Results for 'Cyber Security, Financial Fraud Prediction, Classification, Deep Learning, Fraud Detection.'

976 found
Order:
  1.  24
    Quantitative Detection of Financial Fraud Based on Deep Learning with Combination of E-Commerce Big Data.Jian Liu, Xin Gu & Chao Shang - 2020 - Complexity 2020:1-11.
    At present, there are more and more frauds in the financial field. The detection and prevention of financial frauds are of great significance for regulating and maintaining a reasonable financial order. Deep learning algorithms are widely used because of their high recognition rate, good robustness, and strong implementation. Therefore, in the context of e-commerce big data, this paper proposes a quantitative detection algorithm for financial fraud based on deep learning. First, the encoders are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  33
    Detecting racial inequalities in criminal justice: towards an equitable deep learning approach for generating and interpreting racial categories using mugshots.Rahul Kumar Dass, Nick Petersen, Marisa Omori, Tamara Rice Lave & Ubbo Visser - 2023 - AI and Society 38 (2):897-918.
    Recent events have highlighted large-scale systemic racial disparities in U.S. criminal justice based on race and other demographic characteristics. Although criminological datasets are used to study and document the extent of such disparities, they often lack key information, including arrestees’ racial identification. As AI technologies are increasingly used by criminal justice agencies to make predictions about outcomes in bail, policing, and other decision-making, a growing literature suggests that the current implementation of these systems may perpetuate racial inequalities. In this paper, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  18
    Prediction and Classification of Financial Criteria of Management Control System in Manufactories Using Deep Interaction Neural Network (DINN) and Machine Learning.Amir Yousefpour & Hamid Mazidabadi Farahani - 2022 - Complexity 2022:1-12.
    The management control system aids administrators in guiding a business toward its organizational plans; as a result, management control is primarily concerned with the execution of the plan and plans. Financial and nonfinancial criteria are used to create management control systems. The financial element focuses on net income, earnings, and other financial metrics. The two components of leadership strategy in this study are cost and differentiation, which highlight the strategy of differentiation in attaining higher quality due to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  42
    A novel deep learning-based brain tumor detection using the Bagging ensemble with K-nearest neighbor.G. Komarasamy & K. V. Archana - 2023 - Journal of Intelligent Systems 32 (1).
    In the case of magnetic resonance imaging (MRI) imaging, image processing is crucial. In the medical industry, MRI images are commonly used to analyze and diagnose tumor growth in the body. A number of successful brain tumor identification and classification procedures have been developed by various experts. Existing approaches face a number of obstacles, including detection time, accuracy, and tumor size. Early detection of brain tumors improves options for treatment and patient survival rates. Manually segmenting brain tumors from a significant (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  24
    Cryptocurrency Financial Risk Analysis Based on Deep Machine Learning.Si Chen - 2022 - Complexity 2022:1-8.
    Digital currency is considered a form of currency which is used in the digital world such as digital forms or electronic devices. Several terms are synonyms for digital currency like digital money, electronic money, and cyber cash. Accurate prediction of the digital currency is an urgent necessity due to its impacts on the economic community. The electronic economy is very dangerous and must be approached with great caution, so as to avoid or minimize the risks that occur in such (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6. Using Deep Learning to Detect Facial Markers of Complex Decision Making.Gianluca Guglielmo, Irene Font Peradejordi & Michal Klincewicz - 2022 - In C. Browne, A. Kishimoto & J. Schaeffer, Advances in Computer Games. ACG 2021. Lecture Notes in Computer Science. Springer. pp. 187-196.
    In this paper, we report on an experiment with The Walking Dead (TWD), which is a narrative-driven adventure game where players have to survive in a post-apocalyptic world filled with zombies. We used OpenFace software to extract action unit (AU) intensities of facial expressions characteristic of decision-making processes and then we implemented a simple convolution neural network (CNN) to see which AUs are predictive of decision-making. Our results provide evidence that the pre-decision variations in action units 17 (chin raiser), 23 (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  33
    Unsupervised network traffic anomaly detection with deep autoencoders.Vibekananda Dutta, Marek Pawlicki, Rafał Kozik & Michał Choraś - 2022 - Logic Journal of the IGPL 30 (6):912-925.
