Search Results - (( fraud detection method algorithm ) OR ( using optimization system algorithm ))
Search alternatives:
- optimization system »
- method algorithm »
- system algorithm »
-
1
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
2
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
3
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…In this article, we propose a new fraud detection algorithm using Gaussian mixed model (GMM), a probabilistic model successfully used in speech recognition problem. …”
Get full text
Get full text
Conference or Workshop Item -
4
Credit Card Fraud Detection Using AdaBoost and Majority Voting
Published 2018“…In this paper, machine learning algorithms are used to detect credit card fraud. Standard models are first used. …”
Get full text
Get full text
Article -
5
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
Get full text
Get full text
Get full text
Article -
6
Employing Artificial Intelligence to Minimize Internet Fraud
Published 2009“…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
Get full text
Get full text
Article -
7
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…The identification of outliers can lead to the discovery of unexpected knowledge in areas such as credit card fraud detection, calling card fraud detection, discovering criminal behaviors, discovering computer intrusion, etc. …”
Get full text
Get full text
Conference or Workshop Item -
8
A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh
Published 2019“…The empirical results positively indicate that the hybrid model with the sliding window method is able to yield a good accuracy rate of 82.4% in detecting fraud cases in real world credit card transactions. …”
Get full text
Get full text
Get full text
Thesis -
9
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…The method used to detect fake e-mail is by tracing back the email header. …”
Get full text
Get full text
Research Reports -
10
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
11
Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz
Published 2016“…Therefore, optimization methods are often used in the sizing algorithms for such systems. …”
Get full text
Get full text
Thesis -
12
Firefly algorithm for optimal sizing of stand-alone photovoltaic system / Nur Izzati Abdul Aziz
Published 2016“…Therefore, optimization methods are often used in the sizing algorithms for such systems. …”
Get full text
Get full text
Thesis -
13
System program management environment in cloud computing using hybrid Genetic Algorithm and Moth Flame Optimization (GA-MFO)
Published 2022“…Optimization algorithms can be used to solve Non-deterministic Polynomial (NP) hard problem like system management. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Optimal Location And Sizing Of Distrubuted Generator Using PSO And GA Algorithms In Power Systems
Published 2019“…In fact, there are several algorithms used for optimizing the size and finding the best location to install DG units in the power system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
An Optimized PID Parameters for LFC in Interconnected Power Systems Using MLSL Optimization Algorithm
Published 2016“…In order to enhance the dynamic performance, the optimal parameters of the PID scheme which optimized by the proposed MLSL algorithm are compared with that one’s obtained by GA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The proposed method of this study is to cater the problems occur in fuzzy systems by using optimization method. Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
17
Algorithm development for optimization of a refrigeration system
Published 2010“…This thesis deals with algorithm development for optimization of a refrigeration system. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Hybrid Improved Bacterial Swarm Optimization Algorithm for Hand-Based Multimodal Biometric Authentication System
Published 2019“…Concurrently, the local optima trap (i.e., premature convergence) of PSO algorithm was averted by using mutation operator. The HIBS algorithm was tested using benchmark functions and compared against classical BFO, PSO and other hybrid algorithms like Genetic Algorithm-Bacterial Foraging Optimization (GA-BFO), Genetic Algorithm-Particle Swarm Optimization (GA-PSO) and other BFO-PSO algorithms to prove its exploration and exploitation ability. …”
Get full text
Get full text
Article -
19
Optimal allocation of battery energy storage system using whale optimization algorithm
Published 2023Conference Paper -
20
