Search Results - (( java application using algorithm ) OR ( fraud detection techniques algorithm ))
Search alternatives:
- detection techniques »
- java application »
- using algorithm »
-
1
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023“…This research discusses fraud detection specifically within the shipping industry using data analytics techniques. …”
text::Thesis -
2
Employing Artificial Intelligence to Minimize Internet Fraud
Published 2009“…Initially this paper describes how artificial intelligence techniques are employed in syst ems for detecting credit card fraud (online and offline) and insider trading within the Bourses. …”
Get full text
Get full text
Article -
3
A Location-Based Fraud Detection in Shipping Industry Using Machine Learning Comparison Techniques
Published 2025“…A study reviewed existing fraud detectionFraud detection models and identified the most effective algorithm for the shipping industry. …”
Book chapter -
4
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
5
Credit Card Fraud Detection Using New Preprocessing And Hybrid Machine Learning Techniques
Published 2023“…The second contribution to this research is to develop multiple hybrid machine learning models in order to enhance the detection of fraudulent activities in the credit card fraud detection domain.…”
Get full text
Get full text
Thesis -
6
Building classification models from imbalanced fraud detection data / Terence Yong Koon Beh, Swee Chuan Tan and Hwee Theng Yeo
Published 2014“…This paper reports our experience in applying data balancing techniques to develop a classifier for an imbalanced real-world fraud detection data set. …”
Get full text
Get full text
Get full text
Article -
7
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005Get full text
Get full text
Conference or Workshop Item -
8
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
Get full text
Get full text
Get full text
Article -
9
Forensic accountants, auditors and fraud capability and competence requirements in the Nigerian public sector
Published 2014“…The research findings provided support for the differences between groups (forensic accountants and auditors) hypotheses in the area of fraud detection, prevention and response. Importantly, forensic accountants have higher levels of knowledge (KR), skills (SR), mindset (MR), fraud related problem representation (FRPR), and task performance fraud risk assessment (TPFRA) than auditors. …”
Get full text
Get full text
Get full text
Thesis -
10
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
11
-
12
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023“…Consequently, it is critical to identify effective detection techniques for fraudulent websites. The research consists of analysing the characteristics of phishing websites, extracting their essential features using the wrapper method, and classifying websites as phishing or legitimate using supervised and unsupervised learning algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
14
-
15
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
An enhanced android botnet detection approach using feature refinement
Published 2019“…Although the existing analyses have been obtained a good accuracy, but the attackers find novel ways of skipping the detection while performing harmful activities. Furthermore, the existing detection techniques can detect only malicious Android applications, while they are unable to detect the Android botnet applications. …”
Get full text
Get full text
Thesis -
17
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
18
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…In this paper, a novel URL phishing detection technique based on BERT feature extraction and a deep learning method is introduced. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item
