Adaptive Fraud Detection Using Benford s Law
|
|
|
- Wilfred Adams
- 10 years ago
- Views:
Transcription
1 Adaptive Fraud Detection Using Benford s Law Fletcher Lu 1, J. Efrim Boritz 2, and Dominic Covvey 2 1 Canadian Institute of Chartered Accountants, 66 Grace Street, Scarborough, Ontario, M1J 3K9 [email protected] 2 University of Waterloo, 2 University Avenue West, Waterloo, Ontario, Canada, N2L 3G1 [email protected], [email protected] Abstract. Adaptive Benford s Law [1] is a digital analysis technique that specifies the probabilistic distribution of digits for many commonly occurring phenomena, even for incomplete data records. We combine this digital analysis technique with a reinforcement learning technique to create a new fraud discovery approach. When applied to records of naturally occurring phenomena, our adaptive fraud detection method uses deviations from the expected Benford s Law distributions as an indicators of anomalous behaviour that are strong indicators of fraud. Through the exploration component of our reinforcement learning method we search for the underlying attributes producing the anomalous behaviour. In a blind test of our approach, using real health and auto insurance data, our Adaptive Fraud Detection method successfully identified actual fraudsters among the test data. 1 Introduction In this paper we illustrate the implementation of a fraud discovery system which uses a new approach for discovering fraud that combines a reinforcement learning (RL) technique with a digital analysis method. The idea behind this approach is to use the digital analysis to uncover data anomalies and then utilize the reinforcement learning component to reveal the attributes contributing to the anomaly, thereby uncovering underlying fraudulent behaviour. As Bolton and Hand [2] noted, fraud detection methods may be divided into both supervised and unsupervised methods. For supervised methods, both fraudulent and non-fraudulent records are used to train a system, which then searches and classifies new records according to the trained patterns. The limitation to supervised methods is that one must have both classes of records identified for the system to train on. Thus, this approach is limited to only previously known methods of committing fraud. Unsupervised methods, in contrast, typically identify records that do not fit expected norms. The advantage of this approach is that one may identify new instances of fraud. The common approach to this method is to use forms of outlier detection. The main limit to this approach is that we are essentially identifying anomalies that may or may not be fraudulent behaviour. Just because a behaviour is anomalous does not necessarily mean that the behaviour is fraudulent. Instead they can be used as indicators of L. Lamontagne and M. Marchand (Eds.): Canadian AI 26, LNAI 413, pp , 26. c Springer-Verlag Berlin Heidelberg 26
2 348 F. Lu, J.E. Boritz, and D. Covvey possible fraud, whereby the strength of the anomalous behaviour (how much it deviates from expected norms), may be used as a measure of ones confidence in how likely the behaviour may be fraudulent. Investigators may then be employed to analyze these anomalies. However, given the often enormous numbers of records involved in typical fraud application areas such as credit card, cellular phone and healthcare records, even with identified anomalies, investigating the anomalies can be a considerable burden to resources. The novelty of our approach is that we extend the typical outlier detection methods with a reinforcement learning component. The reinforcement learning component of our algorithm builds on identified outliers by associating with our outliers, underlying attributes that may be linked together to build a case for fraud. Reinforcement learning has typically been used in the past to find the best choice of actions when trying to perform some physical task requiring a sequence of actions to accomplish a desirable goal such as navigating through a maze. The core idea which makes reinforcement learning useful to fraud discovery is its ability to link together states through a pattern of state-action pairs in a policy. In our algorithm we will link together anomalies according to their underlying attributes using the magnitude of the anomalous behaviour as a measure of its desireablity within the reinforcement learning context (in other words anomalies are equivalent to the rewards in an RL environment). To identify our outliers, we use a digital analysis technique known as adaptive Benford s Law [1]. Benford s Law specifies the distribution of the digits for naturally occurring phenomena. For a long time this technique, commonly used in areas of taxation and accounting, was considered mostly a mathematical curiosity as it described the frequency with which individual and sets of digits for naturally growing phenomena such as population measures should appear [3]. Such naturally growing phenomena, however, has been shown to include practical areas such as spending records and stock market values [4]. One of the limits to the use of classic Benford s Law in fraud detection has been its requirement that analyzed records have no artificial cutoffs. In other words, records must be complete. However, in many practical application areas, one only has information for a subset, such as a single year, of financial records. Recent work by Lu and Boritz [1] has removed this limitation with an adaptive Benford s Law, making it more practically useful. In our paper we will explain the algorithm for our technique and test our new fraud discovery technique against outlier detection methods using real healthcare and auto insurance records, demonstrating improvements in classifying fraudsters. 