    Contemporary Artificial Intelligence methods, especially their subset-deep learning, are finding their way to successful implementations in the detection and classification of intrusions at the network level. This paper presents an intrusion detection mechanism that leverages Deep AutoEncoder and several Deep Decoders for unsupervised classification. This work incorporates multiple network topology setups for comparative studies. The efficiency of the proposed topologies is validated on two established benchmark datasets: UNSW-NB15 and NetML-2020. The results of their analysis are discussed in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  13
    Deep Learning Algorithm-Based Financial Prediction Models.Helin Jia - 2021 - Complexity 2021:1-9.
    In this paper, a new FEPA portfolio forecasting model is based on the EMD decomposition method. The model is based on the special empirical modal decomposition of financial time series, principal component analysis, and artificial neural network to model and forecast for nonlinear, nonstationary, multiscale complex financial time series to predict stock market indices and foreign exchange rates and empirically investigate this hot area in financial market research. The combined forecasting model proposed in this paper is based (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  34
    Predicting Protein Interactions Using a Deep Learning Method-Stacked Sparse Autoencoder Combined with a Probabilistic Classification Vector Machine.Yanbin Wang, Zhuhong You, Liping Li, Li Cheng, Xi Zhou, Libo Zhang, Xiao Li & Tonghai Jiang - 2018 - Complexity 2018:1-12.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Type of Tomato Classification Using Deep Learning.Mahmoud A. Alajrami & Samy S. Abu-Naser - 2020 - International Journal of Academic Pedagogical Research (IJAPR) 3 (12):21-25.
    Abstract: Tomatoes are part of the major crops in food security. Tomatoes are plants grown in temperate and hot regions of South American origin from Peru, and then spread to most countries of the world. Tomatoes contain a lot of vitamin C and mineral salts, and are recommended for people with constipation, diabetes and patients with heart and body diseases. Studies and scientific studies have proven the importance of eating tomato juice in reducing the activity of platelets in diabetics, which (...)
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  11.  16
    Intensive Cold-Air Invasion Detection and Classification with Deep Learning in Complicated Meteorological Systems.Ming Yang, Hao Ma, Bomin Chen & Guangtao Dong - 2022 - Complexity 2022:1-13.
    Faster R-CNN architecture is used to solve the problems of moving path uncertainty, changeable coverage, and high complexity in cold-air induced large-scale intensive temperature-reduction detection and classification, since those problems usually lead to path identification biases as well as low accuracy and generalization ability of recognition algorithm. In this paper, an improved recognition method of national ITR path in China based on faster R-CNN in complicated meteorological systems is proposed. Firstly, quality control of the original dataset of strong cooling processes (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  58
    Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks.Salama A. Mostafa, Bashar Ahmad Khalaf, Nafea Ali Majeed Alhammadi, Ali Mohammed Saleh Ahmed & Firas Mohammed Aswad - 2023 - Journal of Intelligent Systems 32 (1).
    With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  39
    Deep learning approach to text analysis for human emotion detection from big data.Jia Guo - 2022 - Journal of Intelligent Systems 31 (1):113-126.
    Emotional recognition has arisen as an essential field of study that can expose a variety of valuable inputs. Emotion can be articulated in several means that can be seen, like speech and facial expressions, written text, and gestures. Emotion recognition in a text document is fundamentally a content-based classification issue, including notions from natural language processing (NLP) and deep learning fields. Hence, in this study, deep learning assisted semantic text analysis (DLSTA) has been proposed for human emotion detection (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  37
    Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model.Basim Mahbooba, Mohan Timilsina, Radhya Sahal & Martin Serrano - 2021 - Complexity 2021:1-11.
    Despite the growing popularity of machine learning models in the cyber-security applications ), most of these models are perceived as a black-box. The eXplainable Artificial Intelligence has become increasingly important to interpret the machine learning models to enhance trust management by allowing human experts to understand the underlying data evidence and causal reasoning. According to IDS, the critical role of trust management is to understand the impact of the malicious data to detect any intrusion in the system. The previous (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  22
    Automated Multiclass Artifact Detection in Diffusion MRI Volumes via 3D Residual Squeeze-and-Excitation Convolutional Neural Networks.Nabil Ettehadi, Pratik Kashyap, Xuzhe Zhang, Yun Wang, David Semanek, Karan Desai, Jia Guo, Jonathan Posner & Andrew F. Laine - 2022 - Frontiers in Human Neuroscience 16.
