Search Results - (( developing risk efficiency algorithm ) OR ( java visualization system algorithm ))

Refine Results
  1. 1

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…This report details the development of an autonomous guide robot system for visually impaired individuals using the ROS 2 framework and the Wheeltec R550 Robot platform. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.] by Selvarajoo, Mathuri, Santono, Mohd Pawiro, Fong, Wan Heng, Sarmin, Nor Haniza

    Published 2023
    “…In this research, a graphical user interface is developed to generate all the splicing languages generated by bounded-addition fuzzy splicing systems and their variants. An algorithm is developed using JAVA and Visual Studio Code software in order to replace the time-consuming manual computation of the languages generated by bounded-addition fuzzy DNA splicing systems and their variants.…”
    Get full text
    Get full text
    Article
  5. 5

    A Hybrid Adaptive Leadership GWO Optimization with Category Gradient Boosting on Decision Trees Algorithm for Credit Risk Control Classification by Suihai, Chen, Chih How, Bong, Po Chan, Chiu

    Published 2024
    “…However, compared with the traditional risk control algorithm (logistic regression algorithm), CatBoost algorithm also needs to have the advantages of high efficiency, low algorithm complexity and strong interpretable ability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Splicing system and their variants with fuzzy algebraic sum / Mohd Pawiro Santono Othman by Othman, Mohd Pawiro Santono

    Published 2023
    “…An algorithm is then developed in JAVA using visual code studio software to replace the time-consuming manual computation of the languages generated by algebraic sum fuzzy splicing systems and their variants. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Multi-Objective Portfolio Optimization Strategy using the SPEA-II Algorithm by Azarberahman, Alireza, Tohidinia, Malihe, Aliakbarzadeh, Hossein

    Published 2025
    “…The study highlights that the SPEA-II algorithm can serve as an effective and efficient method for stock portfolio selection and optimization, helping investors to identify portfolios with lower risk and higher return…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  9. 9

    Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming by Altahir, A.A., Asirvadam, V.S., Sebastian, P., Hamid, N.H.B., Ahmed, E.F.

    Published 2022
    “…That is, the enhanced efficiency of coverage is obtained by developing a prior grid assessment practice to stress on the security sensitive zones. …”
    Get full text
    Get full text
    Article
  10. 10

    Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study by Hassan, Ali Abdul Hussian, Md Shah, Wahidah, Jabbar Mohammed, Ali Abdul, Othman, Mohd Fairuz Iskandar

    Published 2017
    “…These approaches of clustering algorithms whether Distributed, Centralized, or Hybrid are reviewed very well, since the most of clustering algorithms have been developed by many researches based on these approaches. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Algorithmic fairness in AI-driven project management for post-conflict and developing regions: a critical review and framework for context-aware AI by Ahmed Al-Azazi, Saleem, Alawag, Aawag Mohsen, Saif, Amin

    Published 2026
    “…Artificial Intelligence (AI) is poised to revolutionize construction project management, offering unprecedented gains in efficiency, scheduling, and risk assessment. However, deploying AI uncritically in the data-poor and socially fragile environments of post-conflict and developing regions creates profound ethical risks. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Fabrication of robotic firefighting by Abdul Rahman, Muhammad Zulqarnain

    Published 2025
    “…So, the objective of this project is about developing a firefighting robot that can autonomously enter hazardous fire situation without risking any human life, the robot is tasked to detect fire source and efficiently distinguish fire while reducing risks to human responders. …”
    Get full text
    Get full text
    Student Project
  14. 14

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…Given the huge risks web applications face due to incessant cyberattacks, a proactive risk strategy such as threat modeling is adopted. …”
    Get full text
    Get full text
    Article
  15. 15

    Computational intelligence approach for classification and risk quantification of metabolic syndrome / Habeebah Adamu Kakudi by Habeebah Adamu , Kakudi

    Published 2019
    “…The proposed GOBAM model was able to diagnose the risk of MetS efficiently with borderline MRF measurements, by utilising a novel risk prediction index that ranged between 0 and 1. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Multi-objective portfolio selection with skewness preference: An application to the stock and electricity markets / Karoon Suksonghong by Karoon, Suksonghong

    Published 2014
    “…This study develops a single-period model that allows for heterogeneous degree of risk aversion and skewness preference to investigate the impact of skewness preference on the efficient portfolio choice. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Artificial Neural Network in Predicting Risk Exposure in Malaysian Shipyard Industry by David Chua, Sing Ngie, Calvin Chin, Yen Chih, Lim, Soh Fong

    Published 2024
    “…The efficiency of occupational safety and health (OSH) risk prevention depends on the accuracy of predicting risk exposure. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Efficient multi-UAV coordination via rl: joint path planning and task scheduling for post-disaster UAV-assisted MEC systems by Adnan, Mohd Hirzi, Ahmad Zukarnain, Zuriati, Subramaniam, Shamala K.

    Published 2025
    “…GRLA employs a unified reward matrix that integrates geometric distance, dynamic obstacle risk, and ground-user demand. At the same time, adaptive parameters allow flexible trade-offs between service quality and risk tolerance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article