Search Results - (( motion extraction method algorithm ) OR ( fraud detection method algorithm ))*
Search alternatives:
- motion extraction »
- method algorithm »
-
1
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
2
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…In this article, we propose a new fraud detection algorithm using Gaussian mixed model (GMM), a probabilistic model successfully used in speech recognition problem. …”
Get full text
Get full text
Conference or Workshop Item -
3
Credit Card Fraud Detection Using AdaBoost and Majority Voting
Published 2018“…In this paper, machine learning algorithms are used to detect credit card fraud. Standard models are first used. …”
Get full text
Get full text
Article -
4
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
5
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
Get full text
Get full text
Get full text
Article -
6
Employing Artificial Intelligence to Minimize Internet Fraud
Published 2009“…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
Get full text
Get full text
Article -
7
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…The identification of outliers can lead to the discovery of unexpected knowledge in areas such as credit card fraud detection, calling card fraud detection, discovering criminal behaviors, discovering computer intrusion, etc. …”
Get full text
Get full text
Conference or Workshop Item -
8
Fast adaptive motion estimation search algorithm for H.264 encoder
Published 2012“…Motion estimation is a technique of video compression and video processing applications; it extracts motion information from the video sequence. …”
Get full text
Get full text
Thesis -
9
A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh
Published 2019“…The empirical results positively indicate that the hybrid model with the sliding window method is able to yield a good accuracy rate of 82.4% in detecting fraud cases in real world credit card transactions. …”
Get full text
Get full text
Get full text
Thesis -
10
A new search and extraction technique for motion capture data
Published 2008“…Results from the experiments show that matching motion files were successfully extracted from the motion capture library using the new algorithm based on different human body segments.…”
Get full text
Get full text
Thesis -
11
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…The method employs the RADICAL technique to extract independent subcomponents. …”
Get full text
Get full text
Article -
12
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…The method used to detect fake e-mail is by tracing back the email header. …”
Get full text
Get full text
Research Reports -
13
Motion detection using Horn-Schunck optical flow
Published 2012“…This system is design to detect motion in a crowd using one of the optical flow algorithms, Horn-Schunck method. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Particle swarm optimization with deep learning for human action recognition
Published 2021“…This decreases the detection efficiency and degrades the target tracking output. Also, the current motion target detection algorithms extract features from the relevant object only if the moving object has complex texture features. …”
Get full text
Get full text
Article -
15
A method for motion tracking of ventricular endocardial surface
Published 2014“…The present invention relates to a method for automatic motion tracking of ventricular endocardial surface in three dimensional (3D) echocardiography, characterized by the steps of extracting a plurality of ventricular endocardial contours over a complete cardiac cycle; identifying a plurality of landmarks on each ventricular endocardial contour; measuring displacement vector flow (DVF) for each landmark by comparing a pair of consecutive ventricular endocardial contours; measuring velocity vector flow (VVF) for each landmark from end-diastolic (ED) to end-systolic (ES) and vice versa; identifying at least four landmarks from the plurality of landmarks on each ventricular endocardial contour to represent anatomical landmarks of left lateral surface, right lateral surface, inferior wall and anterior wall by using geometrical distance calculation (GDC) algorithm; analysing ventricular endocardial motion direction using a fuzzy logic analyzer (FLA) for the four landmarks identified; updating values of the displacement vector flow (DVF) and velocity vector flow (VVF) based on the ventricular endocardial motion direction; and generating graphical curves of time versus values of the displacement vector flow (DVF) and velocity vector flow (VVF) for the four landmarks identified.…”
Get full text
Patent -
16
Design and performance analysis of artificial neural network for hand motion detection from EMG signals
Published 2013“…The conventional and most effective time and timefrequency based features are extracted and normalized. The neural network has been trained with the normalized feature set with supervised learning method. …”
Get full text
Get full text
Get full text
Article -
17
Detection and Classification of Moving Objects for an Automated Surveillance System
Published 2006“…Moving object is detected by using combination of two frame differencing and adaptive image averaging with selectivity. Technically, this method estimate the motion area before updates the background by taking a weighted average of non-motion area of the current background altogether with non-motion area of the current frame of the video sequence. …”
Get full text
Get full text
Thesis -
18
Detection and classification of moving objects for an automated surveillance system
Published 2006“…Moving object is detected by using combination of two frame differencing and adaptive image averaging with selectivity. Technically, this method estimate the motion area before updates the background by taking a weighted average of non-motion area of the current background altogether with non-motion area of the current frame of the video sequence. …”
Get full text
Get full text
Thesis -
19
Detection and classification of moving objects for an automated surveillance system
Published 2006“…Moving object is detected by using combination of two frame differencing and adaptive image averaging with selectivity. Technically, this method estimate the motion area before updates the background by taking a weighted average of non-motion area of the current background altogether with non-motion area of the current frame of the video sequence. …”
Get full text
Get full text
Thesis -
20
Automated threshold detection for object segmentation in colour image
Published 2016“…In the next stage, Line Fill (LF) algorithm is applied for smoothing the edges of object and finally background is subtracted to extract the targeted object. …”
Get full text
Get full text
Get full text
Get full text
Article
