SELECTION OF OPTIMAL MINING ALGORITHM FOR OUTLIER DETECTION - AN EFFICIENT METHOD TO PREDICT/DETECT MONEY LAUNDERING CRIME IN FINANCE INDUSTRY
Journal Title: Elysium Journal of Engineering Research and Management - Year 2014, Vol 1, Issue 1
Abstract
Today, Money Laundering (ML) poses a serious threat and unique challenge to financial institutions. Most of the financial institutions internationally have been implementing Anti-Money Laundering solutions (AML) to fight against money laundering activities. The volume of transaction data in banking is huge and contains a lot of useful information. Detecting money laundering is one of the most valuable information which we can discover from transaction data. Various Data Mining techniques have been applied in Money Laundering detection system used by financial institutions today. Outlier detection is a data mining technique to detect rare events, deviant objects, and exceptions from client or customer transaction data. This paper, discusses on different outlier techniques, comparison between them and framework for selection of right mining algorithm for implementing the same.
Authors and Affiliations
Kannan S, Somasundaram K
Detecting intruders in the network using machine learning classifier
Rapid development in technology has raised the need for an effective intrusion detection system as the traditional intrusion detection method cannot compete against newly advanced intrusions. In the proposed work uses ma...
DESIGN PLOT BASED ON THE ASPECT RATIO OF DELAUNAY TRIANGULATION
Scatter plots with Cartesian coordinates are applied in scientific and mathematical visualization to present two variables for a given set of data typically. The number of displayed variables are increased to three when...
Kidney Disease Identification Using Automatic 3D Segmentation
Various layers of kidney can be affected by different kinds of disease. That is renal cortex, renal column, renal medulla and renal pelvis. For example, kidney tumor usually occurs in renal cortex, renal column hypertrop...
BASED ON GREEN COMPUTING WORLD, THE HYBRID MALWARE DETECT MEMORY MAPPER IN KERNEL CENTRIC VIRTUAL MACHINE
Kernel malwares can provide user level-malware characteristics with additional probabilities of hiding their malicious activities by altering the legitimate kernel behavior of an operating system. Many researc...
Grid Power Compensation by Micro Grid System with Bidirectional AC/DC Converter and DC/DC Converter PWM Strategy
To accomplish the power quality maintenance, DC-DC converter (buck and boost converter) and a bidirectional AC/DC converter is implemented. The available power from the micro grid is stored in a battery. The power from t...