Search Results - "fraud"

Refine Results
  1. 1

    Osmanlıdan günümüze sahtecilik / by Güçlü, Faruk

    Published 2005
    Subjects: “…Fraud Turkey History. 61902…”
    View in OPAC
    Book
  2. 2

    Turban dosyası by Dumankaya, Halit

    Published 2012
    Subjects: “…Fraud _ Turkey Corporation _ Corrupt practices Forgery _ Turkey Bribery _ Turkey Embezzlement _ Turkey Dolandırıcılık _ Türkiye Şirketteler _ Suistimal uygulamalar Sehtekarlık _ Türkiye Rüşvet _ Türkiye Zimmetine geçirme 36926…”
    View in OPAC
    Book
  3. 3

    Yolsuzluk ekonomisi ve yolsuzlukla mücadele /

    Published 2008
    Subjects:
    View in OPAC
    Book
  4. 4

    Economic crisis and crime

    Published 2011
    Table of Contents: “…Fraud and inequality in the subprime mortgage crisis / Tomson H. …”
    Full-text access
    View in OPAC
    e-Book
  5. 5

    Raw Material Scarcity and Overproduction in the Food Industry by Sharma, Suresh D., Bhagat, Arpan R., Parisi, Salvatore

    Published 2019
    Table of Contents: “…Seasonal variation and biochemical composition of fishmeal -- Water, Carbon and Phosphorus Footprint Concerns in the Food Industry -- Bee Viruses and the Related Impact on Food Crops Worldwide -- Food Adulteration Episodes: The Impact of Frauds in the American Market of Dairy Raw Materials.…”
    Full-text access
    View in OPAC
    e-Book
  6. 6

    Applying Predictive Analytics Finding Value in Data / by McCarthy, Richard V., McCarthy, Mary M., Ceccucci, Wendy, Halawi, Leila

    Published 2019
    Table of Contents: “…Introduction to Predictive Analytics -- Know Your Data - Data Preparation -- What do Descriptive Statistics Tell Us -- The First of the Big Three - Regression -- The Second of the Big Three - Decision Trees -- The Third of the Big Three - Neural Networks -- Model Comparisons and Scoring -- Appendix A -- Data Dictionary for the Automobile Insurance Claim Fraud Data Example -- Conclusion.…”
    Full-text access
    View in OPAC
    e-Book
  7. 7

    Information Security Practices Emerging Threats and Perspectives /

    Published 2017
    Table of Contents: “…Collective Framework for Fraud Detection using Behavioral Biometrics -- Chapter 4. …”
    Full-text access
    View in OPAC
    e-Book
  8. 8

    Funeral Rites in Contemporary Korea The Business of Death / by Han, Gil-Soo

    Published 2019
    Table of Contents: “…Funeral and media-saturated world: An analysis of advertisements -- Chapter 6. The rise, fraud and fall of funeral service conglomerates: topics and concerns in investigative journalism -- Chapter 7. …”
    Full-text access
    View in OPAC
    e-Book
  9. 9

    Guide to Big Data Applications

    Published 2018
    Table of Contents: “…Introduction -- Big Data Analytics -- Big Data and Social Media -- Use of Cloud Computing for Big Data in Business -- Economic Data Analysis Related to Developing Countries -- High Performance Computing and Big Data -- Big Data Applications in Physics -- Big Data Applications in Chemistry -- Big Data Applications in Mathematics -- Big Data Applications in Biology -- Big Data Applications in Engineering -- Big Data Applications in Meteorology -- Big Data Applications in Environmental Science -- Big Data Applications in Energy -- Security Applications for Big Data -- Big Data Applications in Network Traffic Analysis -- Big Data Applications in Supply Chain Logistics -- Big Data Applications in Healthcare -- Big Data Applications in Cancer Research -- Impact of Big Data in Marketing -- Use of Big Data in Banking -- Using Big Data for Fraud Detection in Accounting -- Using Big Data for Supply Chain Management -- Privacy Implications of Big Data -- Legal Perspectives of Big Data -- Ethical Handling of Big Data in Practical Uses -- Conclusion.…”
    Full-text access
    View in OPAC
    e-Book
  10. 10

    Food Ethics Education

    Published 2018
    Table of Contents: “…Part I Introduction -- Chapter 1Teaching food ethics --  Chapter 2 With a little help from Bioethics -- Part II Food ethics issues -- Chapter 3 Sustainability and ethics along the food supply chain -- Chapter 4 The ethics of consumption -- Chapter 5 Ethical issues in the food industry -- Part III Ethics for food professionals -- Chapter 6 Codes of ethics of food industry professionals: principles and examples -- Chapter 7 Corporate social responsibility -- Chapter 8 Whistleblowing: food safety and fraud -- Chapter 9 Ethical issues in risk communication -- Chapter 10 Publication ethics -- Part IV Food ethics case studies -- Chapter 11 Operation Aberdeen -- Chapter 12 Bushmeat -- Chapter 13 Food labeling case studies.…”
    Full-text access
    View in OPAC
    e-Book
  11. 11

    Social Networks and Surveillance for Society

    Published 2019
    Table of Contents: “…Chapter1. Frauds in Online Social Networks: A Review -- Chapter2. …”
    Full-text access
    View in OPAC
    e-Book
  12. 12

    Accounting principles / by Weygandt, Jerry J.

