Search Results - (( developing learning fraud algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- fraud algorithm »
- learning fraud »
-
1
Detection of Fraud and Non-Fraud Transaction using Machine Learning Algorithm
Published 2022Get full text
Get full text
Final Year Project -
2
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023“…A number of popular existing algorithms were used to execute the model developed in Rapid tool such as Naïve Bayes , Neural Net , Deep Learning, Decision Tree, Logistic Regression, SVM and k-NN. …”
text::Thesis -
3
Credit Card Fraud Detection Using New Preprocessing And Hybrid Machine Learning Techniques
Published 2023“…The second contribution to this research is to develop multiple hybrid machine learning models in order to enhance the detection of fraudulent activities in the credit card fraud detection domain.…”
Get full text
Get full text
Thesis -
4
A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh
Published 2019“…To bridge this gap, this research embarks on developing a hybrid machine learning approach to identify credit card fraud cases based on both benchmark and real-world data. …”
Get full text
Get full text
Get full text
Thesis -
5
Development of an intelligent information system for financial analysis depend on supervised machine learning algorithms
Published 2022“…In the financial sector, machine learning algorithms are used to detect fraud, automate trading, and provide financial advice to investors. …”
Get full text
Get full text
Article -
6
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Conference Paper -
7
Building classification models from imbalanced fraud detection data / Terence Yong Koon Beh, Swee Chuan Tan and Hwee Theng Yeo
Published 2014“…This paper reports our experience in applying data balancing techniques to develop a classifier for an imbalanced real-world fraud detection data set. …”
Get full text
Get full text
Get full text
Article -
8
Integration of spectroscopy and chemometric analysis for food authentication: a review
Published 2025“…This review presents a comparative synthesis of algorithms for various types of food samples, highlighting the performance of predictive algorithms. …”
Get full text
Get full text
Get full text
Article -
9
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
10
Student attendance system using facial recognition based on deep learning / Syahila Aina Haris and Zulfikri Paidi
Published 2023“…The development of this system is also assisted by several other software. …”
Get full text
Get full text
Book Section -
11
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023“…The research consists of analysing the characteristics of phishing websites, extracting their essential features using the wrapper method, and classifying websites as phishing or legitimate using supervised and unsupervised learning algorithms. The study evaluates and compares the efficacy of multiple machine learning algorithms, including the Autoencoder classifier, Extreme Gradient Boost (XGBoost), and Random Forest classifier, using metrics such as accuracy, precision, recall, and F1-score. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
-
13
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…However, three scenarios were developed to compare the outcomes of the proposed method by using similar datasets. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
15
-
16
الضوابط الشرعية والمهنية للعملات الافتراضية في ظل الرقمنة المالية
Published 2026journal::journal article
