Fraud Detection Using Data Mining Techniques
Journal Title: Engineering and Scientific International Journal - Year 2017, Vol 4, Issue 4
Abstract
The purpose of this study is to develop a data mining model for fraud detection in various fields such as online transactions (i.e) net banking, tax payers, credit cards etc. and securing data from the third parties(intruders). For fraud detection, very large volumes of data are to be mined and needs some complex mechanism in order to extract full information about those integrators and frauds. It is truly based on baseline study. Some base line studies might help in establishing the extent of fraud detection. These baseline studies uses some current technologies such as ID3 algorithm, Hashing algorithms, Apriori algorithm, query outlier analyses, use case diagrams, pattern reorganization, etc. In order to detect fraud, they depend upon some random audits, informants and some undercover operations. To overcome this problem we used a hashing association mining technique. This study might increase the efficiency and accuracy in fraud identification. For fraud detection, there is no need of any electronically signatures and ensures that some process would not be rejected so that it would increase the performance or working of false alarm rate for fraud detection. Not only have credit cards, but also in every fields such as money laundering, taxed payers and so on. The algorithm is based on the traversal path using hashing approach which is a theoretical approach. Not only managing fraud detection in tax payers but also it is applicable for integrators in network areas in changing data. It uses various tools in finding the frauds and also the integrators. This paper is mainly concentrates on fraud detection and integrators. There is a major need to develop the hierarchical tree structure into different constraints for the fraud detection system. The rate efficiency of this system will determine by analysing raw data and compare with previous techniques. This algorithm will build or improve the alertness by alarm rate which may be classified into two types, one is false alarm rate and the other is actual alarm rate. With the help of these alarm rates, frauds and as well as integrators might be easily detected. So there is a necessity of alarm or alertness for the frauds and integrators.
Authors and Affiliations
Henrik E
Literature Review: Cloud Computing–Security Issues, Technologies and Challenges
Cloud computing is drastically increasing so to make cloud computing more popular the very first step for the organization is to identify exact place where the cloud related threats lie. The changes from server to servic...
Chemotactic Effect of Common Food Chemicals on the Escherichia Coli Present in the Gastrointestinal Tract of Homo sapiens
This study was conducted to detect the effect of common food chemicals on the Escherichia coli flora present in the large intestine of the gastrointestinal tract. E.coli is a symbiotic bacillus, one of the frequently occ...
Analysis of Different Domains of Artificial Intelligence
Artificial Intelligence (AI) is simply the ability of a Machine to act as “intelligence” as a human. It can be as directly showing human intelligence as identifying picture, understanding voices or observing the real-wor...
Predicting the Risk Factors of Endometrial Cancer using Data Mining
Data mining act as an imperative part for uncovering new idea in healthcare organization which is supportive for all the parties related with medical field. This paper analyses the effectiveness of Data mining technique...
A Review on Eco-friendly Green Computing
Green computing is an emergent technology in the field of computer science and engineering which provides green information. It is largely used to protect environment by optimize energy consumption. To increase energy ef...