    Diffusion MRI is widely used to investigate neuronal and structural development of brain. dMRI data is often contaminated with various types of artifacts. Hence, artifact type identification in dMRI volumes is an essential pre-processing step prior to carrying out any further analysis. Manual artifact identification amongst a large pool of dMRI data is a highly labor-intensive task. Previous attempts at automating this process are often limited to a binary classification of the dMRI volumes or focus on detecting a single type (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  15
    Anomaly Detection on Univariate Sensing Time Series Data for Smart Aquaculture Using Deep Learning.Visar Shehu & Aleksandar Petkovski - 2023 - Seeu Review 18 (1):1-16.
    Aquaculture plays a significant role in both economic development and food production. Maintaining an ecological environment with good water quality is essential to ensure the production efficiency and quality of aquaculture. Effective management of water quality can prevent abnormal conditions and contribute significantly to food security. Detecting anomalies in the aquaculture environment is crucial to ensure that the environment is maintained correctly to meet healthy and proper requirements for fish farming. This article focuses on the use of deep learning (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  22
    Secure Fingerprint Authentication Using Deep Learning and Minutiae Verification.S. Vadivel, Saad Bayezeed & V. M. Praseetha - 2019 - Journal of Intelligent Systems 29 (1):1379-1387.
    Nowadays, there has been an increase in security concerns regarding fingerprint biometrics. This problem arises due to technological advancements in bypassing and hacking methodologies. This has sparked the need for a more secure platform for identification. In this paper, we have used a deep Convolutional Neural Network as a pre-verification filter to filter out bad or malicious fingerprints. As deep learning allows the system to be more accurate at detecting and reducing false identification by training itself again and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  18
    Recognition of Consumer Preference by Analysis and Classification EEG Signals.Mashael Aldayel, Mourad Ykhlef & Abeer Al-Nafjan - 2021 - Frontiers in Human Neuroscience 14.
    Neuromarketing has gained attention to bridge the gap between conventional marketing studies and electroencephalography -based brain-computer interface research. It determines what customers actually want through preference prediction. The performance of EEG-based preference detection systems depends on a suitable selection of feature extraction techniques and machine learning algorithms. In this study, We examined preference detection of neuromarketing dataset using different feature combinations of EEG indices and different algorithms for feature extraction and classification. For EEG feature extraction, we employed discrete wavelet transform (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  29
    Insider attack detection in database with deep metric neural network with Monte Carlo sampling.Gwang-Myong Go, Seok-Jun Bu & Sung-Bae Cho - 2022 - Logic Journal of the IGPL 30 (6):979-992.
    Role-based database management systems are most widely used for information storage and analysis but are known as vulnerable to insider attacks. The core of intrusion detection lies in an adaptive system, where an insider attack can be judged if it is different from the predicted role by performing classification on the user’s queries accessing the database and comparing it with the authorized role. In order to handle the high similarity of user queries for misclassified roles, this paper proposes a (...) metric neural network with strategic sampling algorithm that properly extracts salient features and directly learns a quantitative measure of similarity. A strategic sampling method of heuristically generating and learning training pairs through Monte Carlo search is proposed to select a training pair that can represent the entire dataset. With the TPC-E–based benchmark data trained with 11,000 queries for 11 roles, the proposed model produces the classification accuracy of 95.41%, which is the highest compared with the previous models. The results are verified through comparison of quantitative and qualitative evaluations, and the feature space modelled in the neural network is analysed by t-SNE algorithm. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  27
    Perceived Mental Workload Classification Using Intermediate Fusion Multimodal Deep Learning.Tenzing C. Dolmans, Mannes Poel, Jan-Willem J. R. van ’T. Klooster & Bernard P. Veldkamp - 2021 - Frontiers in Human Neuroscience 14.
    A lot of research has been done on the detection of mental workload using various bio-signals. Recently, deep learning has allowed for novel methods and results. A plethora of measurement modalities have proven to be valuable in this task, yet studies currently often only use a single modality to classify MWL. The goal of this research was to classify perceived mental workload using a deep neural network that flexibly makes use of multiple modalities, in order to allow for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  17
    Automatic detection of faults in industrial production of sandwich panels using Deep Learning techniques.Sebastian Lopez Florez, Alfonso González-Briones, Pablo Chamoso & Mohd Saberi Mohamad - forthcoming - Logic Journal of the IGPL.
