Search Results - (( rule extraction method algorithm ) OR ( fraud detection method algorithm ))

Refine Results
  1. 1

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Fraud detection in telecommunication industry using Gaussian mixed model by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…In this article, we propose a new fraud detection algorithm using Gaussian mixed model (GMM), a probabilistic model successfully used in speech recognition problem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Credit Card Fraud Detection Using AdaBoost and Majority Voting by Randhawa, Kuldeep, Loo, Chu Kiong, Seera, Manjeevan, Lim, Chee Peng, Nandi, Asoke K.

    Published 2018
    “…In this paper, machine learning algorithms are used to detect credit card fraud. Standard models are first used. …”
    Get full text
    Get full text
    Article
  4. 4

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  5. 5

    Improved expectation maximization algorithm for Gaussian mixed model using the kernel method by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Employing Artificial Intelligence to Minimize Internet Fraud by Wong, E.S.K.

    Published 2009
    “…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
    Get full text
    Get full text
    Article
  7. 7

    Topic identification using filtering and rule generation algorithm for textual document by Nurul Syafidah, Jamil

    Published 2015
    “…The rule generation algorithm (TopId) is proposed to identify topic for each verse based on the extracted terms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Compressing and improving fuzzy rules using genetic algorithm and its application to fault detection by Yap K.S., Wong S.Y., Tiong S.K.

    Published 2023
    “…The improved model is applied to two benchmark problems, and the rules extracted are analyzed, discussed and compared with other published methods. …”
    Conference Paper
  10. 10

    Outlier Detection Technique in Data Mining: A Research Perspective by Mansur, M. O., Md. Sap, Mohd. Noor

    Published 2005
    “…The identification of outliers can lead to the discovery of unexpected knowledge in areas such as credit card fraud detection, calling card fraud detection, discovering criminal behaviors, discovering computer intrusion, etc. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh by Kuldeep Kaur , Ragbir Singh

    Published 2019
    “…The empirical results positively indicate that the hybrid model with the sliding window method is able to yield a good accuracy rate of 82.4% in detecting fraud cases in real world credit card transactions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    The framework of weighted subset-hood Mamdani fuzzy rule based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand by Mansor, Rosnalini, Mat Kasim, Maznah, Othman, Mahmod

    Published 2016
    “…The objective of this paper is to show the fourth step in the framework which applied the new electricity load forecasting rule extraction by WSBA method. Electricity load demand in Malaysia data is used as numerical data in this framework.These preliminary results show that the WSBA method can be one of alternative methods to extract fuzzy rules for forecast electricity load demand…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    The framework of weighted subset-hood Mamdani fuzzy rule based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand by Mansor, R., Kasim, M.M., Othman, M.

    Published 2016
    “…These preliminary results show that the WSBA method can be one of alternative methods to extract fuzzy rules for forecast electricity load demand. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm by Othman, Mahmod, Khalid, Shaiful Annuar, Abdullah, Fader, Amir Hamzah, Shezrin Hawani, Ku-Mahamud, Ku Ruhana

    Published 2013
    “…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…The extraction of minimum rules operation is conducted after the default rules have been generated in order to obtain the most useful discovered rules. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A weighted subsethood mamdani fuzzy rules based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand – a framework by Mansor, Rosnalini, Mat Kasim, Maznah, Othman, Mahmod

    Published 2016
    “…Specifically, this paper proposed two frameworks: MFRBSWSBA and WSBA framework where the WSBA is embedded in MFRBS-WSBA (fourth step in MFRBS-WSBA).The objective of this paper is to show the fourth step in the MFRBS-WSBA framework which applied the new electricity load forecasting rule extraction by WSBA method.We apply the proposed WSBA framework in Malaysia electricity load demand data as a numerical example in this paper.These preliminary results show that the WSBA framework can be one of alternative methods to extract fuzzy rules for forecast electricity load demand where the proposed method provide a simple to interpret the fuzzy rules and also offer a new direction to interpret the fuzzy rules compared to classical fuzzy rules…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Overview of biomedical relations extraction using hybrid rule-based approaches. by Abdul Kadir, Rabiah, Bokharaeian, Behrouz

    Published 2013
    “…However, in this work we will discuss the overview a combination of three methods called as hybrid rule-based to extract complex and simple relations.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The primary concept of association rule algorithms consist of two phase procedure. In the first phase, all frequent patterns are found and the second phase uses these frequent patterns in order to generate all strong rules. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A weighted subsethood mamdani fuzzy rules based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand - A framework by Mansor, R., Mat Kasim, M., Othman, M.

    Published 2016
    “…These preliminary results show that the WSBA framework can be one of alternative methods to extract fuzzy rules for forecast electricity load demand where the proposed method provide a simple to interpret the fuzzy rules and also offer a new direction to interpret the fuzzy rules compared to classical fuzzy rules.…”
    Get full text
    Get full text
    Article
  20. 20

    A weighted subsethood mamdani fuzzy rules based system rule extraction (MFRBS-WSBA) for forecasting electricity load demand - A framework by Mansor, R., Mat Kasim, M., Othman, M.

    Published 2016
    “…These preliminary results show that the WSBA framework can be one of alternative methods to extract fuzzy rules for forecast electricity load demand where the proposed method provide a simple to interpret the fuzzy rules and also offer a new direction to interpret the fuzzy rules compared to classical fuzzy rules.…”
    Get full text
    Get full text
    Article