Showing 641 - 660 results of 1,665 for search 'T13 (classification)', query time: 0.06s Refine Results
  1. 641

    Research on credit card transaction security supervision based on PU learning by Renfeng CHEN, Hongbin ZHU

    Published 2023-06-01
    “…The complex and ever-evolving nature of credit card cash out methods and the emergence of various forms of fake transactions present challenges in obtaining accurate transaction information during customer interactions.In order to develop an accurate supervision method for detecting fake credit card transactions, a PU (positive-unlabeled learning) based security identification model for single credit card transactions was established.It was based on long-term transaction label data from cashed-up accounts in commercial banks’ credit card systems.A Spy mechanism was introduced into sample data annotation by selecting million positive samples of highly reliable cash-out transactions and 1.3 million samples of transactions to be labeled, and using a learner to predict the result distribution and label negative samples of non-cash-out transactions that were difficult to identify, resulting in 1.2 million relatively reliable negative sample labels.Based on these samples, 120 candidate variables were constructed, including credit card customer attributes, quota usage, and transaction preference characteristics.After importance screening of variables, nearly 50 candidate variables were selected.The XGBoost binary classification algorithm was used for model development and prediction.The results show that the proposed model achieve an identification accuracy of 94.20%, with a group stability index (PSI) of 0.10%, indicating that the single credit card transaction security identification model based on PU learning can effectively monitor fake transactions.This study improves the model discrimination performance of machine learning binary classification algorithm in scenarios where high-precision sample label data is difficult to obtain, providing a new method for transaction security monitoring in commercial bank credit card systems.…”
    Get full text
    Article
  2. 642

    Presenting a model for the diagnosis of heart failure using cumulative and deep learning algorithms: a case study of tehran heart center by Amir Hossein Hariri, Esmaeil Bagheri, Sayyed Mohammad Reza Davoodi

    Published 2022-03-01
    “…The present study aimed to determine the patterns of cardiovascular diseases using integrated classification techniques for analyzing the data of internal medicine patients who are at the risk of heart failure with 451 samples and 13 characteristics. …”
    Get full text
    Article
  3. 643
  4. 644
  5. 645

    The Exponential Diophantine Equation 2x+by=cz by Yahui Yu, Xiaoxue Li

    Published 2014-01-01
    “…In this paper, a classification of all positive integer solutions (x,y,z) of the equation 2x+by=cz is given. …”
    Get full text
    Article
  6. 646
  7. 647

    Android malware detection based on APK signature information feedback by Xin-yu LIU, Jian WENG, Yue ZHANG, Bing-wen FENG, Jia-si WENG

    Published 2017-05-01
    “…A new malware detection method based on APK signature of information feedback (SigFeedback) was proposed.Based on SVM classification algorithm,the method of eigenvalue extraction adoped heuristic rule learning to sig APK information verify screening,and it also implemented the heuristic feedback,from which achieved the purpose of more accurate detection of malicious software.SigFeedback detection algorithm enjoyed the advantage of the high detection rate and low false positive rate.Finally the experiment show that the SigFeedback algorithm has high efficiency,making the rate of false positive from 13% down to 3%.…”
    Get full text
    Article
  8. 648
  9. 649
  10. 650
  11. 651
  12. 652

    Hypersurface Constrained Elasticae in Lorentzian Space Forms by Óscar J. Garay, Álvaro Pámpano, Changhwa Woo

    Published 2015-01-01
    “…We characterize critical geodesics showing that they live fully immersed in a totally geodesic M13(c) and that they must be of three different types. …”
    Get full text
    Article
  13. 653
  14. 654
  15. 655
  16. 656
  17. 657

    ASSESSMENT OF POSSIBLE USE OF CARBON ISOTOPE RATIOS IN AMINO ACIDS FOR MEAT PRODUCT GEOGRAPHICAL ORIGIN IDENTIFICATION by A. I. Solovyev, I. V. Podkolzin

    Published 2018-04-01
    “…Upon results of isotope ratio (δ13C) determination in amino acids after gas chromatographic separation samples were classified using Support Vector Machines and linear discriminate analysis. …”
    Get full text
    Article
  18. 658
  19. 659
  20. 660