Search Results - (( java implementation path algorithm ) OR ( fraud detection techniques algorithm ))
Search alternatives:
- detection techniques »
- java implementation »
- implementation path »
- path algorithm »
-
1
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023“…This research discusses fraud detection specifically within the shipping industry using data analytics techniques. …”
text::Thesis -
2
Employing Artificial Intelligence to Minimize Internet Fraud
Published 2009“…Initially this paper describes how artificial intelligence techniques are employed in syst ems for detecting credit card fraud (online and offline) and insider trading within the Bourses. …”
Get full text
Get full text
Article -
3
A Location-Based Fraud Detection in Shipping Industry Using Machine Learning Comparison Techniques
Published 2025“…A study reviewed existing fraud detectionFraud detection models and identified the most effective algorithm for the shipping industry. …”
Book chapter -
4
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
5
Credit Card Fraud Detection Using New Preprocessing And Hybrid Machine Learning Techniques
Published 2023“…The second contribution to this research is to develop multiple hybrid machine learning models in order to enhance the detection of fraudulent activities in the credit card fraud detection domain.…”
Get full text
Get full text
Thesis -
6
Building classification models from imbalanced fraud detection data / Terence Yong Koon Beh, Swee Chuan Tan and Hwee Theng Yeo
Published 2014“…This paper reports our experience in applying data balancing techniques to develop a classifier for an imbalanced real-world fraud detection data set. …”
Get full text
Get full text
Get full text
Article -
7
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
8
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005Get full text
Get full text
Conference or Workshop Item -
9
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
Get full text
Get full text
Get full text
Article -
10
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
11
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Forensic accountants, auditors and fraud capability and competence requirements in the Nigerian public sector
Published 2014“…The research findings provided support for the differences between groups (forensic accountants and auditors) hypotheses in the area of fraud detection, prevention and response. Importantly, forensic accountants have higher levels of knowledge (KR), skills (SR), mindset (MR), fraud related problem representation (FRPR), and task performance fraud risk assessment (TPFRA) than auditors. …”
Get full text
Get full text
Get full text
Thesis -
13
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
14
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023“…Consequently, it is critical to identify effective detection techniques for fraudulent websites. The research consists of analysing the characteristics of phishing websites, extracting their essential features using the wrapper method, and classifying websites as phishing or legitimate using supervised and unsupervised learning algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
An enhanced android botnet detection approach using feature refinement
Published 2019“…Although the existing analyses have been obtained a good accuracy, but the attackers find novel ways of skipping the detection while performing harmful activities. Furthermore, the existing detection techniques can detect only malicious Android applications, while they are unable to detect the Android botnet applications. …”
Get full text
Get full text
Thesis -
17
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…In this paper, a novel URL phishing detection technique based on BERT feature extraction and a deep learning method is introduced. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis
