Search Results - (( develop banking detection algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8
  9. 9

    Detection and extraction features for signatures images via different techniques by Fatma Susilawati, M., Alsuhimat, F.M., Iqtait, M.

    Published 2019
    “…Three techniques have been applied using (UTSig) dataset; the results showed that the BRISK algorithm got the best result among the feature detection algorithm in terms of accuracy and the FAST algorithm got the best result among the feature detection algorithm in terms of run time.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Evaluating Machine Learning Algorithms for Fake Currency Detection by Keerthana, S.N, Chitra, K.

    Published 2024
    “…Our findings contribute to developing reliable, automated systems for counterfeit detection, and enhancing financial security…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  12. 12

    An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection by Algriree, Waleed, Sulaiman, Nasri, Isa, Maryam, Sahbudin, Ratna K. Z., Hassan, Siti L. M., Hmood Salman, Emad, Alghrairi, Mokhalad

    Published 2022
    “…This recommended SS algorithm, based on the hybrid filter detection (HFD) method, employs the Cosine law for filtering the traffic signal, and then enables segmentation by applying the Welch algorithm. …”
    Get full text
    Get full text
    Article
  13. 13

    Suspicious activities detection for anti-money laundering using machine learning techniques by Lim, Aun Chir

    Published 2025
    “…To solve money laundering, more effective techniques for detecting suspicious transactions must be developed. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14
  15. 15

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…Specifically, the objectives of this thesis are (i) to develop an image registration technique based on multigraph matching, (ii) to detect occluded objects through exploration of candidate object correspondences in longer frame sequences, and (iii) to develop a robust graph coloring algorithm for multiple moving object detection under different transformations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. This application is using the data from a Taiwan bank which is obtained from the UCI data repository website. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    A simultaneous spam and phishing attack detection framework for short message service based on text mining approach by Mohd Foozy, Cik Feresa

    Published 2017
    “…Within the field of SMS detection, only the framework for a single attack detection for Spam has been studied. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…The project utilised pre-processing process such as edge detection, orientation correction and Region of Interest (ROI) extraction that have been developed previously. …”
    Get full text
    Get full text
    Monograph