1.1 Complications in Practical Fraud Detection Research Two major complications for fraud detection researchers are: 1. Secrecy with regards to details on fraud detection techniques. 2. Limits on available real fraud records. Both of these complications stem from the nature of the application area. It is quite natural that in order to stay ahead of fraudsters, those employing fraud detection methods tend to keep secret their algorithm details in order to avoid fraudsters from knowing these details and developing methods to circumnavigate them. This secrecy makes it
3 Adaptive Fraud Detection Using Benford s Law 349 difficult to compare new fraud detection techniques with previous methods. The second complication is due to the fact that companies do not generally like to reveal the amounts of fraud within their field as it tends to have a detrimental impact on shareholder confidence as well as consumer confidence. In addition, laws in Canada as well as many other countries do not require the explicit reporting of fraud losses. Without available real fraud records, many researchers use artificially created synthetic fraud records to test their methods. However, synthetic records for testing are only as useful as they are truly representative of actual fraudulent and non-fraudulent records. We deal with the first complication by developing a general technique that is not meant to be application area specific but is meant as an improvement over the general Benford s Law outlier detection approach. Many fraud detection techniques are ad hoc and use specific details about their application area for detection. For instance, cellular phone detection uses the fact that one can uncover phone usage stealing by identifying that the same phone is calling from two different locations at the same time, which would imply at least one of the calls is from an illegitimate user. Since our fraud discovery technique is meant as an improvement over previous Benford s Law outlier detection methods, we compare our method specifically with that outlier detection approach. We deal with the second complication by testing our method on real auto insurance records that have been audited and classified for actual fraud. In order to demonstrate robustness, we also apply our method to real healthcare insurance records. However, these records have yet to be audited for fraud and thus we use it only to demonstrate the technique s operation on a differing application area and to illustrate the adaptive Benford s Law component of our fraud detection method on a real fraud application. 2 Background 2.1 Benford s Law Benford s Law is a probability distribution with strong relevance to accounting fraud. Much of the research on Benford s Law has been in areas of statistics [5, 6] as well as auditing [7, 8]. Benford s Law is a mathematical formula that specifies the probability of leading digit sequences appearing in a set of data. What we mean by leading digit sequences is best illustrated through an example. Consider the set of data S = {231, 432, 1, 23, 634, 23, 1, 634, 2, 23, 34, 1232}. There are twelve data entries in set S. The digit sequence 23 appears as a leading digit sequence (i.e. in the first and second position) 4 times. Therefore, the probability of the first two digits being 23 is The probability is computed out of 9 because only 9 entries have at least 2 digit positions. Entries with less than the number of digits being analyzed are not included in the probability computation. The actual mathematical formula of Benford s law is: P (D = d) =log 1 (1 + 1 ), (1) d
4 35 F. Lu, J.E. Boritz, and D. Covvey where P (D = d) is the probability of observing the digit sequence d in the first y digits and where d is a sequence of y digits. For instance, Benford s Law would state that the probability that the first digit in a data set is 3 would be log 1 ( ). Similarly, the probability that the first 3 digits of the data set are 238, would be log 1 ( ). The numbers 238 and would be instances of the first three digits being 238. However this probability would not include the occurrence 3238, as 238 is not the first three digits in this instance. 2.2 Benford s Law Requirements In order to apply equation 1 as a test for a data set s digit frequencies, Benford s Law requires that: 1. The entries in a data set should record values of similar phenomena. In other words, the recorded data cannot include entries from two different phenomena such as both census population records and dental measurements. 2. There should be no built-in minimum or maximum values in the data set. In other words, the records for the phenomena must be complete, with no artificial start value or ending cutoff value. 3. The data set should not be made up of assigned numbers, such as phone numbers. 4. The data set should have more small value entries than large value entries. Further details on these rules may be found in [3]. Under these conditions, Benford noted that the data for such sets, when placed in ascending order, often follows a geometric growth pattern. 1 Under such a situation, equation 1 specifies the probability of observing specific leading digit sequences for such a data set. The intuitive reasoning behind the geometric growth of Benford s Law is based on the notion that for low values it takes more time for some event to increase by 1% from 1 to 2 than it does to increase by 5% from 2 to 3. Thus, when recording numerical information at regular intervals, one often observes low digits much more frequently than higher digits, usually decreasing geometrically. Adaptive Benford s Law modifies classic Benford s Law by removing the second requirement of no built-in minimum or maximum values, thus allowing for the technique to be more generally applicable to a wider array of real records which often are incomplete. For more details on the Adaptive Benford method see [1]. 2.3 Reinforcement Learning In reinforcement learning, an environment is modelled as a network of states, {s S}. Each state is associated with a set of possible actions, a s A s and a reward for entering that state {r s R s }. We can transition from one state s(i) to another s(j) by choosing an action a s and with a certain probability P (s j s i,a si ) we transition to another state. A policy is a mapping of states to action. The objective is to find an optimal policy that maximizies the long-term rewards one may obtain as one navigates through the network. In order to find an optimal policy, we perform a task known as policy evaluation 1 Note: The actual data does not have to be recorded in ascending order. This ordering is merely an illustrative tool to understand the intuitive reasoning for Benford s law.
5 Adaptive Fraud Detection Using Benford s Law 351 which determines value estimates for states given a fixed policy, π. The value estimate for a state represents the sum of the discounted future rewards for a state following a policy π. A variety of methods for policy evaluation have developed over time such as the maximum likelihood approach[9], the temporal differencing method [1] and the monte carlo matrix inversion method [11]. One property of the reinforcement learning approach is that it is designed to handle intractably large state spaces. This trait makes it well suited to an environment such as fraud detection where there are usually extremely large numbers of records to process in order to find the relatively small number of occurences of fraud among the total amount of data available. Reinforcement learning also incorporates an exploration component that allows it to search for better actions leading to higher long-term reward values. Such an exploration component is key also for finding new instances of previously unknown fraud cases as we wish our fraud discovery method to be able to do. These two traits are the main components motivating our use of a reinforcement learning approach for fraud detection. 3 Algorithm As we noted in the introduction, our fraud detection method s objective is to improve over outlier detection methods for finding instances of fraud. Outlier detection methods, as we stated previously, actually only indicate anomalous instances. In order to determine whether an anomalous instance is actually a result of a fraudulent occurence typically requires the careful analysis of an auditor. Therefore, we need to consider how an auditor actually determines fraud. Without domain specific knowledge, such as the cell phone example we gave in the introduction, one typically builds a case for fraud by linking together suspicious occurences. Even with domain specific knowledge, such as our cellular phone example, one may still need to link suspicious (anomalous) cases together. For example, even in the cellular phone example where we know that the same cell phone cannot be calling from two different locations at the same time, we do not necessarily know which of the two calls is the fraudulent one and indeed both may be from illegal users. Thus, what is needed is to build a case of fraud by linking together anomalous instances that are related by some set of traits. Reinforcement learning is well suited to linking together states through its stateaction policy mapping. For reinforcement learning to be used as a fraud detection method, we need to be able to relate rewards with anomalies. We do so by setting the reward values as the magnitude that our anomalous instances deviate from expected values. In turn, the states of our RL environment relate to individual records of our application environment and the actions are the attributes of a record. In such a way, two records, with the same attributes are linked together by a common attribute just as an action can relate two states of a classic reinforcement learning environment network. The best way to illustrate our fraud detection algorithm is through an example. Figure 1 is an example of purchase records for some consumer. Included in the record are the purchased item, the store it was purchased in, the location of the store, the form of payment used to buy the item and the amount of the purchase under Digit Sequences. We apply our fraud detection algorithm by first determining if there are
6 352 F. Lu, J.E. Boritz, and D. Covvey Fig. 1. Sample Application: Purchase Records Fig. 2. Sample Application: Analysing Digits with Rewards any sets of digit sequences that conform to a Benford distribution. In our example there is only one set of numbers, the purchase values that can be compared with a Benford distribution. We compute the frequency with which each digit sequence from 1 to 999 appears in our purchase value records. 2 We then compare these actual digit frequencies with Benford s Law s expected frequencies. If they fall within a certain confidence interval, we will accept that the numerical data follows a Benford s Law distribution. Assuming the purchase records are a Benford distribution, then we compute a measure of how much any given purchase value deviates from expected Benford value by: Reward(i) = f 1i + f 2i + f 3i, (2) b 1i b 2i b 3i where f ji is the frequency that a digit sequence of length j for state i appears in the dataset and b ji is the expected Benford s Law distribution frequency that the digit sequence of length j for state i should appear. As an example, consider figure 2 where state 2 has a purchase value of $38. In our algorithm we consider only leading digit sequences. 3 Therefore there are two leading digit sequences, the sequence of just 3 as well as 38. If 3 appears 22 times in our record, while 38 appears 5 times, then f 12 =22and f 22 =5. Assuming that Benford s Law states that the sequence 3 should appear 1 times and 38 should appear 5 times, then b 12 =1and b 22 =5. Note since there are not three digits in our purchase value f 33 =and does not contribute to the reward function of equation 2. We thus produce a Reward value for state 2 of Reward(2) = =3.2. We thus can compute reward values associated with each state. Figure 2 illustrates our records with their associated computed rewards. 2 Benford s Law works with digit sequences of any length. For most practical purposes, the frequencies of sequences of three digits or less are evaluated. For longer digit lengths, the probabilities become so small that they are of little practical value. 3 See [1] for a justification for this choice.
7 Adaptive Fraud Detection Using Benford s Law 353 Fig. 3. Sample Application: Choosing a Record/State Once the reward values have been computed, we can now explore our environment as a reinforcement learning network. We do so by first choosing a start state. In figure 3 we chose state 2. This results in a reward value of 3.2. We then need to choose an action. Our actions are any unused attributes of our record. In this case we have four possible actions. There are numerous methods for choosing an action. See [9] for various techniques. Fig. 4. Sample Application: State to Action to Next State Transition If we choose action/attribute Store. The specific instance of this action in state 2 is storeb. We therefore search the store column for any other states/records with storeb as an entry. Every possible record with such an entry is a possible next state. In our example state 4 is a possible next state which, as figure 4 illustrates will be our next state. We use a uniform random distribution to choose which of our possible next state candidates will be selected. Now that we have a method of exploring our environment, we can apply a reinforcement learning algorithm such as temporal differencing or maximum likelihood to find an optimal policy to our system. Any such policy will link together records with the greatest anomalies forming a pattern that builds a case of fraudulent activity just as an auditor may do. Once you have an optimal policy, the states/records that the auditor wishes to build a case for fraud for, may be used as the start state and then the auditor simply executes the optimal policy choices to find all states that are most strongly linked to that given start state. In this way, the auditor finds all underlying attributes/actions that are in common with the high reward returning states. This requires only a single trace through the system since the optimal policy has already done the exploration that an auditor would have traditionally had to do saving time and man-hours. A few details which we have not gone into due to space constraints include how to choose when to stop your explorations, handling records that contain multiple columns with digits conforming to a Benford distribution as well as dealing with exploring nonoptimal policies. An important reason to obtain less than optimal policies is that less
8 354 F. Lu, J.E. Boritz, and D. Covvey than optimal policies may still also contain fraudulent patterns. One method to obtain such less than optimal policies is by iteratively removing the optimal policy and then rerunning the algorithm. In addition, two points for those unfamiliar with Benford s Law and auditing in general may question are that the reward structure of equation 2 does not give higher rewards for digits that appear less frequently than the Benford s Law predicts and that numbers with more digits will possibly have a bias to higher rewards since there are more digits that can contribute to the reward value. Regarding the first point, one could use an alternative formula to equation 2 such as: where Reward(i) =q 1i + q 2i + q 3i, (3) q ji = { fji b ji b ji j ji for f ji >b ji. (4) otherwise We use equation 2 in our implementation due to our application area of insurance where generally, auditors are most interested in over-charges rather than under-charges. Naturally, this may not be the case in other application areas such as tax filings where one may be concerned with under reporting of figures. In regards to the second point about numbers with more digits having higher rewards, this situation is a Benford s Law phenomenon. Certainly more digits provide more information to the auditor, but this bias is generally not of concern in practical auditing terms as successive digits have geometrically (1 times less for ever digit position to the left you move) less influence on the over all reward relative to the higher leading digits. Further discussions on the influence of successive significant digits may be found in [3]. The authors will gladly provide further details on any of these points on request. 