Search Results - risk estimation methods algorithm

Refine Results
  1. 1

    Credit scoring for Cooperative of financial services using logistic regression estimated by genetic algorithm by Mustafa, Mamat, Sukono, Firman, Asep, Sholahuddin

    Published 2014
    “…In this paper the analysis of credit scoring is done using logistic regression model, which is estimated using genetic algorithms. As a numerical illustration, the method used to analyze the credit scoring on a cooperative of financial services in Indonesia. …”
    Get full text
    Get full text
    Article
  2. 2

    Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score by Mirza Rizwan, Sajid

    Published 2021
    “…The warppartial least square method was utilized to estimate the multi-layer hypothesized path model. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…The RASH algorithm is defined by overall risk, which is equivalent to the sum of Risk Safety Safety, Risk Safety Health, Risk Health Safety, and Risk Health Health. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Bayesian logistic regression model on risk factors of type 2 diabetes mellitus by Chiaka, Emenyonu Sandra

    Published 2016
    “…The significant variables determined by maximum likelihood method were then estimated using the BLR method. The BLR approach via Gibbs sampler and the random walk metropolis algorithm suggests that family history of diabetes, waist circumference and the body mass index are the significant risk factors associated with the type 2 diabetes mellitus. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Em Approach on Influence Measures in Competing Risks Via Proportional Hazard Regression Model by Elfaki, Faiz. A. M.

    Published 2000
    “…The Expectation Maximization (EM) was considered to obtain the estimate of the parameters. These estimates were then compared to the Newton-Raphson iteration method. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A Risk Assessment of Transmission Line Overload Based on MLSI/PSO by Ruhaizad, Ishak, Ali, A., Nazir, Muhammad S., Malik, Muhammad Z.

    Published 2019
    “…Based on the traditional partial swarm optimization algorithm, the corresponding weights are selected according to the influence factors of each input quantity, and the calculation accuracy of the traditional point estimation method is improved to realize the overload risk assessment of transmission lines. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…Block Matching Algorithm (BMA) is a technique used to minimize the computational complexity of motion estimation in video coding application. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming by Altahir, A.A., Asirvadam, V.S., Sebastian, P., Hamid, N.H.B., Ahmed, E.F.

    Published 2022
    “…This article explores the efficiency of the visual sensor placement based on a combination of two methods namely, a deterministic risk estimation for the risk assessment and a dynamic programming for optimizing the placement of surveillance cameras. …”
    Get full text
    Get full text
    Article
  10. 10

    Assessment of the beach profile at Terengganu coastline / Emran Zaki Abdul Halim by Abdul Halim, Emran Zaki

    Published 2024
    “…The method for determining the beach profile in this study involves using Google Earth Pro to extract beach profile conditions, while a coastal slope estimation algorithm will be employed for detailed in-situ analysis. …”
    Get full text
    Get full text
    Student Project
  11. 11
  12. 12

    Entropy in portfolio optimization / Yasaman Izadparast Shirazi by Yasaman Izadparast, Shirazi

    Published 2017
    “…Details of the algorithms which include entropy estimation which would enhance the application of a proper risk measure like entropy, is provided. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Extreme air pollutant data analysis using classical and Bayesian approaches by Mohd Amin, Nor Azrita

    Published 2015
    “…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Full waveform inversion based on genetic local search algorithm with hybrid-grid scheme by Hamamoto, M., Rahim Md Arshad, A., Prasad Ghosh, D.

    Published 2019
    “…Therefore, we propose an FWI method based on genetic local search algorithm with hybrid-grid scheme (HGLS-FWI). …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Radiation dose, cancer risk and diagnostic performance of computed tomography pulmonary angiography examination by Haspi Harun, Hanif

    Published 2021
    “…Organ dose and cancer risk were estimated by the CT-EXPO (Ver 2.5.1, Germany) and recommendation from the International Commission on Radiological Protection Publication (ICRP) 103 report respectively according to the primary beam. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Reproducing kernel Hilbert space method for cox proportional hazard model by Abdul Manaf, Nur'azah

    Published 2016
    “…Then, we apply the kernel method to the survival data. Finally, we propose an algorithm of minimization of the loss function in the general Cox model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Competing risks for reliability analysis using Cox’s model by Mohamed Elfaki, Faiz Ahmed, Daud, Isa, Ibrahim, Nor Azowa, Abdullah, M. Y., Usman, Mustofa

    Published 2007
    “…This paper seeks to show that, with a large sample size based on expectation maximization (EM) algorithm, both models give similar results. Design/methodology/approach – The parameters of the models have been estimated by method of maximum likelihood based on EM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Steady state security analysis using artificial neural network by Mohd Nor, Nurul Huda

    Published 2008
    “…The cases where operating violations are observed are considered as alert , while the cases for which the load flow algorithm exhibits a diverging algorithmically solution, are considered as emergency. …”
    Get full text
    Get full text
    Student Project