Search Results - (( fraud detection learning algorithm ) OR ( java application optimized algorithm ))
Search alternatives:
- optimized algorithm »
- detection learning »
- learning algorithm »
- java application »
-
1
Detection of Fraud and Non-Fraud Transaction using Machine Learning Algorithm
Published 2022Get full text
Get full text
Final Year Project -
2
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023“…Results from this study indicates the usage of k-NN is proven to be most effective algorithm in terms of performance and accuracy required by the shipping industry fraud detection.…”
text::Thesis -
3
Credit Card Fraud Detection Using AdaBoost and Majority Voting
Published 2018“…In this paper, machine learning algorithms are used to detect credit card fraud. …”
Get full text
Get full text
Article -
4
Credit Card Fraud Detection Using New Preprocessing And Hybrid Machine Learning Techniques
Published 2023“…The second contribution to this research is to develop multiple hybrid machine learning models in order to enhance the detection of fraudulent activities in the credit card fraud detection domain.…”
Get full text
Get full text
Thesis -
5
A Location-Based Fraud Detection in Shipping Industry Using Machine Learning Comparison Techniques
Published 2025Book chapter -
6
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
7
A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh
Published 2019“…Standard base machine learning algorithms, which include a total of twelve individual methods as well as the AdaBoost and Bagging methods, are firstly used. …”
Get full text
Get full text
Get full text
Thesis -
8
Building classification models from imbalanced fraud detection data / Terence Yong Koon Beh, Swee Chuan Tan and Hwee Theng Yeo
Published 2014“…This paper reports our experience in applying data balancing techniques to develop a classifier for an imbalanced real-world fraud detection data set. We evaluated the models generated from seven classification algorithms with two simple data balancing techniques. …”
Get full text
Get full text
Get full text
Article -
9
Development of an intelligent information system for financial analysis depend on supervised machine learning algorithms
Published 2022“…In the financial sector, machine learning algorithms are used to detect fraud, automate trading, and provide financial advice to investors. …”
Get full text
Get full text
Article -
10
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
12
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
13
-
14
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
15
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023“…Consequently, it is critical to identify effective detection techniques for fraudulent websites. The research consists of analysing the characteristics of phishing websites, extracting their essential features using the wrapper method, and classifying websites as phishing or legitimate using supervised and unsupervised learning algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
17
Student attendance system using facial recognition based on deep learning / Syahila Aina Haris and Zulfikri Paidi
Published 2023“…In this suggested system, K-NN is used to categorize student faces, deep metric learning is used to build facial embedding, and Convolutional Neural Network (CNN) is used to detect faces in photos. …”
Get full text
Get full text
Book Section -
18
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…In this paper, a novel URL phishing detection technique based on BERT feature extraction and a deep learning method is introduced. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis
