Search Results - (( java implementation modified algorithm ) OR ( risk evaluation method algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- evaluation method »
- method algorithm »
- risk evaluation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…Risk assessment matrices are widely used to evaluate risks related to such hazards. …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Algorithmic Loan Risk Prediction Method Based on PSO-EBGWO-Catboost
Published 2024“…Under the background of big data, it is of practical significance to prevent loan risk by the machine learning algorithm. Aiming at the characteristics of unbalanced loan data and high noise, this paper proposes an improved Gray Wolf optimization strategy (PSOEBGWO). …”
Get full text
Get full text
Get full text
Article -
7
Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques
Published 2024“…Two methods were used to validate the proposed architecture, that is, the analytical method was used to validate the neuro-fuzzy risk assessment model and the safe path selection model, whereas the experimental method was used to evaluate the prototype. …”
thesis::doctoral thesis -
8
Credit Risk Assessment in P2P Lending Using LightGBM and Particle Swarm Optimization
Published 2023“…Machine learning algorithm such as LightGBM can be used to evaluate credit risk. …”
Get full text
Get full text
Get full text
Article -
9
Credit Risk Assessment in P2P Lending Using LightGBM and Particle Swarm Optimization
Published 2023“…Machine learning algorithm such as LightGBM can be used to evaluate credit risk. …”
Get full text
Get full text
Get full text
Article -
10
Credit Risk Assessment in P2P Lending Using LightGBM and Particle Swarm Optimization
Published 2023“…Machine learning algorithm such as LightGBM can be used to evaluate credit risk. …”
Get full text
Get full text
Get full text
Article -
11
Credit Risk Assessment in P2P Lending Using LightGBM and Particle Swarm Optimization
Published 2023“…Machine learning algorithm such as LightGBM can be used to evaluate credit risk. …”
Get full text
Get full text
Get full text
Article -
12
Credit Risk Assessment in P2P Lending Using LightGBM and Particle Swarm Optimization
Published 2023“…Machine learning algorithm such as LightGBM can be used to evaluate credit risk. …”
Get full text
Get full text
Get full text
Article -
13
Credit Risk Assessment in P2P Lending Using LightGBM and Particle Swarm Optimization
Published 2023“…Machine learning algorithm such as LightGBM can be used to evaluate credit risk. …”
Get full text
Get full text
Get full text
Article -
14
Multi-label risk diabetes complication prediction model using deep neural network with multi-channel weighted dropout
Published 2025“…The first experiment revealed that the Algorithm Adaptation framework outperformed Problem Transformation methods across most metrics. …”
Get full text
Get full text
Get full text
Thesis -
15
Data mining techniques for disease risk prediction model: A systematic literature review
Published 2023Conference Paper -
16
Modeling forest fires risk using spatial decision tree
Published 2011“…In addition, criteria evaluation and weighting method are most applied to evaluate the small problem containing few criteria. …”
Get full text
Get full text
Conference or Workshop Item -
17
A multi-objective portfolio selection model with fuzzy Value-at-Risk ratio
Published 2018“…Considering nonstatistical uncertainties and/or insufficient historical data in security return forecasts, fuzzy set theory has been applied in the past decades to build portfolio selection models. Meanwhile, various risk measurements such as variance, entropy and Value-at-Risk have been proposed in fuzzy environments to evaluate investment risks from different perspectives. …”
Get full text
Get full text
Article -
18
A multi-objective portfolio selection model with fuzzy Value-at-Risk ratio
Published 2018“…Considering nonstatistical uncertainties and/or insufficient historical data in security return forecasts, fuzzy set theory has been applied in the past decades to build portfolio selection models. Meanwhile, various risk measurements such as variance, entropy and Value-at-Risk have been proposed in fuzzy environments to evaluate investment risks from different perspectives. …”
Get full text
Get full text
Article -
19
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
20
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
Get full text
Get full text
Get full text
Thesis
