Search Results - risk estimation methods algorithm
Search alternatives:
- estimation methods »
- methods algorithm »
- risk estimation »
-
1
Credit scoring for Cooperative of financial services using logistic regression estimated by genetic algorithm
Published 2014“…In this paper the analysis of credit scoring is done using logistic regression model, which is estimated using genetic algorithms. As a numerical illustration, the method used to analyze the credit scoring on a cooperative of financial services in Indonesia. …”
Get full text
Get full text
Article -
2
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…The warppartial least square method was utilized to estimate the multi-layer hypothesized path model. …”
Get full text
Get full text
Thesis -
3
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…The RASH algorithm is defined by overall risk, which is equivalent to the sum of Risk Safety Safety, Risk Safety Health, Risk Health Safety, and Risk Health Health. …”
Get full text
Get full text
Thesis -
4
Bayesian logistic regression model on risk factors of type 2 diabetes mellitus
Published 2016“…The significant variables determined by maximum likelihood method were then estimated using the BLR method. The BLR approach via Gibbs sampler and the random walk metropolis algorithm suggests that family history of diabetes, waist circumference and the body mass index are the significant risk factors associated with the type 2 diabetes mellitus. …”
Get full text
Get full text
Thesis -
5
Em Approach on Influence Measures in Competing Risks Via Proportional Hazard Regression Model
Published 2000“…The Expectation Maximization (EM) was considered to obtain the estimate of the parameters. These estimates were then compared to the Newton-Raphson iteration method. …”
Get full text
Get full text
Thesis -
6
A Risk Assessment of Transmission Line Overload Based on MLSI/PSO
Published 2019“…Based on the traditional partial swarm optimization algorithm, the corresponding weights are selected according to the influence factors of each input quantity, and the calculation accuracy of the traditional point estimation method is improved to realize the overload risk assessment of transmission lines. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Block Matching Algorithm (BMA) is a technique used to minimize the computational complexity of motion estimation in video coding application. …”
Get full text
Get full text
Thesis -
8
Modeling Earthquake Bond Prices with Correlated Dual Trigger Indices and the Approximate Solution Using the Monte Carlo Algorithm
Published 2025journal::journal article -
9
Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming
Published 2022“…This article explores the efficiency of the visual sensor placement based on a combination of two methods namely, a deterministic risk estimation for the risk assessment and a dynamic programming for optimizing the placement of surveillance cameras. …”
Get full text
Get full text
Article -
10
Assessment of the beach profile at Terengganu coastline / Emran Zaki Abdul Halim
Published 2024“…The method for determining the beach profile in this study involves using Google Earth Pro to extract beach profile conditions, while a coastal slope estimation algorithm will be employed for detailed in-situ analysis. …”
Get full text
Get full text
Student Project -
11
Data mining techniques for disease risk prediction model: A systematic literature review
Published 2023Conference Paper -
12
Entropy in portfolio optimization / Yasaman Izadparast Shirazi
Published 2017“…Details of the algorithms which include entropy estimation which would enhance the application of a proper risk measure like entropy, is provided. …”
Get full text
Get full text
Get full text
Thesis -
13
Extreme air pollutant data analysis using classical and Bayesian approaches
Published 2015“…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
Get full text
Get full text
Thesis -
14
Statistical process control for failure crushing time data using competing risks model
Published 2011“…EM algorithm method is used to estimate the parameter of the model. …”
Get full text
Get full text
Get full text
Article -
15
Statistical process control for failure crushing time data using competing risks model.
Published 2011“…EM algorithm method is used to estimate the parameter of the model. …”
Get full text
Get full text
Get full text
Article -
16
Full waveform inversion based on genetic local search algorithm with hybrid-grid scheme
Published 2019“…Therefore, we propose an FWI method based on genetic local search algorithm with hybrid-grid scheme (HGLS-FWI). …”
Get full text
Get full text
Conference or Workshop Item -
17
Radiation dose, cancer risk and diagnostic performance of computed tomography pulmonary angiography examination
Published 2021“…Organ dose and cancer risk were estimated by the CT-EXPO (Ver 2.5.1, Germany) and recommendation from the International Commission on Radiological Protection Publication (ICRP) 103 report respectively according to the primary beam. …”
Get full text
Get full text
Thesis -
18
Reproducing kernel Hilbert space method for cox proportional hazard model
Published 2016“…Then, we apply the kernel method to the survival data. Finally, we propose an algorithm of minimization of the loss function in the general Cox model. …”
Get full text
Get full text
Get full text
Thesis -
19
Competing risks for reliability analysis using Cox’s model
Published 2007“…This paper seeks to show that, with a large sample size based on expectation maximization (EM) algorithm, both models give similar results. Design/methodology/approach – The parameters of the models have been estimated by method of maximum likelihood based on EM algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Steady state security analysis using artificial neural network
Published 2008“…The cases where operating violations are observed are considered as alert , while the cases for which the load flow algorithm exhibits a diverging algorithmically solution, are considered as emergency. …”
Get full text
Get full text
Student Project
