 2024“…PSO-EBGWO is used to optimize the parameters of the CatBoost model. In this method, the Gray Wolf optimized algorithm (EBGWO) is further optimized by particle swarm optimization (PSO), and when combined with it, the convergence performance of the model is improved, the parameters of the model are reduced, and the model is simplified. …”
Get full text
Get full text
Get full text
Article -
18
Multi-Objective Portfolio Optimization Strategy using the SPEA-II Algorithm
Published 2025“…The study highlights that the SPEA-II algorithm can serve as an effective and efficient method for stock portfolio selection and optimization, helping investors to identify portfolios with lower risk and higher return…”
Get full text
Get full text
Get full text
Article -
19
An Empirical Study on the Construction of A Non-Convex Risk Parity Portfolio using a Genetic Algorithm
Published 2025“…While conventional numerical methods can be applied, they often struggle with inefficiency and fail to deliver optimal results. …”
Get full text
Get full text
Get full text
Article -
20
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project
