Search Results - (( risk estimation method algorithm ) OR ( java application system algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Credit scoring for Cooperative of financial services using logistic regression estimated by genetic algorithm by Mustafa, Mamat, Sukono, Firman, Asep, Sholahuddin

    Published 2014
    “…In this paper the analysis of credit scoring is done using logistic regression model, which is estimated using genetic algorithms. As a numerical illustration, the method used to analyze the credit scoring on a cooperative of financial services in Indonesia. …”
    Get full text
    Get full text
    Article
  5. 5

    Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score by Mirza Rizwan, Sajid

    Published 2021
    “…The warppartial least square method was utilized to estimate the multi-layer hypothesized path model. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9
  10. 10
  11. 11

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…The RASH algorithm is defined by overall risk, which is equivalent to the sum of Risk Safety Safety, Risk Safety Health, Risk Health Safety, and Risk Health Health. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Bayesian logistic regression model on risk factors of type 2 diabetes mellitus by Chiaka, Emenyonu Sandra

    Published 2016
    “…The significant variables determined by maximum likelihood method were then estimated using the BLR method. The BLR approach via Gibbs sampler and the random walk metropolis algorithm suggests that family history of diabetes, waist circumference and the body mass index are the significant risk factors associated with the type 2 diabetes mellitus. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Em Approach on Influence Measures in Competing Risks Via Proportional Hazard Regression Model by Elfaki, Faiz. A. M.

    Published 2000
    “…The Expectation Maximization (EM) was considered to obtain the estimate of the parameters. These estimates were then compared to the Newton-Raphson iteration method. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A Risk Assessment of Transmission Line Overload Based on MLSI/PSO by Ruhaizad, Ishak, Ali, A., Nazir, Muhammad S., Malik, Muhammad Z.

    Published 2019
    “…Based on the traditional partial swarm optimization algorithm, the corresponding weights are selected according to the influence factors of each input quantity, and the calculation accuracy of the traditional point estimation method is improved to realize the overload risk assessment of transmission lines. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…Block Matching Algorithm (BMA) is a technique used to minimize the computational complexity of motion estimation in video coding application. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis
  19. 19

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project