Search Results - (( course evaluation bees algorithm ) OR ( based construction risk algorithm ))

Refine Results
  1. 1

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…The RASH algorithm is defined by overall risk, which is equivalent to the sum of Risk Safety Safety, Risk Safety Health, Risk Health Safety, and Risk Health Health. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Identification and analysis of hoisting safety risk factors for IBS construction based on the AcciMap and cases study by Junjia, Yin, Alias, Aidi Hizami, Haron, Nuzul Azam, Abu Bakar, Nabilah

    Published 2024
    “…By combining Rasmussen's risk framework with the characteristics of hoisting construction, six risk domains and thirty-six safety risk factors were identified. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks by Mohammed Omer, Anwar

    Published 1999
    “…Risks are inherently present In all construction projects. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Risk perception modeling based on physiological and emotional responses / Ding Huizhe by Ding , Huizhe

    Published 2024
    “…The ANN demonstrated superior ability in distinguishing low and high-risk levels. However, when risk degrees were closely matched, the integrated model with weight adjustments based on base models outperformed ANN. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Government policy as a key moderator to contractors’ risk attitudes among Malaysian construction companies by Taofeeq, D. M., Adeleke, A. Q., Lee, Chia Kuang

    Published 2020
    “…Behaviour is affected by various risk factors and the successful implementation of construction projects depends on effective management of the key risk factors part of which is a personal factor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Enhanced Community Detection Based On Cross Time For Higher Visibility In Supply Chain: A Six-Steps Model Framework by Abal Abas, Zuraida, Mohd Zaki, Nurul Hafizah, Asmai, Siti Azirah, Abdul Rahman, Ahmad Fadzli Nizam, Zainal Abidin, Zaheera

    Published 2019
    “…This paper proposed six steps model framework that aim: (1) To construct the nodes and vertices for temporal graph representing the relationship in supply chain network; (2) To propose an enhanced temporal community detection algorithm in graph analytics based on Cross-time approach and (3) To evaluate the enhanced temporal community detection algorithm in graph analytics for representing relationship in supply chain network based on external and internal quality analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhanced weight-optimized recurrent neural networks based on sine cosine algorithm for wave height prediction by Alqushaibi, A., Abdulkadir, S.J., Rais, H.M., Al-Tashi, Q., Ragab, M.G., Alhussian, H.

    Published 2021
    “…This paper proposes an enhanced weight-optimized neural network based on Sine Cosine Algorithm (SCA) to accurately predict the wave height. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…It provides a systematic overview of major post-quantum cryptographic families, including lattice-based, hash-based, code-based, multivariate, and isogeny-related schemes, and evaluates their current security assumptions, practical efficiency, and readiness for real-world deployment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…A system is developed to predict the risk of users based on their behaviour when they are online using real-life behavioural data obtained from a private university’s 207 undergraduates. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Optimization of medical image steganography using n-decomposition genetic algorithm by Al-Sarayefi, Bushra Abdullah Shtayt

    Published 2023
    “…The methodology consists of five main phases: (1) initial investigation, (2) formulating an embedding scheme, (3) constructing a decomposition scheme, (4) integrating the schemes' design into the proposed technique, and (5) evaluating the proposed technique's performance based on parameters using medical datasets from kaggle.com. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Digital Surface Model (DSM) Construction and Flood Hazard Simulation for Development Plans in Naga City, Philippines by Abd Rahman, Muhammad Zulkarnain, Dinand, Alkema

    Published 2007
    “…This is supported by the analyses on the community-based flood risk perception and investigation on changes of flood hazard (based on the flood velocity and depth). …”
    Get full text
    Get full text
    Article
  20. 20

    Development of Lightning Protection System (LPS) Designing Tool by Idris, Samueil

    Published 2015
    “…Based on this standard, the data and mathematical equations were obtained to form algorithms whereby it would be used in the software afterwards. …”
    Get full text
    Get full text
    Final Year Project