Search Results - (( risk simulation using algorithm ) OR ( variable extraction method algorithm ))

Refine Results
  1. 1
  2. 2

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…The proposed method benchmarked with the state-of-the-art methods and achieved comparable results. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Optimizing timber transportation planning for timber harvesting using bees algorithm in Malaysia by Jamaluddin, Jamhuri, Kamarudin, Norizah, Ismail, Mohd Hasmadi, Ahmad, Siti Azfanizam

    Published 2023
    “…A Bees Algorithm (BA) was proposed to find an optimum TTP for timber extraction, forest road, and landing locations with grid cell-sized 10 m × 10 m and attributed with fixed and variable costs. …”
    Get full text
    Get full text
    Article
  5. 5

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…Wu dataset that consist of 1208 road images, which were extracted from videos recorded around California, the proposed algorithm performed satisfactorily. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Ensemble Dual Algorithm Using RBF Recursive Learning for Partial Linear Network by Md Akib, Afif, Saad, Nordin, Asirvadam, Vijanth

    Published 2011
    “…Relative mass released of the leakage is introduced as the input for the simulation model and the data from the simulation model is taken at real time (on-line) to feed into the recursive algorithms for updating the linear weight. …”
    Get full text
    Get full text
    Book Section
  7. 7

    Managing risk in production scheduling under uncertain disruption by Sarker, Ruhul, Essam, Daryl, Kamrul Hasan, S.M., Karim, A.N. Mustafizul

    Published 2015
    “…In this paper, we have studied JSPs under sudden machine breakdown scenarios that introduce a risk of not completing the jobs on time. We have first solved JSPs using an improved memetic algorithm and extended the algorithm to deal with the disruption situations, and then developed a simulation model to analyze the risk of using a job order and delivery scenario. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Enhancing reservoir operations with charged system search (CSS) algorithm: Accounting for sediment accumulation and multiple scenarios by Almubaidin M.A.A., Ahmed A.N., Malek M.A., Mahmoud M.A., Sherif M., El-Shafie A.

    Published 2025
    “…Optimization methods vary depending on objectives, reservoir type, and algorithms used. The paper utilizes the CSS algorithm to study the impact of various scenarios on the optimal operation of the Mujib reservoir in Jordan to reduce water deficits using historical date between 2004 and 2019. …”
    Article
  9. 9

    Competing risks for reliability analysis using Cox’s model by Mohamed Elfaki, Faiz Ahmed, Daud, Isa, Ibrahim, Nor Azowa, Abdullah, M. Y., Usman, Mustofa

    Published 2007
    “…Originality/value – A modification of the two competing risk models has mostly been applied in failure time data and simulation data. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Slice sampler algorithm for generalized pareto distribution by Rostami, Mohammad, Adam, Mohd Bakri, Yahya, Mohamed Hisham, Ibrahim, Noor Akma

    Published 2018
    “…The results were compared with another commonly used Markov chain Monte Carlo (MCMC) technique called Metropolis-Hastings algorithm. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Algorithm comparison for data mining classification: assessing bank customer credit scoring default risk by Elaf Adel Abbas, Nisreen Abbas Hussein

    Published 2024
    “…Thus, every business must appropriately identify debtors and non-debtors. This study uses machine learning approaches to simulate consumer credit risk and compares the results to the logistic model, determining if machine learning improves client default ratings. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC by Jamil, Nur Farahim

    Published 2014
    “…This project proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
    text::Thesis
  17. 17

    Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks by Mohammed Omer, Anwar

    Published 1999
    “…In this study, Monte Carlo simulation as a tool of risk analysis was used. The merge event bias as one of the essential problems associated with PERT is discussed, along with models and approaches developed by other researchers, namely, Probabilistic Network Evaluation Technique (PNET algorithm), Modified PNET, Back-Forward Uncertainly Estimation procedure (BFUE) and concept based on the robust reliability idea. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli by Seyed Hamidreza , Aghay Kaboli

    Published 2018
    “…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…The methodology starts with literature comprehension studies on the computation pitfalls and existed augmentation studies of Simplex algorithm. Then, followed by concept development which consists of concept extraction, computation stages classification and algorithms integration. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This reserarch adapted a methodology of computer vision and algorithms that exploit image segmentation, feature extraction and fuzzy classification to guide the research activities. …”
    Get full text
    Get full text
    Thesis