Search Results - (( develop computer crime algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- develop computer »
- java implication »
- crime algorithm »
- computer crime »
-
1
Algorithm for the legal regulation of internet financial crime
Published 2024“…Similarly, association rules showed a strong correlation between the test and experimental samples, further validating the predictive capabilities of the algorithms. The findings underscore the effectiveness of random forest and association rules in predicting Internet financial crime, emphasizing the potential of computer algorithm combinations in crime prediction. …”
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Suspicious activity trigger system using YOLOv6 convolutional neural network
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Improved abnormal detection using self-adaptive social force model for visual surveillance
Published 2017“…The AUC score provided by the proposed algorithm on PETS2009 datasets is about 0.9026 and 0.9940 for Malaysia Crime dataset. …”
Get full text
Get full text
Thesis -
7
Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud
Published 2014Get full text
Get full text
Thesis -
8
-
9
Evolving fuzzy grammar for crime texts categorization
Published 2015Get full text
Get full text
Get full text
Article -
10
-
11
Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak
Published 2020“…Convolution Neural Network (CNN) using deep learning algorithm is chosen in identifying frequency of movement and execution time of housebreaking crime. …”
Get full text
Get full text
Thesis -
12
Fingerprint recognition system
Published 2005Get full text
Get full text
Undergraduates Project Papers -
13
-
14
Doctor-patient remote consultation system with secure medical images
Published 2022“…The final selection of the algorithms depended on the encryption size and computation speed. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
-
16
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Conference Paper -
17
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
18
Human Distance Estimation Using Quadcopter For Surveillance Purpose
Published 2019“…The quadcopter is designed to be small in size and have a mini computer like Raspberry Pi on top of it to compute the algorithm to calculate the distance of the human by using image processing technique through the camera which is setup on the drone. …”
Get full text
Get full text
Get full text
Article -
19
Video surveillance: Item monitoring against theft
Published 2023“…Here, we have developed an intelligent video surveillance system that is capable of identifying the close loitering event and monitoring the select item in the scene by integrating these approaches, such as the You-Only-Look-Once (YOLO) version 5 object detection algorithm, close-contact detection, feature matching, significant movement and dissimilarity detections. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…The proposed models outperform existing methods in terms of accuracy and computational efficiency, with accuracy results as follows: 98.98% (Hockey Fight), 99.29% (Violent Flow), 99% (RLVS), 91% (UCF-Crime), and 91% (ShanghaiTech). …”
Get full text
Get full text
Get full text
Article