4 Experiments As stated in section 3 our application analyzes the first, the first two and the first three digit sequences of a dataset, comparing them to expect Benford frequencies. Therefore, for each data set analyzed, we are comparing it to three different Benford s Law digit frequency distributions, one of only length 1 digit, another of length 2 digits and a third of length 3 digits. For conciseness we have reported our digit frequency analyzes through graphs whereby we include the first digit frequencies 1 to 9 on the x-axis values from 1 to 9, the first two digit sequences composed of 1, 11,...,99 on the x-axis from 1 to 99 and the first three digit sequences on the x-axis from 1, When looking at the numerical results, one should keep in mind a single graph is actually three sets of different distributions. The expected Benford curve will contain disjunction points at the points between 9 to 1, and 99 to 1 because they are the points at which a new Benford probability distribution starts and ends. As stated in section 1.1, we have two databases with which to test our fraud detection method on, a record of healthcare insurance claims provided by Manulife Financial as well as records of auto insurance claims. However, the healthcare insurance claims have yet to be audited and therefore we use it only to illustrate both the robustness of how
9 Adaptive Fraud Detection Using Benford s Law Actual Frequency of Input Digits 6 5 Actual Frequency of Input Digits a. Expenses Submitted b. Submitted Drug Costs 1 Actual Frequency of Input Digits Actual Frequency of Input Digits c. Excluded Health Costs d. Eligible Component Amount 6 Actual Frequency of Input Digits Actual Frequency of Input Digits e. Gross Reimbursed Amount f. Net Reimbursed Amount Fig. 5. Healthcare Digit Frequencies compared with their Benford Distributions our system is generalized enough to operate on differing application areas as well as the operation of identifying anomalous data in conjunction with the attributes related to those anomalies. The second database composed of auto insurance has been audited with identified fraudulent and non-fraudulent records with associated attributes. We therefore use the second database as a test of the utility of our system for identifying real fraud cases. The healthcare data consisted of 94 columns/attributes with 31,84 rows/records. We therefore had 94 candidate data sets to test to see if they conform to a Benford distribution. 83 of the columns were eliminated due to one of the three Adaptive Benford s Law requirements not being satisfied. Of the remaining 11 data sets, 5 were eliminated using a 9% confidence interval based on training data provided by Manulife. Figure 5 illustrates the frequencies of the digit sequences for the remaining six data sets
10 356 F. Lu, J.E. Boritz, and D. Covvey 12 Actual Frequency of Input Digits Fig. 6. Auto Insurance Digit Frequencies that do conform to the Benford distributions. Included on the graphs are the 9% lower and upper bound confidence intervals as well as the the expected Benford frequencies. 4 The six graphs from a to e of figure 5 resulted in 23, 31, 8,21, 14 and 18 respectively of total suspicious attributes, which are currently being investigated for by auditors for fraud. For our auto insurance database, Ernst and Young provided data which was already audited for fraud. The researchers conducted a test of the system as a blind test where we were unaware of which, if any, of the records and attributes were fraudulent. In this case, only one column of the database conformed to a Benford distribution satisfying the three requirements of Adaptive Benford. Figure 6 illustrates the digit frequencies of the auto insurance data. There were 3 remaining non-benford attribute columns which may be used as actions to match on in our Reinforcement Learning environment. The database consisted of 17,64 records. Figure 7 illustrates corresponding rewards resulting from our most optimal policy to our fourth most optimal policy. We obtained the most optimal, second most optimal, etc. polices by successively eliminating the optimal policy currently found and rerunning the optimal policy search. The thirty columns of our graphs represent the thirty attributes that are possible to be chosen from. The height of the bars is the sum of the reward values that would be obtained following the respective policy for each type of attribute the policy chooses. As one can see, the heights for the successively worsening policies result in, not surprisingly, worsening reward values. Our optimal policy successfully identified the one company that was producing several fraudulent insurance claims. This single fraud generating company corresponds to two of the large spikes appearing in figure 6. However, an important note on our 4 Confidence intervals were computed based on variance values of training data provided by Manulife and used 2 standard deviations from the expected Benford frequencies for the upper and lower bounds.
