Search Results - (( java application customization algorithm ) OR ( fraud detection system algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…Fraud activities have reached to critical point causing millions of ringgit of losses to telecommunication companies, and as a result, forcing them to employ applications or systems (such as Telekom Malaysia Berhad’s Next Generation Fraud Detection System) to detect the said activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Employing Artificial Intelligence to Minimize Internet Fraud by Wong, E.S.K.

    Published 2009
    “…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
    Get full text
    Get full text
    Article
  7. 7

    A Location-Based Fraud Detection in Shipping Industry Using Machine Learning Comparison Techniques by Subramaniam G.A.L., Mahmoud M.A., Abdulwahid S.N., Gunasekaran S.S.

    Published 2025
    “…A study reviewed existing fraud detectionFraud detection models and identified the most effective algorithm for the shipping industry. …”
    Book chapter
  8. 8

    Botnet detection using automated script / Norfathin Rosli by Rosli, Norfathin

    Published 2020
    “…This paper is about a Botnet Detection using Automated Script, the programming language is and the operating system is Windows 7. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of an intelligent information system for financial analysis depend on supervised machine learning algorithms by Lei, X., Mohamad, U.H., Sarlan, A., Shutaywi, M., Daradkeh, Y.I., Mohammed, H.O.

    Published 2022
    “…In the financial sector, machine learning algorithms are used to detect fraud, automate trading, and provide financial advice to investors. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Student attendance system using facial recognition based on deep learning / Syahila Aina Haris and Zulfikri Paidi by Haris, Syahila Aina, Paidi, Zulfikri

    Published 2023
    “…As a result, the computer can identify faces. This algorithm can identify the faces of students who appear in class, and their attendance will be recorded automatically into the system. …”
    Get full text
    Get full text
    Book Section
  13. 13

    Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing by Raja Segaran, Bama, Mohd Rum, Siti Nurulain, Hafez Ninggal, Mohd Izuan, Mohd Aris, Teh Noranis

    Published 2025
    “…However, while blockchain ensures transparency, it lacks real-time anomaly detection capabilities. ML algorithms, particularly supervised models such as Random Forest, XGBoost, and Neural Networks, are well-suited for detecting fraudulent patterns and verifying the authenticity of forest carbon credit transactions. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An enhanced android botnet detection approach using feature refinement by Anwar, Shahid

    Published 2019
    “…Although the existing analyses have been obtained a good accuracy, but the attackers find novel ways of skipping the detection while performing harmful activities. Furthermore, the existing detection techniques can detect only malicious Android applications, while they are unable to detect the Android botnet applications. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…The set of rules can be used as part of the knowledge base in expert system or decision support system for financial institutions.…”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Robust and reliable dual the classification system with error compensation module by Ahmad Nasiruddin, Ab Razak

    Published 2014
    “…The system uses treadle sensors to map tires and count the number of axles while the optical barrier is used to detect the presence of vehicle. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item