Search Results - (( developing crime data algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- developing crime »
- java implication »
- data algorithm »
- crime data »
-
1
Algorithm for the legal regulation of internet financial crime
Published 2024“…Data processing for criminal acts on Internet finance platforms is crucial, with the utilization of random forest algorithms, including Decision tree and Bagging integration algorithms. …”
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud
Published 2014“…The research metodology consists of several steps consists of gathering information, data collection, data analysis and system development and finally result analysis. …”
Get full text
Get full text
Thesis -
5
Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak
Published 2020“…Convolution Neural Network (CNN) using deep learning algorithm is chosen in identifying frequency of movement and execution time of housebreaking crime. …”
Get full text
Get full text
Thesis -
6
Doctor-patient remote consultation system with secure medical images
Published 2022“…Therefore, our privacy data is all over the Internet. This will make us become more vulnerable to cyber-crime and illegal data exploitation. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
-
8
-
9
Credit Card Fraud Detection Using New Preprocessing And Hybrid Machine Learning Techniques
Published 2023“…The first contribution of this research is to develop a new preprocessing technique that utilizes cost-sensitive learning and resampling techniques at the data-level to improve the performance of highly imbalanced datasets. …”
Get full text
Get full text
Thesis -
10
WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10
Published 2022“…This research will also increase the reliability of the data gathered. The amount of data type evidence collections and security measures to secure the integrity of evidence collected are measured by evaluating available tools, developing a proof-of-concept toolkit, and comparingfunctioning tools. …”
Get full text
Get full text
Article -
11
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Conference Paper -
12
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
13
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023“…A number of popular existing algorithms were used to execute the model developed in Rapid tool such as Naïve Bayes , Neural Net , Deep Learning, Decision Tree, Logistic Regression, SVM and k-NN. …”
text::Thesis -
14
-
15
Vehicle Tracking using Video Cameras
Published 2013“…MATLAB is utilised for the algorithm development. In MATLAB, background subtraction is performed as to extract the foreground image from the background image. …”
Get full text
Get full text
Final Year Project -
16
-
17
-
18
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…With the increasing availability of video data from surveillance cameras and social media platforms, the need for accurate and efficient violence detection algorithms has become paramount. …”
Get full text
Get full text
Get full text
Article
