Search Results - risk optimization ((((method algorithm) OR (sensor algorithm))) OR (means algorithm))

Refine Results
  1. 1

    Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming by Altahir, A.A., Asirvadam, V.S., Sebastian, P., Hamid, N.H.B., Ahmed, E.F.

    Published 2022
    “…This article explores the efficiency of the visual sensor placement based on a combination of two methods namely, a deterministic risk estimation for the risk assessment and a dynamic programming for optimizing the placement of surveillance cameras. …”
    Get full text
    Get full text
    Article
  2. 2

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…Finally, the proposed algorithm’s effectiveness regarding node coverage, energy consumption, Pareto-optimal value, and algorithm execution time is validated using three Pareto-optimal metrics: including inverted generation distance (IGD), hypervolume, and diversity. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks by Salmah Fattah

    Published 2022
    “…Finally, the proposed algorithm's effectiveness regarding node coverage, energy consumption, Pareto-optimal value, and algorithm execution time is validated using three Pareto-optimal metrics: including inverted generation distance (IGD), hypervolume, and diversity. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Clustering Methods For Cluster-Based Routing Protocols In Wireless Sensor Networks: Comparative Study by Hassan, Ali Abdul Hussian, Md Shah, Wahidah, Jabbar Mohammed, Ali Abdul, Othman, Mohd Fairuz Iskandar

    Published 2017
    “…So, the energy-efficient routing protocols are very necessary and considers vital task for sensors networks. Various approaches of clustering algorithms are used to optimize the energy of routing protocols. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Integrated deep learning for cardiovascular risk assessment and diagnosis: An evolutionary mating algorithm-enhanced CNN-LSTM by Ahmed Alsarori, Ahmed Mohammed, Mohd Herwan, Sulaiman

    Published 2025
    “…The EMA-based model achieved superior results, with a Mean Absolute Error (MAE) of 0.018, Mean Squared Error (MSE) of 0.0006, Root Mean Squared Error (RMSE) of 0.024, and a coefficient of determination (R²) of 0.98 for risk prediction. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    An Empirical Study on the Construction of A Non-Convex Risk Parity Portfolio using a Genetic Algorithm by Kusumawati, Rosita, Rosadi, Dedi, Abdurakhman, Abdurakhman

    Published 2025
    “…Risk-based portfolio optimization has become increasingly crucial due to the limitations and underperformance of traditional Mean-Variance (MV) portfolios. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…This proposed algorithm is developed based on heuristic method named modified binary particle swarm optimization (MBPSO) with kernel fuzzy clustering method as a fitness function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Classification Algorithms and Feature Selection Techniques for a Hybrid Diabetes Detection System by Al-Hameli, Bassam Abdo, Alsewari, Abdulrahman A., Alraddadi, Abdulaziz Saleh, Aldhaqm, Arafat

    Published 2021
    “…Several combinations of Harmony search algorithm, genetic algorithm, and particle swarm optimization algorithm are examined with K-means for feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Machine learning-based anomaly detection in NFV: a comprehensive survey by Sehar Zehra, Ummay Faseeha, Hassan Jamil Syed, Fahad Samad, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…It proposes the utilization of anomaly detection techniques as a means to mitigate the potential risks of cyber attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Improving earth surface temperature forecasting through the optimization of deep learning hyper-parameters using barnacles mating optimizer by Zuriani, Mustaffa, Mohd Herwan, Sulaiman, Muhammad 'Arif, Mohamad

    Published 2024
    “…To improve the DL model's performance, an optimization algorithm called Barnacles Mating Optimizer (BMO) is integrated to optimize both weights and biases. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Petroleum Refinery Planning Under Uncertainty: A Multiobjective Optimization Approach with Economic and Operational Risk Management by Van Fu Shen, Fu Shen

    Published 2009
    “…The two stage stochastic risk model is then reformulated using Mean Absolute Deviation as the risk measure. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Petroleum Refinery Planning Under Uncertainty: A Multiobjective Optimization Approach with Economic and Operational Risk Management by Van, Fu Shen

    Published 2009
    “…The two stage stochastic risk model is then reformulated using MeanAbsolute Deviation as the risk measure. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Metacarpal phantom radiograph edge detection using genetic algorithm gradient based genotype / Norharyati Md Ariff by Md Ariff, Norharyati

    Published 2007
    “…For the image segmentation, genetic algorithm are use to segment the bone image and it is a new method that applies in the image processing field. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana by Hatungimana, Gervais

    Published 2018
    “…Most of researches in IDS which use k-centroids-based clustering methods like K-means, K-medoids, Fuzzy, Hierarchical and agglomerative algorithms to baseline network traffic suffer from high false positive rate compared to signature-based IDS, simply because the nature of these algorithms risk to force some network traffic into wrong profiles depending on K number of clusters needed. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20