    The use of technologies like artificial intelligence can drive productivity growth, efficiency and innovation. The goal of this study is to develop an anomaly detection method for locating flaws on the surface of sandwich panels using YOLOv5. The proposed algorithm extracts information locally from an image through a prediction system that creates bounding boxes and determines whether the sandwich panel surface contains flaws. It attempts to reject or accept a product based on quality levels specified in the standard. To evaluate (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  53
    Instrumental Perspectivism: Is AI Machine Learning Technology like NMR Spectroscopy?Sandra D. Mitchell - unknown
    The question, “Will science remain human?” expresses a worry that deep learning algorithms will replace scientists in making crucial judgments of classification and inference and that something crucial will be lost if that happens. Ever since the introduction of telescopes and microscopes humans have relied on technologies to “extend” beyond human sensory perception in acquiring scientific knowledge. In this paper I explore whether the ways in which new learning technologies “extend” beyond human cognitive aspects of science can be treated (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  23
    Data streams classification using deep learning under different speeds and drifts.Pedro Lara-Benítez, Manuel Carranza-García, David Gutiérrez-Avilés & José C. Riquelme - 2023 - Logic Journal of the IGPL 31 (4):688-700.
    Processing data streams arriving at high speed requires the development of models that can provide fast and accurate predictions. Although deep neural networks are the state-of-the-art for many machine learning tasks, their performance in real-time data streaming scenarios is a research area that has not yet been fully addressed. Nevertheless, much effort has been put into the adaption of complex deep learning (DL) models to streaming tasks by reducing the processing time. The design of the asynchronous dual-pipeline DL (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24.  19
    Optimization of Quantitative Financial Data Analysis System Based on Deep Learning.Meiyi Liang - 2021 - Complexity 2021:1-11.
    In order to better assist investors in the evaluation and decision-making of financial data, this paper puts forward the need to build a reliable and effective financial data prediction model and, on the basis of financial data analysis, integrates deep learning algorithm to analyze financial data and completes the financial data analysis system based on deep learning. This paper introduces the implementation details of the key modules of the platform in detail. The user (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  24
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  21
    Real-Time System Prediction for Heart Rate Using Deep Learning and Stream Processing Platforms.Abdullah Alharbi, Wael Alosaimi, Radhya Sahal & Hager Saleh - 2021 - Complexity 2021:1-9.
    Low heart rate causes a risk of death, heart disease, and cardiovascular diseases. Therefore, monitoring the heart rate is critical because of the heart’s function to discover its irregularity to detect the health problems early. Rapid technological advancement allows healthcare sectors to consolidate and analyze massive health-based data to discover risks by making more accurate predictions. Therefore, this work proposes a real-time prediction system for heart rate, which helps the medical care providers and patients avoid heart rate risk in real (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  27
    Transfer Learning and Semisupervised Adversarial Detection and Classification of COVID-19 in CT Images.Ariyo Oluwasanmi, Muhammad Umar Aftab, Zhiguang Qin, Son Tung Ngo, Thang Van Doan, Son Ba Nguyen & Son Hoang Nguyen - 2021 - Complexity 2021:1-11.
    The ongoing coronavirus 2019 pandemic caused by the severe acute respiratory syndrome coronavirus 2 has resulted in a severe ramification on the global healthcare system, principally because of its easy transmission and the extended period of the virus survival on contaminated surfaces. With the advances in computer-aided diagnosis and artificial intelligence, this paper presents the application of deep learning and adversarial network for the automatic identification of COVID-19 pneumonia in computed tomography scans of the lungs. The complexity and time (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  51
    The Epistemological Consequences of Artificial Intelligence, Precision Medicine, and Implantable Brain-Computer Interfaces.Ian Stevens - 2024 - Voices in Bioethics 10.
    ABSTRACT I argue that this examination and appreciation for the shift to abductive reasoning should be extended to the intersection of neuroscience and novel brain-computer interfaces too. This paper highlights the implications of applying abductive reasoning to personalized implantable neurotechnologies. Then, it explores whether abductive reasoning is sufficient to justify insurance coverage for devices absent widespread clinical trials, which are better applied to one-size-fits-all treatments. INTRODUCTION In contrast to the classic model of randomized-control trials, often with a large number of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  26
    Deep learning for content-based image retrieval in FHE algorithms.Mustafa Musa Jaber & Sura Mahmood Abdullah - 2023 - Journal of Intelligent Systems 32 (1).