11 Adaptive Fraud Detection Using Benford s Law x Amount of Deviation 1.5 Amount of Deviation Attributes Attributes a. Optimal Policy b. Second Most Optimal Policy Amount of Deviation 25 2 Amount of Deviation Attributes Attributes c. Third Most Optimal Policy d. Fourth Most Optimal Policy Fig. 7. The attributes of successively worsening policies and the reward values they correspond to across all records method is that standard Benford outlier methods would have not identified this company because although there was a company name attribute field, this company was not listed consistently in the same way in that field. Instead, they used variations on the name such as abbreviations and reorderings of the words that the name consisted of. Our policy was able to identify the company instead by linking together agents who submitted fraudulent claims on behalf of the company with their locations and in turn to the company. This linking is exactly the kind of fraud case building that the reinforcement learning component is designed to build. 5 Conclusions In this paper we have presented a new fraud detection method which expands on the current simpler outlier detection approaches. We specifically used a Benford distribution as a benchmark for our unsupervised learning method to discover new fraud cases. We enhanced the method with a reinforcement learning model of our environment in order to link together anomalous outliers to build a case for fraud. In so doing, we are
12 358 F. Lu, J.E. Boritz, and D. Covvey essentially simulating the behaviour of human auditors. We tested our system with a blind test on auto insurance data successfully identifying instances of fraud perpetrated by several people but linked to one underlying company. In terms of future research, we plan to incorporate other outlier detection methods with our current Benford method as well as apply our method to greater amounts of audited data from a variety of different application areas. Acknowledgements. The authors wish to thank Manulife Financial as well as Ernst and Young for providing the insurance data. We would also like to thank the Natural Sciences and Engineering Research Council (NSERC) for providing funding. References 1. F. Lu and J. E. Boritz. Detecting Fraud in Health Insurance Data: Learning to Model Incomplete Benford s Law Distributions. In 16th European Conference on Machine Learning, pages , Porto, Portugal, 25. Springer. 2. Richard J. Bolton and David J. Hand. Statistical Fraud Detection: A Review. Statistical Science, 17(3): , Mark J. Nigrini. Digital Analysis Using Benford s Law. Global Audit Publications, Vancouver, B.C., Canada, Mark J. Nigrini. Can Benford s Law Be Used In Forensic Accounting? The Balance Sheet, June:7 8, Roger S. Pinkham. On the Distribution of First Significant Digits. Annals of Mathematical Statistics, 32: , Theodore P. Hill. A Statistical Derivation of the Significant-Digit Law. Statistical Science, 4: , Charles A.P.N. Carslaw. Anomalies in Income Numbers: Evidence of Goal Oriented Behaviour. The Accounting Review, 63: , Nita Crowder. Fraud Detection Techniques. Internal Auditor, April:17 2, R. S. Sutton and A. G. Barto. Reinforcement Learning: An Introduction. MIT Press, Cambridge, Massachusetts, R. S. Sutton. Learning to predict by the method of Temporal Differences. In Machine Learning, volume 3, pages 9 44, F. Lu and D. Schuurmans. Monte Carlo Matrix Inversion Policy Evaluation. In UAI: Proceedings of the 19th Conference, pages , San Francisco, 23. Morgan Kaufmann. 12. Mark J. Nigrini and Linda J. Mittermaier. The Use of Benford s Law as an Aid in Analytical Procedures. In Auditing: A Journal of Practice and Theory, volume 16(2), pages 52 67, 1997.
