-
561
High Performance CDR Processing with MapReduce
Published 2016-08-01“…It contains valuable information for many purposes in several domains, such as billing, fraud detection and analytical purposes. However, in the real world these needs face a big data challenge. …”
Get full text
Article -
562
Trigger Factors of Fraud Triangle Toward Fraud On Financial Reporting Moderated by Integration Of Technology Industry 4.0
Published 2021-01-01“…As Industry 4.0 ushers the use of new technology, the use of computerized systems for huge data analysis has advantage and disadvantage in audit and fraud detection. Therefore, our research uses the integration of technology 4.0 as a moderating variable on fraudulent financial reporting. …”
Get full text
Article -
563
FinTech enablers, use cases, and role of future internet of things
Published 2023-01-01“…By the inception of technology, several major financial services and processes such as lending, verification, fraud detection, quality maintenance, credit scoring, and many more will be simplified and augmented. …”
Get full text
Article -
564
Object Detection in Online Proctoring Through Two Camera Using Faster-RCNN
Published 2023-04-01“…The evaluation of the training results using the COCO evaluator showed the average of the bbox-AP is 59,169. The fraud detection process is carried out using 6 exam videos with a total of 192,929 frames, producing two outputs, namely object detection videos and csv files. …”
Get full text
Article -
565
Automated Data Slicing for Model Validation: A Big data - AI Integration Approach
Published 2022“…Applications include diagnosing model fairness and fraud detection, where identifying slices that are interpretable to humans is crucial. …”
Get full text
Article -
566
Outlier detection based on neighborhood proximity
Published 2010“…In general, outlier detection has many practical applications, especially in domains that have scope for abnormal behavior, such as fraud detection, network intrusion detection, medical diagnosis, marketing, customer segmentation, etc. …”
Get full text
Thesis -
567
Forensic Accounting And Corporate Governance Maturity: Case Of Public Listed Companies In Oman
Published 2019“…Traditional audit activities have overlooked the role towards fraud detection which created expectation gaps; and due to this reason, inclusion of forensic accounting can be considered as an integral part in governance management system. …”
Get full text
Thesis -
568
Validity and reliability of the utilitarian value, hedonic value, brand satisfaction, emotional attachment, brand trust and mobile phone brand loyalty scales
Published 2016“…This paper examines the impact of fraud specific problem representation (FSPR) on the relationship with Accountants’ Skills Requirement (SR) and Fraud risk assessment (FRA) in the Nigerian public sector.The research methodology is quantitative with cross-sectional design and survey.The respondents are accountants (i.e. auditors and forensic accountants) in the public sector accounting and auditing institutions.The study addresses the gap in the literature by highlighting the significant influence of FSPR on SR and FRA regarding fraud detection, prevention and response.The findings from a second generation statistical analysis tool of the Partial Least Square-Structural Equation Modelling (PLS-SEM) confirm the direct relationship of accountants’ skills on fraud risk assessment. …”
Get full text
Article -
569
An empirical evaluation of sampling methods for the classification of imbalanced data.