    Content-based image retrieval (CBIR) is a technique used to retrieve image from an image database. However, the CBIR process suffers from less accuracy to retrieve many images from an extensive image database and prove the privacy of images. The aim of this article is to address the issues of accuracy utilizing deep learning techniques such as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon–Kim–Kim–Song (CKKS). The system has been proposed, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  5
    Female Management Representation and Corporate Financial Fraud: Do Local Gender Norms Play a Role?Yuehua Xu, Vishal K. Gupta, Shan Xue, Sandra Mortal & Honghui Chen - forthcoming - Journal of Business Ethics:1-22.
    The debate over the benefits of female representation in top management is ongoing, with some arguing it enhances decision-making quality by bringing diverse perspectives, while others seeing it as symbolic or even detrimental. To make progress on the debate, this study takes an institutional perspective to develop a theoretical account examining the gender norms that constraining the effect of female representation in top management teams (TMTs) on corporate financial fraud. We offer two main insights: (a) female TMT representation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  20
    A Deep Neural Network Model for the Detection and Classification of Emotions from Textual Content.Muhammad Zubair Asghar, Adidah Lajis, Muhammad Mansoor Alam, Mohd Khairil Rahmat, Haidawati Mohamad Nasir, Hussain Ahmad, Mabrook S. Al-Rakhami, Atif Al-Amri & Fahad R. Albogamy - 2022 - Complexity 2022:1-12.
    Emotion-based sentimental analysis has recently received a lot of interest, with an emphasis on automated identification of user behavior, such as emotional expressions, based on online social media texts. However, the majority of the prior attempts are based on traditional procedures that are insufficient to provide promising outcomes. In this study, we categorize emotional sentiments by recognizing them in the text. For that purpose, we present a deep learning model, bidirectional long-term short-term memory, for emotion recognition that takes into (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32. Financial Statement Frauds and Auditor Sanctions: An Analysis of Enforcement Actions in China.Michael Firth, Phyllis L. L. Mo & Raymond M. K. Wong - 2005 - Journal of Business Ethics 62 (4):367-381.
    The rising tide of corporate scandals and audit failures has shocked the public, and the integrity of auditors is being increasingly questioned. It is crucial for auditors and regulators to understand the main causes of audit failure and devise preventive measures accordingly. This study analyzes enforcement actions issued by the China Securities Regulatory Commission against auditors in respect of fraudulent financial reporting committed by listed companies in China. We find that auditors are more likely to be sanctioned by the (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  33.  37
    Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol.Hector Alaiz-Moreton, Jose Aveleira-Mata, Jorge Ondicol-Garcia, Angel Luis Muñoz-Castañeda, Isaías García & Carmen Benavides - 2019 - Complexity 2019:1-11.
    The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected continuously to the Internet. Intrusion detection systems are used to protect IoT systems from the various anomalies and attacks at the network level. Intrusion Detection Systems can (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  30
    Secure UAV-Based System to Detect Small Boats Using Neural Networks.Moisés Lodeiro-Santiago, Pino Caballero-Gil, Ricardo Aguasca-Colomo & Cándido Caballero-Gil - 2019 - Complexity 2019:1-11.
    This work presents a system to detect small boats to help tackle the problem of this type of perilous immigration. The proposal makes extensive use of emerging technologies like Unmanned Aerial Vehicles combined with a top-performing algorithm from the field of artificial intelligence known as Deep Learning through Convolutional Neural Networks. The use of this algorithm improves current detection systems based on image processing through the application of filters thanks to the fact that the network learns to distinguish the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  20
    Forecasting Foreign Exchange Volatility Using Deep Learning Autoencoder-LSTM Techniques.Gunho Jung & Sun-Yong Choi - 2021 - Complexity 2021:1-16.
    Since the breakdown of the Bretton Woods system in the early 1970s, the foreign exchange market has become an important focus of both academic and practical research. There are many reasons why FX is important, but one of most important aspects is the determination of foreign investment values. Therefore, FX serves as the backbone of international investments and global trading. Additionally, because fluctuations in FX affect the value of imported and exported goods and services, such fluctuations have an important impact (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  15
    Implementation of network information security monitoring system based on adaptive deep detection.Lavish Kansal, Abdullah M. Baqasah, Roobaea Alroobaea & Jing Niu - 2022 - Journal of Intelligent Systems 31 (1):454-465.
    For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network was designed and implemented, and the intrusion detection system model was combined with a support vector machine. The data set adopts the NSL-KDD network communication data set, and this data set is authoritative in the security field. Redundant cleaning, data type conversion, normalization, and other processing operations are performed on the data set. Using the data (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  32
    Analysis of news sentiments using natural language processing and deep learning.Mattia Vicari & Mauro Gaspari - forthcoming - AI and Society.
