Search Results - (( based optimization max algorithm ) OR ( fraud detection method algorithm ))
Search alternatives:
- optimization max »
- method algorithm »
- max algorithm »
-
1
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
2
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…In this article, we propose a new fraud detection algorithm using Gaussian mixed model (GMM), a probabilistic model successfully used in speech recognition problem. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Credit Card Fraud Detection Using AdaBoost and Majority Voting
Published 2018“…In this paper, machine learning algorithms are used to detect credit card fraud. Standard models are first used. …”
Get full text
Get full text
Article -
5
A particle swarm optimization and min-max-based workflow scheduling algorithm with QoS satisfaction for service-oriented grids
Published 2017“…The algorithm selects the best scheduling solutions based on the proposed constraint-handling strategy. …”
Get full text
Get full text
Article -
6
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
7
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
Get full text
Get full text
Get full text
Article -
8
Employing Artificial Intelligence to Minimize Internet Fraud
Published 2009“…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
Get full text
Get full text
Article -
9
-
10
Fair bandwidth assignment in hierarchical scheduling for mobile WiMAX system
Published 2011“…In this paper, we propose a fair bandwidth assignment algorithm that allocates the bandwidth among different services classes based on a hierarchical scheduler. …”
Get full text
Get full text
Conference or Workshop Item -
11
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…It reduces the number of handovers by 29.7% and 26.9%, respectively, compared to the conventional RSSI based handover algorithm and the previous worked, mobility improved handover (MIHO) algorithm. …”
Get full text
Get full text
Thesis -
12
Fair uplink bandwidth allocation and latency guarantee for mobile WiMAX using fuzzy adaptive deficit round robin
Published 2014“…One example of such a network is called WiMAX which is driven by WiMAX Forum based on IEEE 802.16 Wireless MAN standard. …”
Get full text
Get full text
Get full text
Article -
13
Cross-layer design using multi-channel system in WiMAX mesh networks
Published 2008“…The WiMAX mesh networks based on IEEE 802.16 standard is a key topology for the next generation wireless networking. …”
Get full text
Get full text
Conference or Workshop Item -
14
A comparative evaluation of heuristic and metaheuristic job scheduling algorithms for optimized resource management in cloud environments
Published 2026“…This study provides a comprehensive analysis and comparison of six prevalent scheduling algorithms, namely FCFS, SJF, LJF, EDF, Max-Min, and PSO, under varying cloudlet loads of 200,400,600,800, and 1000. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…The identification of outliers can lead to the discovery of unexpected knowledge in areas such as credit card fraud detection, calling card fraud detection, discovering criminal behaviors, discovering computer intrusion, etc. …”
Get full text
Get full text
Conference or Workshop Item -
16
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems
Published 2016“…Hence, these approaches regularly fail to provide optimal results on specific graph instances. These problems motivated to propose Max Degres Around (MDA) approximation algorithm for the MVC problem. …”
Get full text
Get full text
Get full text
Article -
17
A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh
Published 2019“…The empirical results positively indicate that the hybrid model with the sliding window method is able to yield a good accuracy rate of 82.4% in detecting fraud cases in real world credit card transactions. …”
Get full text
Get full text
Get full text
Thesis -
18
Improvement of Centralized Routing and Scheduling Using Cross-Layer Design and Multi-Slot Assignment in Wimax Mesh Networks
Published 2009“…WiMAX (Worldwide Interoperability for Microwave Access) based wireless mesh network (WMN) aims to provide broadband wireless last-mile access. …”
Get full text
Get full text
Thesis -
19
Improving QoS Of WiMAX By ondemand bandwidth allocation based on PMP mode
Published 2011“…In order to improve the QoS of WiMAX demand, the total capacity of WiMAX system must be optimized. …”
Get full text
Get full text
Get full text
Article -
20
Energy-efficient base station transmission design for green 5G massive MIMO and hybrid networks
Published 2021“…Then, a new corresponding iterative EE optimization algorithm is proposed based on the BSTPA model to further improve the system’s EE. …”
Get full text
Get full text
Thesis
