Assessment of Fraud Pretentious Business Region Research Articles Using Data Mining Approaches

Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 7

Abstract

In any organization, fraud detection and prevention is daunting task because millions of dollars lost with the different nature of fraudulent activities. Organizations got to engage intelligent and innovative techniques to detect fraud at the earliest opportunity to protect business and their shareholders, customers and employees. This paper surveyed different fraud detection research articles from the year 2004 to 2012 based on data mining techniques. This research work used to analyze the different affected business areas which discusses the data mining algorithms by higher fraud coverage. It also highlights the important challenges and limitations involved with the data mining techniques for detecting fraudulent activities.

Authors and Affiliations

Beulah Jeba Jaya Y. , Dr. J. Jebamalar Tamilselvi

Keywords

Related Articles

Enhancing Security Of Agent-Oriented Techniques Programs Code Using Jar Files

Agent-oriented techniques characterize an exciting new way of analyzing, designing and building complex software systems in real time world. These techniques have the prospective to significantly improve current practice...

An Efficient Approach for Image Recognition using Data Mining

Skin region detection plays an important role in a variety of applications such as face detection, adult image filtering and gesture recognition. We present some definitions about digital imaging or numerical imaging and...

Efficient Processing of XML Documents in Hadoop Map Reduce

XML has dominated the enterprise landscape for fifteen years and still remains the most commonly used data format. Despite its popularity the usage of XML for "Big Data" is challenging due to its semi-structured nature a...

Fuzzy Metagraph and Hierarchical Modeling

In this paper , we show the transformation of a fuzzy metagraph from one form to another based on the projection operator that identifies only the necessary sets of elements for computing. This paper also show some impor...

Audio Compression Codec Using a Dynamic Gammachirp Psychoacoustic Model And a D.W.T Multiresolution Analysis

Audio compression algorithms are used to obtain compact digital representations of high-fidelity audio signals for the purpose of efficient transmission over larger distances and storage. This paper presents an audio cod...

Download PDF file
  • EP ID EP141132
  • DOI -
  • Views 79
  • Downloads 0

How To Cite

Beulah Jeba Jaya Y. , Dr. J. Jebamalar Tamilselvi (2013). Assessment of Fraud Pretentious Business Region Research Articles Using Data Mining Approaches. International Journal on Computer Science and Engineering, 5(7), 653-659. https://europub.co.uk/articles/-A-141132