Search Results - (( parallel distribution function algorithm ) OR ( fraud detection method algorithm ))
Search alternatives:
- parallel distribution »
- function algorithm »
- method algorithm »
-
1
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
2
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…In this article, we propose a new fraud detection algorithm using Gaussian mixed model (GMM), a probabilistic model successfully used in speech recognition problem. …”
Get full text
Get full text
Conference or Workshop Item -
3
Embedded parallel distributed artificial intelligent processors for adaptive beam forming in WCDMA system
Published 2023Subjects:Conference paper -
4
Credit Card Fraud Detection Using AdaBoost and Majority Voting
Published 2018“…In this paper, machine learning algorithms are used to detect credit card fraud. Standard models are first used. …”
Get full text
Get full text
Article -
5
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
Get full text
Get full text
Thesis -
6
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
7
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
Get full text
Get full text
Get full text
Article -
8
Employing Artificial Intelligence to Minimize Internet Fraud
Published 2009“…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
Get full text
Get full text
Article -
9
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…The identification of outliers can lead to the discovery of unexpected knowledge in areas such as credit card fraud detection, calling card fraud detection, discovering criminal behaviors, discovering computer intrusion, etc. …”
Get full text
Get full text
Conference or Workshop Item -
10
High performance visualization of human tumor growth software
Published 2008“…The platform for high performance computing of the parallel algorithms run on a distributed parallel computer system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
High performance simulation for brain tumors growth using parabolic equation on heterogeneous parallel computer systems
Published 2007“…This paper focuses on the implementation of parallel algorithm for the simulation of brain tumours growth using one dimensional parabolic equation, design on a distributed parallel computer system. …”
Get full text
Get full text
Article -
12
A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh
Published 2019“…The empirical results positively indicate that the hybrid model with the sliding window method is able to yield a good accuracy rate of 82.4% in detecting fraud cases in real world credit card transactions. …”
Get full text
Get full text
Get full text
Thesis -
13
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…The first step lies at the modelling of parallel applications running on heterogeneous parallel computers. …”
Get full text
Get full text
Thesis -
14
High performance simulation for brain tumours growth using parabolic equation on heterogeneous parallel computer system
Published 2007“…This paper focuses on the implementation of parallel algorithm for the simulation of brain tumours growth using one dimensional parabolic equation, design on a distributed parallel computer system. …”
Get full text
Get full text
Get full text
Article -
15
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023“…The algorithm works by finding the minimum transmitter power with the help of Distributed Parallel Genetic Algorithm (DPGA) employed on an offload microcontroller system to form optimal beam coverage to reduce power usage of adaptive antenna at WCDMA base station. …”
Conference paper -
16
A critical analysis of simulators in grid
Published 2015“…In parallel and distributed computing environment such as "The Grid", anticipating the behavior of the resources and tasks based on certain scheduling algorithm is a great challenging.Thus, studying and improving these types of environments becomes very difficult. …”
Get full text
Get full text
Get full text
Article -
17
Implementation of Parallel K-Means Algorithm to Estimate Adhesion Failure in Warm Mix Asphalt
Published 2020“…The results showed that the PKIP algorithm decreases the execution time up to 30 to 46 if compared with the sequential k means algorithm when implemented using multiprocessing and distributed computing. …”
Get full text
Get full text
Article -
18
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…The method used to detect fake e-mail is by tracing back the email header. …”
Get full text
Get full text
Research Reports -
19
Distributed parallel deep learning with a hybrid backpropagation-particle swarm optimization for community detection in large complex networks
Published 2022“…In addition, a distributed environment is set up to conduct parallel optimization of the proposed method so that multi-local optimizations could be performed simultaneously. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Automatic generic process migration system in linux
Published 2012“…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
Get full text
Get full text
Thesis
