Search Results - (( _ application using algorithm ) OR ( fraud detection system algorithm ))*

Refine Results
  1. 1

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…We introduce a new algorithm that could detect fraud activities in telecommunication industry (e.g. intrusion fraud which occurs when legitimate account is comprised by an intruder who makes or sells calls on this account) that uses Gaussian Mixed Model (or GMM), a probabilistic model normally used in fraud detection via speech recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Employing Artificial Intelligence to Minimize Internet Fraud by Wong, E.S.K.

    Published 2009
    “…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
    Get full text
    Get full text
    Article
  7. 7

    A Location-Based Fraud Detection in Shipping Industry Using Machine Learning Comparison Techniques by Subramaniam G.A.L., Mahmoud M.A., Abdulwahid S.N., Gunasekaran S.S.

    Published 2025
    “…A study reviewed existing fraud detectionFraud detection models and identified the most effective algorithm for the shipping industry. …”
    Book chapter
  8. 8

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…The set of rules can be used as part of the knowledge base in expert system or decision support system for financial institutions.…”
    Get full text
    Get full text
    Final Year Project
  9. 9

    An enhanced android botnet detection approach using feature refinement by Anwar, Shahid

    Published 2019
    “…Although the existing analyses have been obtained a good accuracy, but the attackers find novel ways of skipping the detection while performing harmful activities. Furthermore, the existing detection techniques can detect only malicious Android applications, while they are unable to detect the Android botnet applications. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Botnet detection using automated script / Norfathin Rosli by Rosli, Norfathin

    Published 2020
    “…This paper is about a Botnet Detection using Automated Script, the programming language is and the operating system is Windows 7. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of an intelligent information system for financial analysis depend on supervised machine learning algorithms by Lei, X., Mohamad, U.H., Sarlan, A., Shutaywi, M., Daradkeh, Y.I., Mohammed, H.O.

    Published 2022
    “…In the financial sector, machine learning algorithms are used to detect fraud, automate trading, and provide financial advice to investors. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Robust and reliable dual the classification system with error compensation module by Ahmad Nasiruddin, Ab Razak

    Published 2014
    “…The system uses treadle sensors to map tires and count the number of axles while the optical barrier is used to detect the presence of vehicle. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Student attendance system using facial recognition based on deep learning / Syahila Aina Haris and Zulfikri Paidi by Haris, Syahila Aina, Paidi, Zulfikri

    Published 2023
    “…As a result, the computer can identify faces. This algorithm can identify the faces of students who appear in class, and their attendance will be recorded automatically into the system. …”
    Get full text
    Get full text
    Book Section
  17. 17

    Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing by Raja Segaran, Bama, Mohd Rum, Siti Nurulain, Hafez Ninggal, Mohd Izuan, Mohd Aris, Teh Noranis

    Published 2025
    “…However, while blockchain ensures transparency, it lacks real-time anomaly detection capabilities. ML algorithms, particularly supervised models such as Random Forest, XGBoost, and Neural Networks, are well-suited for detecting fraudulent patterns and verifying the authenticity of forest carbon credit transactions. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Schelkunoff array synthesis methods using adaptive-iterative algorithm by Abdul Latiff, Nurul Mu'azzah

    Published 2003
    “…By the co-emergence of these algorithms, a better performance and wider application are hoped to be achieved since each of these algorithms has its own advantages respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Application of genetic algorithm methods to optimize flowshop sequencing problem by Mohd Fadil, Md Sairi

    Published 2008
    “…Application of genetic algorithm method to optimize flow shop sequencing problem as the title of this project is the study about the method used in order to optimize flow shop sequencing problem. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Adaptive interference canceller using analog algorithm with offset voltage by Mohammed, Alaa Hadi

    Published 2015
    “…LMS and NLMS algorithms have been used in a wide range of signal processing applications because of their simplicity in computations compared to the RLS algorithm. …”
    Get full text
    Get full text
    Thesis