Search Results - (( wave estimation method algorithm ) OR ( fraud detection method algorithm ))
Search alternatives:
- estimation method »
- method algorithm »
- wave estimation »
-
1
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
2
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…In this article, we propose a new fraud detection algorithm using Gaussian mixed model (GMM), a probabilistic model successfully used in speech recognition problem. …”
Get full text
Get full text
Conference or Workshop Item -
3
Credit Card Fraud Detection Using AdaBoost and Majority Voting
Published 2018“…In this paper, machine learning algorithms are used to detect credit card fraud. Standard models are first used. …”
Get full text
Get full text
Article -
4
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
5
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
Get full text
Get full text
Get full text
Article -
6
Employing Artificial Intelligence to Minimize Internet Fraud
Published 2009“…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
Get full text
Get full text
Article -
7
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…The identification of outliers can lead to the discovery of unexpected knowledge in areas such as credit card fraud detection, calling card fraud detection, discovering criminal behaviors, discovering computer intrusion, etc. …”
Get full text
Get full text
Conference or Workshop Item -
8
A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh
Published 2019“…The empirical results positively indicate that the hybrid model with the sliding window method is able to yield a good accuracy rate of 82.4% in detecting fraud cases in real world credit card transactions. …”
Get full text
Get full text
Get full text
Thesis -
9
Estimation of Response Transfer Functions of Offshore Structures Using the Time-Varying ARX Model
Published 2013“…The proposed approach outlined here has shown the tremendous potential in the estimation of transfer function. The results indicate that TVARX model produces accurate, smooth and less noise TF estimates over DFT method. …”
Get full text
Get full text
Conference or Workshop Item -
10
Seismic wave modeling and high-resolution imaging
Published 2022“…The wave-modeling and imaging algorithm is implemented on two velocity models: the Marmousi model and the Sigsbee model. …”
Get full text
Get full text
Book -
11
Evaluation of lightning location and lightning current wave shape using measured lightning magnetic fields at two stations
Published 2016“…The proposed method can be helpful for creating lightning location and lightning current data banks as it can estimate the full shape of the current as opposed to the usual methods used previously.…”
Get full text
Get full text
Conference or Workshop Item -
12
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…The method used to detect fake e-mail is by tracing back the email header. …”
Get full text
Get full text
Research Reports -
13
Utilization of canny and velocity bunching algorithms for modelling shoreline change
Published 2006“…There is significant relationship between shoreline change rate estimated using Canny algorithm and ones modeled using velocity bunching model. …”
Get full text
Get full text
Conference or Workshop Item -
14
Performance of DOA estimation algorithms for acoustic localization of indoor flying drones using artificial sound source
Published 2024“…The strategy is simulated to assess localization performance of three different types of chirping sounds indoors using six microphone arrays. The estimated direction of arrival (DOA) of the chirping sound is calculated using several published algorithms that include MUSIC, CSSM, SRP-PHAT, TOPS and WAVES. …”
Get full text
Get full text
Get full text
Article -
15
Estimating the direction of arrival of the multipath radio signal using Capon technique / Haslinah Ruslan
Published 1996“…To overcome the problem, Capon method is introduced. Capon method provides high resolution estimation of the DOA of the multipath radio signals. …”
Get full text
Get full text
Thesis -
16
The potential of shear wave velocity as an erosion risk index
Published 2022“…Therefore, this study aims to develop a relation between ROM scale and shear wave velocity estimated by the spectral-analysis-of-surface-waves (SASW) method. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
k- Nearest Neighbor Algorithm For Improving Accuracy In Clutter Based Location Estimation Of Wireless Nodes
Published 2013“…This research is focusing on the precise location estimation of mobile node by using k - nearest neighbor algorithm (k-NN). …”
-
18
Early detection of breast cancer using wave elliptic equation with high performance computing
Published 2008“…The numerical finite-difference method is chosen as a platform for discretizing the wave equations. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Estimating Marine CSEM Responses Using Gaussian Process Regression Based on Synthetic Models
Published 2022“…The resulting error measurements and the computational time revealed that GPR can estimate the marine CSEM responses efficiently and at par to the current methods. …”
Get full text
Get full text
Article -
20
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…The results showed that the proposed method was efficient and valid in detecting phishing websites’ URLs.…”
Get full text
Get full text
Get full text
Get full text
Article
