Search Results - (( based optimization method algorithm ) OR ( fraud detection a algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…We introduce a new algorithm that could detect fraud activities in telecommunication industry (e.g. intrusion fraud which occurs when legitimate account is comprised by an intruder who makes or sells calls on this account) that uses Gaussian Mixed Model (or GMM), a probabilistic model normally used in fraud detection via speech recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Fraud detection in telecommunication industry using Gaussian mixed model by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…In this article, we propose a new fraud detection algorithm using Gaussian mixed model (GMM), a probabilistic model successfully used in speech recognition problem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    Fraud detection in shipping industry based on location using machine learning comparison techniques by Ganesan Subramaniam, Mr.

    Published 2023
    “…There were also identification of factors that influence fraud activity, review existing fraud detection models, develop the detection model and implement it using a well-known tool in the market namely Rapidminer. …”
    text::Thesis
  8. 8

    Credit Card Fraud Detection Using AdaBoost and Majority Voting by Randhawa, Kuldeep, Loo, Chu Kiong, Seera, Manjeevan, Lim, Chee Peng, Nandi, Asoke K.

    Published 2018
    “…In this paper, machine learning algorithms are used to detect credit card fraud. Standard models are first used. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…The paper also highlights comparison results between typical SVM and SVM-GA. The highest fraud detection accuracy for SVMGA is 94%.…”
    Conference Paper
  11. 11

    A Location-Based Fraud Detection in Shipping Industry Using Machine Learning Comparison Techniques by Subramaniam G.A.L., Mahmoud M.A., Abdulwahid S.N., Gunasekaran S.S.

    Published 2025
    “…An automated solutionAutomated solution is needed to address this issue and prevent further impacts on the industry and society. A study reviewed existing fraud detectionFraud detection models and identified the most effective algorithm for the shipping industry. …”
    Book chapter
  12. 12

    Employing Artificial Intelligence to Minimize Internet Fraud by Wong, E.S.K.

    Published 2009
    “…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
    Get full text
    Get full text
    Article
  13. 13

    Building classification models from imbalanced fraud detection data / Terence Yong Koon Beh, Swee Chuan Tan and Hwee Theng Yeo by Terence, Yong Koon Beh, Swee, Chuan Tan, Hwee, Theng Yeo

    Published 2014
    “…This paper reports our experience in applying data balancing techniques to develop a classifier for an imbalanced real-world fraud detection data set. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Improved expectation maximization algorithm for Gaussian mixed model using the kernel method by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    RFID-enabled supply chain detection using clustering algorithms by Azahar, T.F., Mahinderjit-Singh, M., Hassan, R.

    Published 2015
    “…We propose to use clustering algorithms in order to detect counterfeit in supply chain management. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Credit Card Fraud Detection Using New Preprocessing And Hybrid Machine Learning Techniques by Gasim, Esraa Faisal Malik

    Published 2023
    “…The second contribution to this research is to develop multiple hybrid machine learning models in order to enhance the detection of fraudulent activities in the credit card fraud detection domain.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Outlier Detection Technique in Data Mining: A Research Perspective by Mansur, M. O., Md. Sap, Mohd. Noor

    Published 2005
    “…The identification of outliers can lead to the discovery of unexpected knowledge in areas such as credit card fraud detection, calling card fraud detection, discovering criminal behaviors, discovering computer intrusion, etc. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Forensic accountants, auditors and fraud capability and competence requirements in the Nigerian public sector by Popoola, Oluwatoyin Muse Johnson

    Published 2014
    “…Most importantly, the study explored the role of fraud related problem representation (FRPR) as a mediator on the relationship between knowledge, skills and mindset (forensic accountant and auditor) and task performance fraud risk assessment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Assessing the relationships between problem representation, capabilities and task performance fraud risk assessment by Nigerian deposit money banks' fraud investigators by Odukoya, Olusoji Olumide

    Published 2021
    “…The study also recommends integration of forensic accountants and bank examiners as permanent fixtures for fraud prevention and detection.…”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20