Search Results - risk simulation using algorithm
Search alternatives:
- simulation using »
- risk simulation »
- using algorithm »
-
1
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024journal::journal article -
2
Ensemble Dual Algorithm Using RBF Recursive Learning for Partial Linear Network
Published 2011“…Relative mass released of the leakage is introduced as the input for the simulation model and the data from the simulation model is taken at real time (on-line) to feed into the recursive algorithms for updating the linear weight. …”
Get full text
Get full text
Book Section -
3
Managing risk in production scheduling under uncertain disruption
Published 2015“…In this paper, we have studied JSPs under sudden machine breakdown scenarios that introduce a risk of not completing the jobs on time. We have first solved JSPs using an improved memetic algorithm and extended the algorithm to deal with the disruption situations, and then developed a simulation model to analyze the risk of using a job order and delivery scenario. …”
Get full text
Get full text
Get full text
Article -
4
Enhancing reservoir operations with charged system search (CSS) algorithm: Accounting for sediment accumulation and multiple scenarios
Published 2025“…Optimization methods vary depending on objectives, reservoir type, and algorithms used. The paper utilizes the CSS algorithm to study the impact of various scenarios on the optimal operation of the Mujib reservoir in Jordan to reduce water deficits using historical date between 2004 and 2019. …”
Article -
5
Competing risks for reliability analysis using Cox’s model
Published 2007“…Originality/value – A modification of the two competing risk models has mostly been applied in failure time data and simulation data. …”
Get full text
Get full text
Get full text
Article -
6
Slice sampler algorithm for generalized pareto distribution
Published 2018“…The results were compared with another commonly used Markov chain Monte Carlo (MCMC) technique called Metropolis-Hastings algorithm. …”
Get full text
Get full text
Article -
7
Algorithm comparison for data mining classification: assessing bank customer credit scoring default risk
Published 2024“…Thus, every business must appropriately identify debtors and non-debtors. This study uses machine learning approaches to simulate consumer credit risk and compares the results to the logistic model, determining if machine learning improves client default ratings. …”
Get full text
Get full text
Get full text
Article -
8
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
text::Thesis -
9
Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks
Published 1999“…In this study, Monte Carlo simulation as a tool of risk analysis was used. The merge event bias as one of the essential problems associated with PERT is discussed, along with models and approaches developed by other researchers, namely, Probabilistic Network Evaluation Technique (PNET algorithm), Modified PNET, Back-Forward Uncertainly Estimation procedure (BFUE) and concept based on the robust reliability idea. …”
Get full text
Get full text
Thesis -
10
Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data
Published 2023“…The present study proposes a simulated annealing algorithm (SA) in estimating the parameters of Weibull distribution with application to modified internal rate of return data (MIRR).The objective is to examine the investment potential of the shari’ah compliance companies of the Malaysia property sector (MPS). …”
Get full text
Get full text
Thesis -
11
Modeling And Control Of V-Groove Rotary Impact Driver
Published 2020“…The purpose of doing the latter is to verify the developed algorithm so that it does not have risk of overrun on defined solver fixed time step. …”
Get full text
Get full text
Thesis -
12
A multi-objective portfolio selection model with fuzzy Value-at-Risk ratio
Published 2018“…Finally, the algorithm superiority is justified via comparing with existing solvers on benchmark problems, and the model effectiveness is exemplified by using three case studies on portfolio selection. …”
Get full text
Get full text
Article -
13
A multi-objective portfolio selection model with fuzzy Value-at-Risk ratio
Published 2018“…Finally, the algorithm superiority is justified via comparing with existing solvers on benchmark problems, and the model effectiveness is exemplified by using three case studies on portfolio selection. …”
Get full text
Get full text
Article -
14
Bacterial foraging optimization algorithm for optimal load shedding in power systems / Wan Nur Eliana Afif Wan Afandie
Published 2016“…The best objective functions for each case then determined by comparing the simulation results. These simulation results are also compared to the simulation results obtained using Evolutionary Programming (EP) technique. …”
Get full text
Get full text
Thesis -
15
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024thesis::doctoral thesis -
16
Sensitivity-based fuzzy multi-objective portfolio model with Value-at-Risk
Published 2019Get full text
Get full text
Article -
17
Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam
Published 2023“…The monthly storage capacity fails in 2077, substantially earlier than the other three algorithms in Scenario 2. The LFWOA was used in this study to improve the efficacy of the algorithms by delivering a more accurate monthly storage capacity and reservoir risk assessment for Scenario 2 of RCP 2.6. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
Published 2018“…Although useful, the existing algorithms does not provide any comparative data to select an algorithm based on the problem size and difficulty and the use of other neighborhood algorithms (including Great Deluge and Late Acceptance Hill Climbing) has not been sufficiently explored as well. …”
Get full text
Get full text
Thesis -
19
Cutpoint determination methods in competing risks subdistribution model
Published 2009“…Thus, we consider the problem of obtaining a threshold value of a continuous covariate given a competing risk survival time response using a binary partitioning algorithm as a way to optimally partition data into two disjoint sets. …”
Get full text
Get full text
Article -
20
Application of the Whale Optimization Algorithm (WOA) in Reservoir Optimization Operation Under Investigation of Climate Change Impact: A Case Study at Klang Gate Dam, Malaysia
Published 2024“…In the simulation process, an artificial neural network (ANN) was used. …”
Conference Paper