    This paper investigates if and to what point it is possible to trade on news sentiment and if deep learning, given the current hype on the topic, would be a good tool to do so. DL is built explicitly for dealing with significant amounts of data and performing complex tasks where automatic learning is a necessity. Thanks to its promise to detect complex patterns in a dataset, it may be appealing to those investors that are looking to improve their (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  18
    Real-Time Analysis of Basketball Sports Data Based on Deep Learning.Peng Yao - 2021 - Complexity 2021:1-11.
    This paper focuses on the theme of the application of deep learning in the field of basketball sports, using research methods such as literature research, video analysis, comparative research, and mathematical statistics to explore deep learning in real-time analysis of basketball sports data. The basketball posture action recognition and analysis system proposed for basketball movement is composed of two parts serially. The first part is based on the bottom-up posture estimation method to locate the joint points and is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  22
    A Prediction Method of Electromagnetic Environment Effects for UAV LiDAR Detection System.Min Huang, Dandan Liu, Liyun Ma, Jingyang Wang, Yuming Wang & Yazhou Chen - 2021 - Complexity 2021:1-14.
    With the rapid development of science and technology, UAVs have become a new type of weapon in the informatization battlefield by their advantages of low loss and zero casualty rate. In recent years, UAV navigation electromagnetic decoy and electromagnetic interference crashes have activated widespread international attention. The UAV LiDAR detection system is susceptible to electromagnetic interference in a complex electromagnetic environment, which results in inaccurate detection and causes the mission to fail. Therefore, it is very necessary to predict the effects (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  9
    Anomaly detection and facilitation AI to empower decentralized autonomous organizations for secure crypto-asset transactions.Yuichi Ikeda, Rafik Hadfi, Takayuki Ito & Akihiro Fujihara - forthcoming - AI and Society:1-12.
    This proposal introduces a novel decision-making framework to advance safe economic activities in cyberspace. We focus on identifying anomalies within crypto-asset trading, recognized as potential sources of criminal activity, severely undermining the credibility of such assets. Detecting and mitigating such anomalies holds significant societal implications, particularly in fostering trust within blockchain networks. We aim to bolster the “social trust” inherent to blockchain technology by facilitating informed economic activities in cyberspace. To achieve this, we propose integrating two artificial intelligence (AI) systems (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41.  70
    Understanding Auditors’ Sense of Responsibility for Detecting Fraud Within Organizations.F. Todd DeZoort & Paul D. Harrison - 2018 - Journal of Business Ethics 149 (4):857-874.
    The objective of this study is to evaluate auditors’ perceived responsibility for fraud detection. Auditors play a critical role in managing fraud risk within organizations. Although professional standards and guidance prescribe responsibility in the area, little is known about auditors’ sense of responsibility for fraud detection, the factors affecting perceived responsibility, and how responsibility affects auditor performance. We use the triangle model of responsibility as a theoretical basis for examining responsibility and the effects of accountability, fraud (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  42.  29
    Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept.Markel Sainz, Iñaki Garitano, Mikel Iturbe & Urko Zurutuza - 2020 - Logic Journal of the IGPL 28 (4):461-472.
    Specifically tailored industrial control systems attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not suitable, requiring expressly developed security countermeasures. Within the past decades, research has been focused in network-based intrusion detection systems. With the appearance of software-defined networks, new opportunities and challenges have shown up in the research community. This paper describes the potential benefits of using SDNs in industrial networks with security purposes and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  29
    Clickbait detection in Hebrew.Chaya Liebeskind & Talya Natanya - 2023 - Lodz Papers in Pragmatics 19 (2):427-446.
    The prevalence of sensationalized headlines and deceptive narratives in online content has prompted the need for effective clickbait detection methods. This study delves into the nuances of clickbait in Hebrew, scrutinizing diverse features such as linguistic and structural features, and exploring various types of clickbait in Hebrew, a language that has received relatively limited attention in this context. Utilizing a range of machine learning models, this research aims to identify linguistic features that are instrumental in accurately classifying Hebrew headlines as (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  15
    Local and Deep Features Based Convolutional Neural Network Frameworks for Brain MRI Anomaly Detection.Sajad Einy, Hasan Saygin, Hemrah Hivehch & Yahya Dorostkar Navaei - 2022 - Complexity 2022:1-11.
