Search Results - (( developing crime method algorithm ) OR ( java application mining algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1
  2. 2
  3. 3

    Algorithm for the legal regulation of internet financial crime by Ambaras Khan, Hanna, Ab. Rahman, Suhaimi, Xinxin, Mao

    Published 2024
    “…Further research is proposed to delve deeper into the application of these algorithms in real-world scenarios and explore additional methods to enhance the prevention and management of Internet financial crime.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics by Mosa, Mohammad Rasmi Hassun

    Published 2013
    “…The increasing number of cyber crimes has motivated network forensics researchers to develop new techniques to analyze and investigate these crimes. …”
    Get full text
    Get full text
    Thesis
  9. 9

    ATM crime detection using image processing integrated video surveillance : a systematic review by Sikandar, Tasriva, Kamarul Hawari, Ghazali, Rabbi, M. F.

    Published 2019
    “…The findings of this review may help the future researchers to develop dynamic and multipurpose algorithms for surveillance system that can detect and prevent ATM crime.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Evolving fuzzy grammar for crime texts categorization by Mohd Sharef, Nurfadhlina, Martin, Trevor

    Published 2015
    “…This paper introduces the evolving fuzzy grammar (EFG) method for crime texts categorization. In this method, the learning model is built based on a set of selected text fragments which are then transformed into their underlying structure called fuzzy grammars. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…For both indoor and outdoor scene, the proposed algorithm outperforms the other methods with accuracy 97% and 100%. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak by Abd Razak, Hana'

    Published 2020
    “…Convolution Neural Network (CNN) using deep learning algorithm is chosen in identifying frequency of movement and execution time of housebreaking crime. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Fingerprint recognition system by Rohani, Abu Bakar

    Published 2005
    “…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10 by Rayman, Dafiqah Mior, Asmawi, Aziah, Mohd Ariffin, Noor Afiza

    Published 2022
    “…Although there are 18 different categories of digital evidence, only 12 of them can be extracted using a single method. Furthermore, because the hashing algorithm employed in present technologies is MD5, the evidence gathered still lacks integrity. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios by MUHAMMAD, SHOAIB, ASAD, ULLAH, Irshad, Ahmed Abbasi, Fahad, Algarni, Adnan Shahid, Khan

    Published 2022
    “…Our key contributions include the development of efficient keyframes selection methods and classification models, addressing the challenge of violence detection in dynamic surveillance scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19