    Published 2012
    Table of Contents: “…1 Accounting in Action -- 2 The Recording Process -- 3 Adjusting the Accounts -- 4 Completing the Accounting Cycle -- 5 Accounting for Merchandising Operations -- 6 Inventories -- 7 Accounting Information Systems -- 8 Fraud, Internal Control, and Cash -- 9 Accounting for Receivables -- 10 Plant Assets, Natural Resources, and Intangible Assets -- 11 Current Liabilities and Payroll Accounting -- 12 Accounting for Partnerships -- 13 Corporations: Organization and Capital Stock Transactions -- 14 Corporations: Dividends, Retained Earnings, and Income Reporting -- 15 Long-Term Liabilities -- 16 Investments -- 17 Statement of Cash Flows -- 18 Financial Statement Analysis -- 19 Managerial Accounting -- 20 Job Order Costing . 21 Process Costing -- 22 Cost-Volume-Profit -- 23 Budgetary Planning -- 24 Budgetary Control and Responsibility Accounting -- 25 Standard Costs and Balanced Scorecard -- 26 Incremental Analysis and Capital Budgeting -- APPENDICES. …”
    View in OPAC
    Book
  13. 13
  14. 14

    Cognitive Computing for Big Data Systems Over IoT Frameworks, Tools and Applications /

    Published 2018
    Table of Contents: “…Beyond Automation: The Cognitive IoT - Artificial Intelligence Brings Sense to the Internet of Things -- Cybercrimes Investigation and Intrusion Detection in Internet of Things Based on Data Science Methods -- Modeling and Analysis of Multi-Objective Service Selection Scheme in IoT-Cloud Environment -- Cognitive data science automatic fraud detection solution, based on Benford' s law, fuzzy logic with elements of machine learning -- Reliable Cross Layer Design for E-health Applications - IoT Perspective -- Erasure Codes for Reliable Communication in Internet-ofThings (IoT) embedded with Wireless Sensors -- Review: Security and Privacy Issues of Fog Computing -- A Review on Security and Privacy Challenges of Big Data -- Recent Developments in Deep Learning with Applications -- High-Level Knowledge Representation and Reasoning in a Cognitive IoT/WoT Context -- Applications of IoT in Healthcare -- Security Stipulations on IoT Networks -- A Hyper Heuristic Localization Based Cloned Node Detection Technique using GSA Based Simulated Annealing in Sensor Networks -- Review on Analysis of the Application Areas and Algorithms used in Data Wrangling in Big Data -- An innovation model for Smart Traffic Management System Using Internet of Things(IoT). .…”
    Full-text access
    View in OPAC
    e-Book
  15. 15

    Unsupervised Learning Algorithms

    Published 2016
    Full-text access
    View in OPAC
    e-Book
  16. 16
  17. 17

    Big Data for the Greater Good

    Published 2019
    Full-text access
    View in OPAC
    e-Book
  18. 18

    Soft Computing: Theories and Applications Proceedings of SoCTA 2016, Volume 2 /

    Published 2018
    Table of Contents: “…Virtual Experimental Analysis of Redundant Robot Manipulators using Neural Networks -- Selection of Energy Efficient Material: an Entropy-TOPSIS Approach -- Analyses & Detection of Health Insurance Fraud Using Data Mining & Predictive Modeling Techniques -- Software Cost Estimation Using Artificial Neural Network -- A Three Layer Approach for Overlay Text Extraction in Video Stream -- Recognition of Noisy Numbers Using Neural Network -- Secure Group Authentication Scheme for LTE-Advanced -- Frequency Fractal Behaviour in the Retina Nano Centre- Fed Dipole Antenna Network of a Human Eye -- Trigonometric Probability Tuning in Asynchronous Differential Evolution -- Analytical review on Image Compression using Fractal Image Coding -- The Fulcrum principle between Parasympathetic and Sympathetic peripheral systems: Auditory noise can modulate body's peripheral temperature -- Improved Clustering Algorithm for Wireless Sensor Network -- Fuzzy based probabilistic ecological risk assessment approach: Acase study of heavy metal contaminated soil -- Performance Comparisons of Four Modified Structures of Log Periodic Three Element Microstrip Antenna Arrays -- Preliminary Study of Ecommerce Adoption in Indian Handicraft SME: A Case Study -- Threat Detection for Software Vulnerability using DE based Adaptive Approach -- Methods to choose the 'Best-fit' Patch in Patch-Based Texture Synthesis Algorithm -- Revisiting Requirements Analysis Techniques and Challenges -- Speech Recognition with Combined MFCC, MODGDF and ZCPA Features Extraction techniques using NTN and MNTN conventional Classifiers for Telugu language -- Real Time Sentiment Analysis of Big Data Applications Using Twitter Data with Hadoop Framework -- Addressing Security concerns for Infrastructure of Cloud Computing.…”
    Full-text access
    View in OPAC
    e-Book
  19. 19

    Advanced Intelligent Systems for Sustainable Development (AI2SD'2018) Volume 5: Advanced Intelligent Systems for Computing Sciences /

    Published 2019
    Table of Contents: “…Intelligent reservation systems based on MAS & data mining method -- A Lightweight Ciphertext-Policy Attribute-Based Encryption for Fine-Grained Access Control -- Generate a Meta-Model Content for Communication Space of Learning Management System Compatible with IMS-LD -- Designing an IMS-LD Model for Communication Space of Learning Management System -- A smart cascaded H-bridge multilevel inverter with An optimized modulation techniques increasing the quality and reducing harmonics -- Approaches and algorithms for resource management in OFDMA access mode: Application to mobile networks of new generation -- A new efficient technique to enhance quality of service in OLSR protocol -- Performance Assessment of AODV, DSR and DSDV in an Urban VANET Scenario -- Exploiting NoSQL Document Oriented Data Using Semantic Web Tools -- Analytical study of the performance of communication systems in the presence of fading -- Android Applications analysis results using PerUpSecure Tool -- Novel configuration of Radio over Fiber system using a hybrid SAC-OCDMA/OFDM technique -- A Hybrid Multilingual Sentiment Classification using Fuzzy Logic and Semantic Similarity -- Fuzzy semantic-based similarity and big data for detecting multilingual plagiarism in Arabic documents -- Contribution to the improvement of the Quality of Service over Vehicular ad-hoc Network -- Sustainable Development: Clustering Moroccan Population Based on ICT and Education -- Datamining for Fraud Detecting, State of the art -- Elephant Herding Optimization Algorithm for the travelling salesman problem -- Deep learning technology for identifying a person of interest in real-world -- The Discrete swallow swarm optimization for flowshop scheduling problem.…”
    Full-text access
    View in OPAC
    e-Book
  20. 20

    Recent Developments in Data Science and Intelligent Analysis of Information Proceedings of the XVIII International Conference on Data Science and Intelligent Analysis of Informatio...

    Published 2019
    Table of Contents: “…Intelligent Educational Systems -- Method of Activity of Ontology-Based Intelligent Agent for Evaluating Initial Stages of the Software Lifecycle -- Ontological Representation of Legal Information and an Idea of Crowdsourcing for Its Filling -- Methods for Automated Generation of Scripts Hierarchies from Examples and Diagnosis of Behavior -- Development of the Mathematical Model of the Informational Resource of a Distance Learning System -- Use of Information Technologies to Improve Access to Information in E-Learning Systems -- Multi-Agent Approach Towards Creating an Adaptive Learning Environment -- Part V: Intelligent Search and Information Analysis in Local and Global Networks -- Usage of Decision Support Systems in Information Operations Recognition -- How Click-Fraud Shapes Traffic: A Case Study -- The Model of Words Cumulative Influence in a Text -- Mathematical and Computer Models of Message Distribution in Social Networks Based on the Space Modifcation of Fermi-Pasta-Ulam Approach -- Social Network Structure as a Predictor of Social Behavior: The Case of Protest in the 2016 US Presidential Election -- Internet Data Analysis to Evaluate the Optimal Placement of New Facilities -- Part VI: Novel Theoretical and Practical Applications of Data Science -- Algebra of Clusterizable Relations -- Constructive Proofs of Heterogeneous Equalities in Cubical Type Theory -- Improved Method of Determining the Alternative Set of Numbers in Residue Number System -- Method of an Optimal Nonlinear Extrapolation of a Noisy Random Sequence on the Basis of the Apparatus of Canonical Expansions -- Regularization of Hidden Markov Models Embedded into Reproducing Kernel Hilbert Space -- Application of Probabilistic-Algebraic Simulation for Processing and Analysis of Large Amounts of Data -- Multiblock ADMM with Nesterov Acceleration -- Input Information in the Approximate Calculation of Two-Dimensional Integral from Highly Oscillating Functions (Irregular Case) -- A New Approach to Data Compression.…”
    Full-text access
    View in OPAC
    e-Book