Search Results - (( fraud detection computer algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
-
1
Credit Card Fraud Detection Using AdaBoost and Majority Voting
Published 2018Get full text
Get full text
Article -
2
Employing Artificial Intelligence to Minimize Internet Fraud
Published 2009“…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
Get full text
Get full text
Article -
3
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
4
-
5
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…The identification of outliers can lead to the discovery of unexpected knowledge in areas such as credit card fraud detection, calling card fraud detection, discovering criminal behaviors, discovering computer intrusion, etc. …”
Get full text
Get full text
Conference or Workshop Item -
6
Botnet detection using automated script / Norfathin Rosli
Published 2020“…The project is dedicated for Network and Security Analyst to develop better algorithm for botnet detect and prevents. This Botnet are malicious software that controlled networks of hijacked computers and aiming for distributed coordinate network initiate various malicious over network activities including click fraud, spam, and phishing. …”
Get full text
Get full text
Thesis -
7
RFID-enabled supply chain detection using clustering algorithms
Published 2015Get full text
Get full text
Conference or Workshop Item -
8
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…Boyer - Moore algorithm was claimed to be the fastest algorithm among the others. …”
Get full text
Get full text
Research Reports -
9
-
10
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
12
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
13
-
14
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
15
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
17
Student attendance system using facial recognition based on deep learning / Syahila Aina Haris and Zulfikri Paidi
Published 2023“…As a result, the computer can identify faces. This algorithm can identify the faces of students who appear in class, and their attendance will be recorded automatically into the system. …”
Get full text
Get full text
Book Section -
18
An enhanced android botnet detection approach using feature refinement
Published 2019“…Although the existing analyses have been obtained a good accuracy, but the attackers find novel ways of skipping the detection while performing harmful activities. Furthermore, the existing detection techniques can detect only malicious Android applications, while they are unable to detect the Android botnet applications. …”
Get full text
Get full text
Thesis -
19
-
20
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis
