Search Results - (( java implication based algorithm ) OR ( risk mitigation using algorithm ))

Refine Results
  1. 1

    Quantitative and intelligent risk models in risk management for constructing software development projects: A review by Burairah, Hussin, Abdelrafe, Elzamly

    Published 2016
    “…Indeed, this area needs more effort from scholars and researchers in quantitative and intelligent risk models to mitigate risks. As future work, we will use these hybrid models of quantitative and intelligent for mitigating software risks in cloud computing such as neural network, genetic algorithm and others artificial intelligence techniques.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…Risk assessment matrices are widely used to evaluate risks related to such hazards. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Managing and controlling design process issues by using stepwise approach modelling by Abdelrafe, Elzamly, Burairah, Hussin, Norhaziah, Md Salleh, Abdul Samad, Shibghatullah

    Published 2016
    “…In addition, the software design process issues were controlled and modelled by using stepwise regression approach except risk 3. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Poverty risk prediction based on socioeconomic factors using machine learning approach by Mohd Zawari, Nur Farhana Adibah

    Published 2025
    “…This study seeks to develop a predictive model of measuring poverty risk using socioeconomic factors based on a machine learning framework. …”
    Get full text
    Get full text
    Student Project
  6. 6
  7. 7
  8. 8
  9. 9

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
    Get full text
    Get full text
    Article
  10. 10

    Assessment of the beach profile at Terengganu coastline / Emran Zaki Abdul Halim by Abdul Halim, Emran Zaki

    Published 2024
    “…The objectives include determining the beach profile of the Terengganu coastline using Google Earth in 2023, generating coastal slope estimates and beach profiles using a slope algorithm in 2023, and analyzing potential risk areas along the Kuala Terengganu to Marang coastline. …”
    Get full text
    Get full text
    Student Project
  11. 11

    Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region by Fanos, Ali Mutar

    Published 2016
    “…In this study, rockfall source areas were identified using multi-criteria method based on DEM derivates, terrain type or land use/cover (LULC) and high spatial resolution aerial photo (13cm). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. The objective of this study is to develop an accurate and efficient model capable of recognizing the presence of children in cars based on sound data. …”
    Get full text
    Get full text
    Student Project
  13. 13

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…This endeavor serves as a crucial initial step towards fortifying network security and mitigating the risks associated with network intrusion attacks.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Water level prediction using various machine learning algorithms: a case study of Durian Tunggal river, Malaysia by Ahmed A.N., Yafouz A., Birima A.H., Kisi O., Huang Y.F., Sherif M., Sefelnasr A., El-Shafie A.

    Published 2023
    “…A reliable model to predict the changes in the water levels in a river is crucial for better planning to mitigate any risk associated with flooding. In this study, six different Machine Learning (ML) algorithms were developed to predict the river�s water level, on a daily basis based on collected data from 1990 to 2019 which were used to train and test the proposed models. …”
    Article
  15. 15

    Image-based air quality estimation using convolutional neural network optimized by genetic algorithms: A multi-dataset approach by Khan, Arshad Ali, Mazlina, Abdul Majid, Dandoush, Abdulhalim

    Published 2025
    “…This paper proposes a new approach using convolutional neural networks with genetic algorithms for estimating air quality directly from images. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al... by Eka Wahyu, Aditya, Nur Haryani, Zakaria, Fazli, Azzali, Mohamad Nazim, Jambli

    Published 2024
    “…The authors equip readers with the knowledge to mitigate risks to ensure success in this complex human and computer synchronisation in the era of Industry 5.0. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  17. 17
  18. 18

    XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection by Bouke, Mohamed Aly, Alramli, Omar Imhemed, Abdullah, Azizol

    Published 2024
    “…However, these algorithms often suffer from the "black box" dilemma, a lack of transparency that hinders their applicability in security contexts where understanding the reasoning behind classifications is essential for effective risk assessment and mitigation strategies. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20