Search Results - (( fraud detection system algorithm ) OR ( _ application a algorithm ))
Search alternatives:
- system algorithm »
- application a »
- a algorithm »
-
1
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…Fraud activities have reached to critical point causing millions of ringgit of losses to telecommunication companies, and as a result, forcing them to employ applications or systems (such as Telekom Malaysia Berhad’s Next Generation Fraud Detection System) to detect the said activities. …”
Get full text
Get full text
Get full text
Thesis -
2
Online Transaction Fraud Detection Using Backlogging On E-Commerce Website: A Review
Published 2024Article -
3
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Detection of Fraud and Non-Fraud Transaction using Machine Learning Algorithm
Published 2022Get full text
Get full text
Final Year Project -
5
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
6
Employing Artificial Intelligence to Minimize Internet Fraud
Published 2009“…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
Get full text
Get full text
Article -
7
A Location-Based Fraud Detection in Shipping Industry Using Machine Learning Comparison Techniques
Published 2025“…A study reviewed existing fraud detectionFraud detection models and identified the most effective algorithm for the shipping industry. …”
Book chapter -
8
Data Classification and Its Application in Credit Card Approval
Published 2004“…The result of this application using the sample credit card approval dataset includes a decision tree, a set of rules derived from the decision tree and its accuracy. …”
Get full text
Get full text
Final Year Project -
9
An enhanced android botnet detection approach using feature refinement
Published 2019“…Furthermore, the existing detection techniques can detect only malicious Android applications, while they are unable to detect the Android botnet applications. …”
Get full text
Get full text
Thesis -
10
Botnet detection using automated script / Norfathin Rosli
Published 2020“…This paper is about a Botnet Detection using Automated Script, the programming language is and the operating system is Windows 7. …”
Get full text
Get full text
Thesis -
11
Development of an intelligent information system for financial analysis depend on supervised machine learning algorithms
Published 2022“…In the financial sector, machine learning algorithms are used to detect fraud, automate trading, and provide financial advice to investors. …”
Get full text
Get full text
Article -
12
-
13
University Voting System Using Facial Recognition Technology
Published 2025conference output::conference proceedings::conference paper -
14
Robust and reliable dual the classification system with error compensation module
Published 2014“…The system uses treadle sensors to map tires and count the number of axles while the optical barrier is used to detect the presence of vehicle. …”
Get full text
Get full text
Thesis -
15
-
16
Student attendance system using facial recognition based on deep learning / Syahila Aina Haris and Zulfikri Paidi
Published 2023“…As a result, the computer can identify faces. This algorithm can identify the faces of students who appear in class, and their attendance will be recorded automatically into the system. …”
Get full text
Get full text
Book Section -
17
Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing
Published 2025“…However, while blockchain ensures transparency, it lacks real-time anomaly detection capabilities. ML algorithms, particularly supervised models such as Random Forest, XGBoost, and Neural Networks, are well-suited for detecting fraudulent patterns and verifying the authenticity of forest carbon credit transactions. …”
Get full text
Get full text
Get full text
Article -
18
Implication of image processing algorithm in remote sensing and GIS applications
Published 2011“…Greedy algorithms expresses as a simple solution algorithm that choose a local optimum solution at each step to achieve a global optimum. …”
Get full text
Get full text
Get full text
Article -
19
A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network
Published 2015“…This paper presents a novel technique consisting of both TOPSIS and game theory algorithms to study three smart grid applications. …”
Get full text
Get full text
Get full text
Article -
20
Schelkunoff array synthesis methods using adaptive-iterative algorithm
Published 2003“…Basically, this algorithm is a combination of iterative algorithm with adaptive algorithm. …”
Get full text
Get full text
Get full text
Thesis
