Search Results - risk mitigation using algorithm
Search alternatives:
- mitigation using »
- using algorithm »
-
1
Quantitative and intelligent risk models in risk management for constructing software development projects: A review
Published 2016“…Indeed, this area needs more effort from scholars and researchers in quantitative and intelligent risk models to mitigate risks. As future work, we will use these hybrid models of quantitative and intelligent for mitigating software risks in cloud computing such as neural network, genetic algorithm and others artificial intelligence techniques.…”
Get full text
Get full text
Get full text
Get full text
Article -
2
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…Risk assessment matrices are widely used to evaluate risks related to such hazards. …”
Get full text
Get full text
Thesis -
3
Managing and controlling design process issues by using stepwise approach modelling
Published 2016“…In addition, the software design process issues were controlled and modelled by using stepwise regression approach except risk 3. …”
Get full text
Get full text
Get full text
Article -
4
Poverty risk prediction based on socioeconomic factors using machine learning approach
Published 2025“…This study seeks to develop a predictive model of measuring poverty risk using socioeconomic factors based on a machine learning framework. …”
Get full text
Get full text
Student Project -
5
-
6
Modeling Earthquake Bond Prices with Correlated Dual Trigger Indices and the Approximate Solution Using the Monte Carlo Algorithm
Published 2025journal::journal article -
7
Modelling of default risk for home credit data using machine learning approach
Published 2022Get full text
Thesis -
8
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
9
Assessment of the beach profile at Terengganu coastline / Emran Zaki Abdul Halim
Published 2024“…The objectives include determining the beach profile of the Terengganu coastline using Google Earth in 2023, generating coastal slope estimates and beach profiles using a slope algorithm in 2023, and analyzing potential risk areas along the Kuala Terengganu to Marang coastline. …”
Get full text
Get full text
Student Project -
10
Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region
Published 2016“…In this study, rockfall source areas were identified using multi-criteria method based on DEM derivates, terrain type or land use/cover (LULC) and high spatial resolution aerial photo (13cm). …”
Get full text
Get full text
Thesis -
11
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. The objective of this study is to develop an accurate and efficient model capable of recognizing the presence of children in cars based on sound data. …”
Get full text
Get full text
Student Project -
12
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…This endeavor serves as a crucial initial step towards fortifying network security and mitigating the risks associated with network intrusion attacks.…”
Get full text
Get full text
Thesis -
13
Water level prediction using various machine learning algorithms: a case study of Durian Tunggal river, Malaysia
Published 2023“…A reliable model to predict the changes in the water levels in a river is crucial for better planning to mitigate any risk associated with flooding. In this study, six different Machine Learning (ML) algorithms were developed to predict the river�s water level, on a daily basis based on collected data from 1990 to 2019 which were used to train and test the proposed models. …”
Article -
14
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al...
Published 2024“…The authors equip readers with the knowledge to mitigate risks to ensure success in this complex human and computer synchronisation in the era of Industry 5.0. …”
Get full text
Get full text
Get full text
Book Chapter -
15
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection
Published 2024“…However, these algorithms often suffer from the "black box" dilemma, a lack of transparency that hinders their applicability in security contexts where understanding the reasoning behind classifications is essential for effective risk assessment and mitigation strategies. …”
Get full text
Get full text
Get full text
Article -
16
Predicting building damage grade by earthquake: a Bayesian Optimization-based comparative study of machine learning algorithms
Published 2024“…The proposed model can successfully use for earthquake risk assessment and mitigation.…”
Get full text
Get full text
Article -
17
'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T...
Published 2024“…The authors equip readers with the knowledge to mitigate risks to ensure success in this complex human and computer synchronisation in the era of Industry 5.0. …”
Get full text
Get full text
Get full text
Book Chapter -
18
-
19
Application of Gaussian Process Regression (GPR) in Gas Hydrate Mitigation
Published 2021“…To overcome this problem, machine learning algorithm has been introduced as part of risk management strategies. …”
Get full text
Get full text
Article -
20
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter
