Search Results - (( java implication force algorithm ) OR ( based operational risk algorithm ))

Refine Results
  1. 1

    Utilizing self-organization systems for modeling and managing risk based on maintenance and repair in petrochemical industries by Jaderi, Fereshteh, Ibrahim, Zelina Zaiton, Nikoo, Mehdi, Nikoo, Mohammad

    Published 2018
    “…Networks used in this study are self-organizing networks with constant weight, which include Kohonen networks. For this purpose, operation impact, operation flexibility, maintenance cost, impact of safety and environment and frequency parameters had been considered as input; and using this model, the risk level is calculated. …”
    Get full text
    Get full text
    Article
  2. 2

    Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam by Lai, Vivien Mei Yen

    Published 2023
    “…The results obtained for year 1987 - 2008 assessments showed the proposed MHAs as an optimistic conclusion for the dam operator to consider based on the trade-off between reliability and resilience or other reservoir risk indices. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Optimal water supply reservoir operation by leveraging the meta-heuristic Harris Hawks algorithms and opposite based learning technique by Lai V., Huang Y.F., Koo C.H., Ahmed A.N., Sherif M., El-Shafie A.

    Published 2024
    “…In this study, an attempt via metaheuristic algorithms, namely the Harris Hawks Optimisation (HHO) Algorithm and the Opposite Based Learning of HHO (OBL-HHO) are made to minimise the water deficit as well as mitigate floods at downstream of the Klang Gate Dam (KGD). …”
    Article
  4. 4

    Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques by Salem S. M. Khalifa

    Published 2024
    “…Fuzzy arithmetic operations on fuzzy numbers and artificial neural networks with a back-propagation learning algorithm were used to represent the structure of the neuro-fuzzy risk assessment model, whereas genetic algorithms were used to develop the safe path selection model. …”
    thesis::doctoral thesis
  5. 5

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Steady state security analysis using artificial neural network by Mohd Nor, Nurul Huda

    Published 2008
    “…Steady state security analysis aims at assessing the risk a contingency would entail for an electrical network operating at a certain point. …”
    Get full text
    Get full text
    Student Project
  8. 8
  9. 9
  10. 10

    Development of an explainable machine learning model for predicting depression in adults with type 2 diabetes mellitus: a cross-sectional SHAP-based analysis of NHANES 2009-2023 by Tang, Yan, Jia, Lei, Zhou, Junjun, Dou, Jin, Qian, Jingjuan, Yi, Xin, Soh, Kim Lam

    Published 2026
    “…A streamlined version incorporating the top 10 predictors was further developed and implemented as a user-friendly web-based risk estimation tool. Among 2837 participants, 449 (15.8%) were identified as having comorbid DEP. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming by Altahir, A.A., Asirvadam, V.S., Sebastian, P., Hamid, N.H.B., Ahmed, E.F.

    Published 2022
    “…Then, the dynamic programming algorithm operates on security quantified maps rather than uniform grids. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Application of the Whale Optimization Algorithm (WOA) in Reservoir Optimization Operation Under Investigation of Climate Change Impact: A Case Study at Klang Gate Dam, Malaysia by Lai V., Huang Y.F., Koo C.H., Ahmed A.N., El-Shafie A.

    Published 2024
    “…The effectiveness of analyzing large amounts of data that comes with engaging climate change scenarios, for planning advanced reservoir management can be achieved through the use of optimization algorithms. The Whale Optimization Algorithm (WOA) is a swarm intelligence algorithm derived following animal-behaviour-based concepts. …”
    Conference Paper
  14. 14

    Modelling of clinical risk groups (CRGs) classification using FAM by Mohd. Asi, Salina, Saad, Puteh

    Published 2006
    “…CRGs based risk adjustment system is a potential risks adjustment to be used in the capitation-based payment system, a budgetary system for healthcare resource and care management [I. 2. 3]. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Enhanced Community Detection Based On Cross Time For Higher Visibility In Supply Chain: A Six-Steps Model Framework by Abal Abas, Zuraida, Mohd Zaki, Nurul Hafizah, Asmai, Siti Azirah, Abdul Rahman, Ahmad Fadzli Nizam, Zainal Abidin, Zaheera

    Published 2019
    “…Increasing the visibility in supply chain network had decrease the risk in industries. However, the current Cross-Time approach for temporal community detection algorithm in the visibility has fix number of communities and lack of operation such as split or merge. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Research on risk detection of autonomous vehicle based on rapidly-exploring random tree by Yincong Ma, Lim, Kit Guan, Tan, Min Keng, Sin, Helen Ee Chuo, Ali Farzamnia, Tze, Kenneth Kin Teo

    Published 2023
    “…Although it has been applied in many fields, there are still some problems, such as low efficiency of path planning and collision risk during driving. In order to solve these problems, an automotive vehicle-based rapid exploration random tree (AV-RRT)-based non-particle path planning method for autonomous vehicles is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Video surveillance: Item monitoring against theft by Chong, Yiing Sheah

    Published 2023
    “…All the mentioned counters will be set to 0 if the conditions specified are not met. Based on the predetermined conditions for each type of risk, the appropriate alarms will be activated while a risk occurs. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Inertial sensor-based instrumented cane for real-time walking cane kinematics estimation by Fernandez, Ibai Gorordo, Ahmad, Siti Anom, Wada, Chikamune

    Published 2020
    “…Balance and mobility impairment are major indicators of fall risk in this group. The objective of this research was to develop a fall risk feedback system that operates in real time using an inertial sensor-based instrumented cane. …”
    Get full text
    Get full text
    Get full text
    Article