Search Results - risk mitigation using algorithm

Refine Results
  1. 1

    Quantitative and intelligent risk models in risk management for constructing software development projects: A review by Burairah, Hussin, Abdelrafe, Elzamly

    Published 2016
    “…Indeed, this area needs more effort from scholars and researchers in quantitative and intelligent risk models to mitigate risks. As future work, we will use these hybrid models of quantitative and intelligent for mitigating software risks in cloud computing such as neural network, genetic algorithm and others artificial intelligence techniques.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…Risk assessment matrices are widely used to evaluate risks related to such hazards. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Managing and controlling design process issues by using stepwise approach modelling by Abdelrafe, Elzamly, Burairah, Hussin, Norhaziah, Md Salleh, Abdul Samad, Shibghatullah

    Published 2016
    “…In addition, the software design process issues were controlled and modelled by using stepwise regression approach except risk 3. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Poverty risk prediction based on socioeconomic factors using machine learning approach by Mohd Zawari, Nur Farhana Adibah

    Published 2025
    “…This study seeks to develop a predictive model of measuring poverty risk using socioeconomic factors based on a machine learning framework. …”
    Get full text
    Get full text
    Student Project
  5. 5
  6. 6
  7. 7
  8. 8

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
    Get full text
    Get full text
    Article
  9. 9

    Assessment of the beach profile at Terengganu coastline / Emran Zaki Abdul Halim by Abdul Halim, Emran Zaki

    Published 2024
    “…The objectives include determining the beach profile of the Terengganu coastline using Google Earth in 2023, generating coastal slope estimates and beach profiles using a slope algorithm in 2023, and analyzing potential risk areas along the Kuala Terengganu to Marang coastline. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region by Fanos, Ali Mutar

    Published 2016
    “…In this study, rockfall source areas were identified using multi-criteria method based on DEM derivates, terrain type or land use/cover (LULC) and high spatial resolution aerial photo (13cm). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. The objective of this study is to develop an accurate and efficient model capable of recognizing the presence of children in cars based on sound data. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…This endeavor serves as a crucial initial step towards fortifying network security and mitigating the risks associated with network intrusion attacks.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Water level prediction using various machine learning algorithms: a case study of Durian Tunggal river, Malaysia by Ahmed A.N., Yafouz A., Birima A.H., Kisi O., Huang Y.F., Sherif M., Sefelnasr A., El-Shafie A.

    Published 2023
    “…A reliable model to predict the changes in the water levels in a river is crucial for better planning to mitigate any risk associated with flooding. In this study, six different Machine Learning (ML) algorithms were developed to predict the river�s water level, on a daily basis based on collected data from 1990 to 2019 which were used to train and test the proposed models. …”
    Article
  14. 14

    'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al... by Eka Wahyu, Aditya, Nur Haryani, Zakaria, Fazli, Azzali, Mohamad Nazim, Jambli

    Published 2024
    “…The authors equip readers with the knowledge to mitigate risks to ensure success in this complex human and computer synchronisation in the era of Industry 5.0. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  15. 15

    XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection by Bouke, Mohamed Aly, Alramli, Omar Imhemed, Abdullah, Azizol

    Published 2024
    “…However, these algorithms often suffer from the "black box" dilemma, a lack of transparency that hinders their applicability in security contexts where understanding the reasoning behind classifications is essential for effective risk assessment and mitigation strategies. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19

    Application of Gaussian Process Regression (GPR) in Gas Hydrate Mitigation by Suresh, S.D., Qasim, A., Lal, B., Imran, S.M., Foo, K.S.

    Published 2021
    “…To overcome this problem, machine learning algorithm has been introduced as part of risk management strategies. …”
    Get full text
    Get full text
    Article
  20. 20

    Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method by Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, Alghushami, Abdullah H., Alani, Sammer

    Published 2019
    “…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
    Get full text
    Get full text
    Get full text
    Book Chapter