Search Results - (( risk reduction using algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- reduction using »
- using algorithm »
- java adaptation »
- risk reduction »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
A Hybrid Adaptive Leadership GWO Optimization with Category Gradient Boosting on Decision Trees Algorithm for Credit Risk Control Classification
Published 2024“…However, compared with the traditional risk control algorithm (logistic regression algorithm), CatBoost algorithm also needs to have the advantages of high efficiency, low algorithm complexity and strong interpretable ability. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The Speeded-Up Robust Features (SURF) Algorithms is used to determine the interest points. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Backward reduction application for minimizing wind power scenarios in stochastic programming
Published 2023“…The algorithm determines a subset from the initial scenario set and assigns new probabilities to the preserved scenarios. …”
Conference Paper -
5
Preprocessing Noise Reduction For Assistive Listening System
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Modeling And Control Of V-Groove Rotary Impact Driver
Published 2020“…The purpose of doing the latter is to verify the developed algorithm so that it does not have risk of overrun on defined solver fixed time step. …”
Get full text
Get full text
Thesis -
7
Investigation of dimensionality reduction in a finger vein verification system
Published 2018“…The vein pattern was extracted using repeated line tracking and dimensionality reduction using principal components analysis to generate the feature vector. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
Get full text
Get full text
Thesis -
10
Optimizing sentiment analysis of Indonesian texts: Enhancing deep learning models with genetic algorithm-based feature selection
Published 2024“…This study examines the optimization of Indonesian text sentiment analysis through the integration of feature selection using a genetic algorithm (GA) with deep learning models. …”
Get full text
Get full text
Get full text
Article -
11
A fuzzy multi-objective optimisation model of risk-based gas detector placement methodology for explosion protection in oil and gas facilities
Published 2022“…By using mixed-integer linear programming (MILP) formulation, the number of detectors needed are lower with higher risk reductions compared to the GA formulation. …”
Get full text
Get full text
Article -
12
Classification of SNPs for obesity analysis using FARNeM modelling
Published 2013“…In this paper, we investigated feature selection process in obesity related SPNs analysis using Forward attribute reduction based on neighbourhood rough set model (FARNeM). …”
Get full text
Get full text
Conference or Workshop Item -
13
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. The objective of this study is to develop an accurate and efficient model capable of recognizing the presence of children in cars based on sound data. …”
Get full text
Get full text
Student Project -
14
Lithium-ion battery charge equalization algorithm for electric vehicle applications
Published 2023Conference Paper -
15
Methane plume localization with enhanced self-best reduction and Gaussian improved particle swarm optimization (GiPSO)
Published 2024“…Our research employs Gaussian improved Particle Swarm Optimization (GiPSO), derived from modifications implemented on Particle Swarm Optimization (PSO) with Z-axis coefficient clamping and Self-Best reduction mechanism. Z-axis coefficient Clamping provides safety and reduction of drone swarm controlled by GiPSO risk, with the physical collision with the petroleum refinery exhaust. …”
Get full text
Get full text
Thesis -
16
Radiation dose, cancer risk and diagnostic performance of computed tomography pulmonary angiography examination
Published 2021“…Hence, this study aims to evaluate the radiation dose, cancer risk and image diagnostic performance of CTPA examination regarding primary and secondary optimization such as iterative reconstruction (IR) algorithm, tube potential and pitch factor selection. …”
Get full text
Get full text
Thesis -
17
An enhanced supplier selection model based on optimized analytic network process towards sustainable information technology outsourcing
Published 2022“…The first has nineteen (19) sustainability criteria and seven (7) risk factors. While the latter is an enhanced ANP with Firefly Algorithm (ANP-FA). …”
Get full text
Get full text
Get full text
Thesis -
18
CT reconstruction algorithm and low contrast detectability of phantom study: a systematic review and meta-analysis
Published 2022“…Results: The dichotomous outcomes were chosen to represent the results in terms of risk ratio as per meta-analysis study. Notably, the noise in iterative reconstruction (IR) reduced by 24%, 33% and 36% with the use of smooth, medium and sharp filters, respectively. …”
Get full text
Get full text
Article -
19
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Most of researches in IDS which use k-centroids-based clustering methods like K-means, K-medoids, Fuzzy, Hierarchical and agglomerative algorithms to baseline network traffic suffer from high false positive rate compared to signature-based IDS, simply because the nature of these algorithms risk to force some network traffic into wrong profiles depending on K number of clusters needed. …”
Get full text
Get full text
Get full text
Article -
20
