Search Results - (( java implementation path algorithm ) OR ( fraud detection based algorithm ))

Refine Results
  1. 1

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Employing Artificial Intelligence to Minimize Internet Fraud by Wong, E.S.K.

    Published 2009
    “…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
    Get full text
    Get full text
    Article
  7. 7

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Outlier Detection Technique in Data Mining: A Research Perspective by Mansur, M. O., Md. Sap, Mohd. Noor

    Published 2005
    “…In this paper we will explain the first part of our research, which is focused on outlier identification and provide a description of why an identified outlier exceptional, based on Distance-Based outlier detection and Density-Based outlier detection.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  11. 11

    RFID-enabled supply chain detection using clustering algorithms by Azahar, T.F., Mahinderjit-Singh, M., Hassan, R.

    Published 2015
    “…We propose to use clustering algorithms in order to detect counterfeit in supply chain management. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh by Kuldeep Kaur , Ragbir Singh

    Published 2019
    “…Standard base machine learning algorithms, which include a total of twelve individual methods as well as the AdaBoost and Bagging methods, are firstly used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Detection of energy theft and defective smart meters in smart grids using linear regression by Yip, S.C., Wong, K., Hew, W.P., Gan, M.T., Phan, R.C.W., Tan, S.W.

    Published 2017
    “…In this paper, we design two linear regression-based algorithms to study consumers’ energy utilization behavior and evaluate their anomaly coefficients so as to combat energy theft caused by meter tampering and detect defective smart meters. …”
    Get full text
    Get full text
    Article
  15. 15

    Efficient ML technique in blockchain-based solution in carbon credit for mitigating greenwashing by Raja Segaran, Bama, Mohd Rum, Siti Nurulain, Hafez Ninggal, Mohd Izuan, Mohd Aris, Teh Noranis

    Published 2025
    “…However, while blockchain ensures transparency, it lacks real-time anomaly detection capabilities. ML algorithms, particularly supervised models such as Random Forest, XGBoost, and Neural Networks, are well-suited for detecting fraudulent patterns and verifying the authenticity of forest carbon credit transactions. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An enhanced android botnet detection approach using feature refinement by Anwar, Shahid

    Published 2019
    “…The obtained results show that by using the additional features the detection accuracy improved. The experimental evaluation based on real-world benchmark datasets shows that the selected unique patterns can achieve high detection accuracy with low false positive rate. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Student attendance system using facial recognition based on deep learning / Syahila Aina Haris and Zulfikri Paidi by Haris, Syahila Aina, Paidi, Zulfikri

    Published 2023
    “…The procedure has a number of drawbacks, such as taking a long time to complete attendance, attendance papers are lost, the administration must manually enter each student’s attendance information into the computer and there is also a possibility of attendance fraud among students. In order to overcome this problem, this paper suggested a web-based face recognition student attendance system as a solution to this problem. …”
    Get full text
    Get full text
    Book Section
  20. 20