Published 2022-01-01“…For example, positive examples are rare in the fields of disease diagnosis and credit card fraud detection. General machine learning methods are known to be suboptimal for such imbalanced classification. …”
Get full text
Article -
570
Locality and Consistency Based Sequential Ensemble Method for Outlier Detection
Published 2022-01-01“…Outlier detection has been widely used in many fields,such as network intrusion detection,credit card fraud detection,etc.The increase in data dimensions leads to many irrelevant and redundant features,which will obscure the relevant features and result in false positive results.Due to the sparseness and distance aggregation effects of high-dimensional data,the traditional outlier detection algorithms based on density and distance are no longer applicable.Most of the outlier detection research based on machine learning focuses on a single model,which has certain deficiencies in anti-overfitting ability.The ensemble learning model has good generalization ability,and in actual application shows better prediction accuracy than the single model.This paper proposes an outlier detection sequence integration method LCSE based on neighborhood consistency (locality and consistency based sequential ensemble method for outlier detection).Firstly,it constructs a basic model of outlier detection based on diversity,secondly,selects the abnormal candidate points according to the global integration consistency,and finally considers the local neighborhood correlation of the data to select and combine the basic model results.Experiments verify that LCSE has an average outlier detection accuracy increase of 20.7% compared with traditional methods.Compared with the ensemble methods LSCP_AOM and iForest,the performance is increased by 3.6% on average.Therefore,it is better than other ensemble methods and neural network methods.…”
Get full text
Article -
571
Implementation of artificial intelligence technologies in corporate finance: classification by spheres of activity
Published 2022-12-01“…Namely, in the areas of: accounting (accounts receivable management, accounts payable control, reporting, financial planning and analysis), external finance processes, internal audit, forensic accounting and fraud detection, work of CFO. The main benefits of such technological implementation are also defined for three groups: efficiency, control and decision-making. …”
Get full text
Article -
572
The OCS-SVM: An Objective-Cost-Sensitive SVM With Sample-Based Misclassification Cost Invariance
Published 2019-01-01“…On the other hand, many real-world problems, such as credit card fraud detection, intrusion detection, oil-spill detection and cancer diagnosis, usually involve substantially unequal misclassification costs. …”
Get full text
Article -
573
Urdu Wikification and Its Application in Urdu News Recommendation System
Published 2022-01-01“…Many natural language processing applications, including question-answering systems, information retrieval, fraud detection, and recommendation systems(RS), can benefit from this information extraction technique. …”
Get full text
Article -
574
Deep Learning-Based Anomaly Detection in Video Surveillance: A Survey
Published 2023-05-01“…There has been a variety of surveys of anomaly detection, such as of network anomaly detection, financial fraud detection, human behavioral analysis, and many more. …”
Get full text
Article -
575
Fraud prediction using machine learning: The case of investment advisors in Canada
Published 2022-06-01“…The findings are particularly relevant to regulators seeking new and effective fraud detection techniques while providing enhanced clarity to Canada’s financial markets’ self-regulation.…”
Get full text
Article -
576
Fingerprint recognition based on shark smell optimization and genetic algorithm
Published 2020-07-01“…It is also possibly applied to other research topics such as fraud detection, e-payment, and other real-life applications authentication.…”
Get full text
Article -
577
FIA-ESI-MS Fingerprinting Method with Chemometrics for the Characterization of Adulterated Coffee Samples
Published 2021-10-01“…This work will focus on the theme of fraud detection in coffee, one of the most popular beverages in the world. …”
Get full text
Article -
578
Accelerating Pattern Matching Using a Novel Multi-Pattern-Matching Algorithm on GPU
Published 2023-07-01“…Therefore, it is important to analyze packet contents in applications that require control over payloads, such as content filtering, intrusion detection systems (IDSs), data loss prevention systems (DLPs), and fraud detection. This technology, known as deep packet inspection (DPI), provides full control over the communication between two end stations by keenly analyzing the network traffic. …”
Get full text
Article -
579
Interpretable Single-dimension Outlier Detection (ISOD): An Unsupervised Outlier Detection Method Based on Quantiles and Skewness Coefficients
Published 2023-12-01“…A crucial area of study in data mining is outlier detection, particularly in the areas of network security, credit card fraud detection, industrial flaw detection, etc. Existing outlier detection algorithms, which can be divided into supervised methods, semi-supervised methods, and unsupervised methods, suffer from missing labeled data, the curse of dimensionality, low interpretability, etc. …”
Get full text
Article -
580
A Participation Degree-Based Fault Detection Method for Wireless Sensor Networks
Published 2019-03-01“…In wireless sensor networks (WSNs), there are many challenges for outlier detection, such as fault detection, fraud detection, intrusion detection, and so on. In this paper, the participation degree of instances in the hierarchical clustering process infers the relationship between instances. …”
Get full text
Article