Search Results - (( developing developing crime algorithm ) OR ( java implementation phase algorithm ))

Refine Results
  1. 1

    Algorithm for the legal regulation of internet financial crime by Ambaras Khan, Hanna, Ab. Rahman, Suhaimi, Xinxin, Mao

    Published 2024
    “…The study highlights the importance of applying these algorithms to the legal regulation of Internet financial crime. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics by Mosa, Mohammad Rasmi Hassun

    Published 2013
    “…The increasing number of cyber crimes has motivated network forensics researchers to develop new techniques to analyze and investigate these crimes. …”
    Get full text
    Get full text
    Thesis
  5. 5

    ATM crime detection using image processing integrated video surveillance : a systematic review by Sikandar, Tasriva, Kamarul Hawari, Ghazali, Rabbi, M. F.

    Published 2019
    “…The findings of this review may help the future researchers to develop dynamic and multipurpose algorithms for surveillance system that can detect and prevent ATM crime.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…The AUC score provided by the proposed algorithm on PETS2009 datasets is about 0.9026 and 0.9940 for Malaysia Crime dataset. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Suspicious activity trigger system using YOLOv6 convolutional neural network by Suryanti, Awang, Mohd Qhairel, Rafiqi Rokei, Sulaiman, Junaida

    Published 2023
    “…Based on the experiment, 92.53% for precision and 96.6% of the accuracy is obtained using this algorithm. Therefore, YOLOv6 can be implemented in the security system to prevent crimes in residency areas.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Evolving fuzzy grammar for crime texts categorization by Mohd Sharef, Nurfadhlina, Martin, Trevor

    Published 2015
    “…Machine learning (ML) based methods are the popular solution for this problem. However, the developed models typically provide low expressivity and lacking in human-understandable representation. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak by Abd Razak, Hana'

    Published 2020
    “…Convolution Neural Network (CNN) using deep learning algorithm is chosen in identifying frequency of movement and execution time of housebreaking crime. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud by Mat Daud, Nur Shafikah

    Published 2014
    “…The problem facing on how to track people with anonymous involve matters of legal issues and cyber crime. Based on this research, the objectives to be achieved are to identify IP Address of anonymous tracker, to locate IP Address where anonymous tracker location and comparison of anonymous tracker algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Fingerprint recognition system by Rohani, Abu Bakar

    Published 2005
    “…To solve this problem,a prototype for recognition fingerprint was implemented the Fast Fourier Transform (FFT) technique for features extraction and Euclidean Distance for template matching.The waterfall methodology has been used in this prototype because it can provide an orderly sequence of development steps and help to ensure the and quality,reliability, maintainability.Features extraction algorithm will produce the reference number.In addition, template matching algorithm will do the comparison between the fingerprint image based on the reference number either it is similar or not.As a result of this technique, the input fingerprint image will be match with the store fingerprint image if there are the similar images. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Towards a self-adaptive agent-based simulation model by Loo Y.L., Tang A.Y.C., Ahmad A., Mustapha A.

    Published 2023
    “…The self-adapt capability is enabled by a governing algorithm within the model and is conceptually illustrated through a case study of crime report process ABS modelling. � 2005 - 2016 JATIT & LLS. …”
    Article
  16. 16

    Credit Card Fraud Detection Using New Preprocessing And Hybrid Machine Learning Techniques by Gasim, Esraa Faisal Malik

    Published 2023
    “…The developed preprocessing technique consists of three phases. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Doctor-patient remote consultation system with secure medical images by Teh, Yee Heng

    Published 2022
    “…In this rapid developing world, everything around us has becoming more and more digital related. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  19. 19

    HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM by LO , TIMOTHY YIN HONG

    Published 2019
    “…A video sequence consists of sequences of frame, with the detection algorithm, these frames can be analyzed and detect any” “abnormal behavior such as crime.” …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10 by Rayman, Dafiqah Mior, Asmawi, Aziah, Mohd Ariffin, Noor Afiza

    Published 2022
    “…In addition, the SHA-1 hashing algorithm was used to improve the evidence's integrity. …”
    Get full text
    Get full text
    Article