Search Results - (( risk simulation using algorithm ) OR ( variable extraction method algorithm ))
Search alternatives:
- variable extraction »
- extraction method »
- simulation using »
- method algorithm »
- risk simulation »
- using algorithm »
-
1
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The feature extraction methods evaluated were Grayscale Pixel Values, Mean Pixel Value of Channels, and Extracting Edge Features. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…The proposed method benchmarked with the state-of-the-art methods and achieved comparable results. …”
Get full text
Get full text
Thesis -
3
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024journal::journal article -
4
Optimizing timber transportation planning for timber harvesting using bees algorithm in Malaysia
Published 2023“…A Bees Algorithm (BA) was proposed to find an optimum TTP for timber extraction, forest road, and landing locations with grid cell-sized 10 m × 10 m and attributed with fixed and variable costs. …”
Get full text
Get full text
Article -
5
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…Wu dataset that consist of 1208 road images, which were extracted from videos recorded around California, the proposed algorithm performed satisfactorily. …”
Get full text
Get full text
Get full text
Thesis -
6
Ensemble Dual Algorithm Using RBF Recursive Learning for Partial Linear Network
Published 2011“…Relative mass released of the leakage is introduced as the input for the simulation model and the data from the simulation model is taken at real time (on-line) to feed into the recursive algorithms for updating the linear weight. …”
Get full text
Get full text
Book Section -
7
Managing risk in production scheduling under uncertain disruption
Published 2015“…In this paper, we have studied JSPs under sudden machine breakdown scenarios that introduce a risk of not completing the jobs on time. We have first solved JSPs using an improved memetic algorithm and extended the algorithm to deal with the disruption situations, and then developed a simulation model to analyze the risk of using a job order and delivery scenario. …”
Get full text
Get full text
Get full text
Article -
8
Enhancing reservoir operations with charged system search (CSS) algorithm: Accounting for sediment accumulation and multiple scenarios
Published 2025“…Optimization methods vary depending on objectives, reservoir type, and algorithms used. The paper utilizes the CSS algorithm to study the impact of various scenarios on the optimal operation of the Mujib reservoir in Jordan to reduce water deficits using historical date between 2004 and 2019. …”
Article -
9
Competing risks for reliability analysis using Cox’s model
Published 2007“…Originality/value – A modification of the two competing risk models has mostly been applied in failure time data and simulation data. …”
Get full text
Get full text
Get full text
Article -
10
Slice sampler algorithm for generalized pareto distribution
Published 2018“…The results were compared with another commonly used Markov chain Monte Carlo (MCMC) technique called Metropolis-Hastings algorithm. …”
Get full text
Get full text
Article -
11
-
12
Algorithm comparison for data mining classification: assessing bank customer credit scoring default risk
Published 2024“…Thus, every business must appropriately identify debtors and non-debtors. This study uses machine learning approaches to simulate consumer credit risk and compares the results to the logistic model, determining if machine learning improves client default ratings. …”
Get full text
Get full text
Get full text
Article -
13
A novel theoretical and practical methodology for extracting the parameters of the single and double diode Photovoltaic models
Published 2022“…However, there is no method to date that can guarantee the extracted parameter of the PV model is the most accurate one. …”
Get full text
Get full text
Article -
14
The impact of the combat method on radiomics feature compensation and analysis of scanners from different manufacturers
Published 2024“…Conclusions: The Combat algorithm has reduced variability in radiomic features from different scanners. …”
Get full text
Get full text
Get full text
Article -
15
HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC
Published 2014“…This project proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
Get full text
Get full text
Final Year Project -
16
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
text::Thesis -
17
Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks
Published 1999“…In this study, Monte Carlo simulation as a tool of risk analysis was used. The merge event bias as one of the essential problems associated with PERT is discussed, along with models and approaches developed by other researchers, namely, Probabilistic Network Evaluation Technique (PNET algorithm), Modified PNET, Back-Forward Uncertainly Estimation procedure (BFUE) and concept based on the robust reliability idea. …”
Get full text
Get full text
Thesis -
18
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
Get full text
Get full text
Get full text
Thesis -
19
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…The methodology starts with literature comprehension studies on the computation pitfalls and existed augmentation studies of Simplex algorithm. Then, followed by concept development which consists of concept extraction, computation stages classification and algorithms integration. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This reserarch adapted a methodology of computer vision and algorithms that exploit image segmentation, feature extraction and fuzzy classification to guide the research activities. …”
Get full text
Get full text
Thesis
