Search Results - (( developing risk efficiency algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- efficiency algorithm »
- validation using »
- developing risk »
- risk efficiency »
- java validation »
- using algorithm »
-
1
A Hybrid Adaptive Leadership GWO Optimization with Category Gradient Boosting on Decision Trees Algorithm for Credit Risk Control Classification
Published 2024“…However, compared with the traditional risk control algorithm (logistic regression algorithm), CatBoost algorithm also needs to have the advantages of high efficiency, low algorithm complexity and strong interpretable ability. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
3
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
4
Multi-Objective Portfolio Optimization Strategy using the SPEA-II Algorithm
Published 2025“…The study highlights that the SPEA-II algorithm can serve as an effective and efficient method for stock portfolio selection and optimization, helping investors to identify portfolios with lower risk and higher return…”
Get full text
Get full text
Get full text
Article -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
6
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
8
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
9
Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming
Published 2022“…That is, the enhanced efficiency of coverage is obtained by developing a prior grid assessment practice to stress on the security sensitive zones. …”
Get full text
Get full text
Article -
10
Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study
Published 2017“…These approaches of clustering algorithms whether Distributed, Centralized, or Hybrid are reviewed very well, since the most of clustering algorithms have been developed by many researches based on these approaches. …”
Get full text
Get full text
Get full text
Article -
11
Algorithmic fairness in AI-driven project management for post-conflict and developing regions: a critical review and framework for context-aware AI
Published 2026“…Artificial Intelligence (AI) is poised to revolutionize construction project management, offering unprecedented gains in efficiency, scheduling, and risk assessment. However, deploying AI uncritically in the data-poor and socially fragile environments of post-conflict and developing regions creates profound ethical risks. …”
Get full text
Get full text
Get full text
Article -
12
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
13
Fabrication of robotic firefighting
Published 2025“…So, the objective of this project is about developing a firefighting robot that can autonomously enter hazardous fire situation without risking any human life, the robot is tasked to detect fire source and efficiently distinguish fire while reducing risks to human responders. …”
Get full text
Get full text
Student Project -
14
An optimized attack tree model for security test case planning and generation
Published 2018“…Given the huge risks web applications face due to incessant cyberattacks, a proactive risk strategy such as threat modeling is adopted. …”
Get full text
Get full text
Article -
15
Computational intelligence approach for classification and risk quantification of metabolic syndrome / Habeebah Adamu Kakudi
Published 2019“…The proposed GOBAM model was able to diagnose the risk of MetS efficiently with borderline MRF measurements, by utilising a novel risk prediction index that ranged between 0 and 1. …”
Get full text
Get full text
Get full text
Thesis -
16
Multi-objective portfolio selection with skewness preference: An application to the stock and electricity markets / Karoon Suksonghong
Published 2014“…This study develops a single-period model that allows for heterogeneous degree of risk aversion and skewness preference to investigate the impact of skewness preference on the efficient portfolio choice. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Lithium-Ion Battery Charge Equalization Algorithm for Electric Vehicle Applications
Published 2023Article -
18
Artificial Neural Network in Predicting Risk Exposure in Malaysian Shipyard Industry
Published 2024“…The efficiency of occupational safety and health (OSH) risk prevention depends on the accuracy of predicting risk exposure. …”
Get full text
Get full text
Get full text
Article -
19
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Efficient multi-UAV coordination via rl: joint path planning and task scheduling for post-disaster UAV-assisted MEC systems
Published 2025“…GRLA employs a unified reward matrix that integrates geometric distance, dynamic obstacle risk, and ground-user demand. At the same time, adaptive parameters allow flexible trade-offs between service quality and risk tolerance. …”
Get full text
Get full text
Get full text
Get full text
Article