    A brain tumor is an abnormal mass or growth of a cell that leads to certain death, and this is still a challenging task in clinical practice. Early and correct diagnosis of this type of cancer is very important for the treatment process. For this reason, this study aimed to develop computer-aided systems for the diagnosis of brain tumors. In this research, we proposed three different end-to-end deep learning approaches for analyzing effects of local and deep features for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  79
    Ensemble Machine Learning Model for Classification of Spam Product Reviews.Muhammad Fayaz, Atif Khan, Javid Ur Rahman, Abdullah Alharbi, M. Irfan Uddin & Bader Alouffi - 2020 - Complexity 2020:1-10.
    Nowadays, online product reviews have been at the heart of the product assessment process for a company and its customers. They give feedback to a company on improving product quality, planning, and monitoring its business schemes in order to increase sale and gain more profit. They are also helpful for customers to select the right products in less effort and time. Most companies make spam reviews of products in order to increase the products sales and gain more profit. Detecting spam (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  28
    Employing Machine Learning-Based Predictive Analytical Approaches to Classify Autism Spectrum Disorder Types.Muhammad Kashif Hanif, Naba Ashraf, Muhammad Umer Sarwar, Deleli Mesay Adinew & Reehan Yaqoob - 2022 - Complexity 2022:1-10.
    Autism spectrum disorder is an inherited long-living and neurological disorder that starts in the early age of childhood with complicated causes. Autism spectrum disorder can lead to mental disorders such as anxiety, miscommunication, and limited repetitive interest. If the autism spectrum disorder is detected in the early childhood, it will be very beneficial for children to enhance their mental health level. In this study, different machine and deep learning algorithms were applied to classify the severity of autism spectrum disorder. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  32
    Handling Imbalance Classification Virtual Screening Big Data Using Machine Learning Algorithms.Sahar K. Hussin, Salah M. Abdelmageid, Adel Alkhalil, Yasser M. Omar, Mahmoud I. Marie & Rabie A. Ramadan - 2021 - Complexity 2021:1-15.
    Virtual screening is the most critical process in drug discovery, and it relies on machine learning to facilitate the screening process. It enables the discovery of molecules that bind to a specific protein to form a drug. Despite its benefits, virtual screening generates enormous data and suffers from drawbacks such as high dimensions and imbalance. This paper tackles data imbalance and aims to improve virtual screening accuracy, especially for a minority dataset. For a dataset identified without considering the data’s imbalanced (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  21
    A Convolutional Neural Network Approach for Precision Fish Disease Detection.Dr Mihaira H. Haddad & Fatima Hassan Mohammed - forthcoming - Evolutionary Studies in Imaginative Culture:1018-1033.
    Background: Detecting and classifying fish diseases is crucial for maintaining the health and sustainability of aquaculture systems. This study employs deep learning techniques, particularly Convolutional Neural Networks (CNNs), to automate the detection of various fish diseases using image data. Methods: The study utilizes a carefully curated dataset sourced from the Kaggle database, comprising images representing seven distinct types of fish diseases, along with images of healthy fish. Data preprocessing techniques, including resizing, rescaling, denoising, sharpening, and smoothing, are applied to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  40
    Feature Extraction of Plant Leaf Using Deep Learning.Muhammad Umair Ahmad, Sidra Ashiq, Gran Badshah, Ali Haider Khan & Muzammil Hussain - 2022 - Complexity 2022:1-8.
    Half a million species of plants could be existing in the world. Classification of plants based on leaf features is a critical job as feature extraction from binary images of leaves may result in duplicate identification. However, leaves are an effective means of differentiating plant species because of their unique characteristics like area, diameter, perimeter, circularity, aspect ratio, solidity, eccentricity, and narrow factor. This paper presents the extraction of plant leaf gas alongside other features from the camera images or a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  31
    Corporate Social Responsibility Enhanced Control Systems Reducing the Likelihood of Fraud.Waymond Rodgers, Arne Söderbom & Andrés Guiral - 2015 - Journal of Business Ethics 131 (4):871-882.
    All kinds of fraud are costly for the people engrossed both financially and often in terms of the time needed to clear their name when illegal use has been made of their personal details. The relationship among ethics, internal control, and fraud is important in the understanding of corporate social responsibility. This article uses an Ethical Process Throughput Model embedded in the Fraud triangle in order to better understand the interconnectedness of ethical positions and internal control systems (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 976