Detecting Fraud in Health Insurance Data: Learning to Model Incomplete Benford s Law Distributions
Detecting Fraud in Health Insurance Data: Learning to Model Incomplete Benford s Law Distributions Fletcher Lu 1 and J. Efrim Boritz 2 1 School of Computer Science, University of Waterloo & Canadian Institute
A Guide to Benford s Law. A CaseWare IDEA Research Department Document
A Guide to Benford s Law A CaseWare IDEA Research Department Document January 30, 2007 CaseWare IDEA Inc. is a privately-held software development and marketing company, with offices in Toronto and Ottawa,
THE IMPACT AND REALITY OF FRAUD AUDITING BENFORD S LAW: WHY AND HOW TO USE IT
THE IMPACT AND REALITY OF FRAUD AUDITING BENFORD S LAW: WHY AND HOW TO USE IT Benford's Law is used to find abnormalities in large data sets. Examples of the diversity of data sets include currency amounts,
A Sarsa based Autonomous Stock Trading Agent
A Sarsa based Autonomous Stock Trading Agent Achal Augustine The University of Texas at Austin Department of Computer Science Austin, TX 78712 USA [email protected] Abstract This paper describes an autonomous
AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM
AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM ABSTRACT Luis Alexandre Rodrigues and Nizam Omar Department of Electrical Engineering, Mackenzie Presbiterian University, Brazil, São Paulo [email protected],[email protected]
Using Markov Decision Processes to Solve a Portfolio Allocation Problem
Using Markov Decision Processes to Solve a Portfolio Allocation Problem Daniel Bookstaber April 26, 2005 Contents 1 Introduction 3 2 Defining the Model 4 2.1 The Stochastic Model for a Single Asset.........................
Insider Threat Detection Using Graph-Based Approaches
Cybersecurity Applications & Technology Conference For Homeland Security Insider Threat Detection Using Graph-Based Approaches William Eberle Tennessee Technological University [email protected] Lawrence
The Data Mining Process
Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data
Credit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
Utility-Based Fraud Detection
Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence Utility-Based Fraud Detection Luis Torgo and Elsa Lopes Fac. of Sciences / LIAAD-INESC Porto LA University of
Invoice Number Vendor Number Amount 129304 A543891 $1,035.71 129304 A543891 $1,035.71
Fraud Detection: Using Data Analysis Techniques A new approach being used for fraud prevention and detection involves the examination of patterns in the actual data. The rationale is that unexpected patterns
Dan French Founder & CEO, Consider Solutions
Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The
Learning Tetris Using the Noisy Cross-Entropy Method
NOTE Communicated by Andrew Barto Learning Tetris Using the Noisy Cross-Entropy Method István Szita [email protected] András Lo rincz [email protected] Department of Information Systems, Eötvös
Bayesian Statistics: Indian Buffet Process
Bayesian Statistics: Indian Buffet Process Ilker Yildirim Department of Brain and Cognitive Sciences University of Rochester Rochester, NY 14627 August 2012 Reference: Most of the material in this note
Data Mining Application for Cyber Credit-card Fraud Detection System
, July 3-5, 2013, London, U.K. Data Mining Application for Cyber Credit-card Fraud Detection System John Akhilomen Abstract: Since the evolution of the internet, many small and large companies have moved
Amajor benefit of Monte-Carlo schedule analysis is to
2005 AACE International Transactions RISK.10 The Benefits of Monte- Carlo Schedule Analysis Mr. Jason Verschoor, P.Eng. Amajor benefit of Monte-Carlo schedule analysis is to expose underlying risks to
An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset
P P P Health An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset Peng Liu 1, Elia El-Darzi 2, Lei Lei 1, Christos Vasilakis 2, Panagiotis Chountas 2, and Wei Huang
Data analysis for Internal Audit
Data analysis for Internal Audit What is Data Analytics Analytics is the process of obtaining an optimal or realistic decision based on existing data. Wikipedia Data analytics is the science of examining
Integer Factorization using the Quadratic Sieve
Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 [email protected] March 16, 2011 Abstract We give
Fairfield Public Schools
Mathematics Fairfield Public Schools AP Statistics AP Statistics BOE Approved 04/08/2014 1 AP STATISTICS Critical Areas of Focus AP Statistics is a rigorous course that offers advanced students an opportunity
Introduction to time series analysis
Introduction to time series analysis Margherita Gerolimetto November 3, 2010 1 What is a time series? A time series is a collection of observations ordered following a parameter that for us is time. Examples
Why is Internal Audit so Hard?
Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets
Rule based Classification of BSE Stock Data with Data Mining
International Journal of Information Sciences and Application. ISSN 0974-2255 Volume 4, Number 1 (2012), pp. 1-9 International Research Publication House http://www.irphouse.com Rule based Classification
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
CONTENTS OF DAY 2. II. Why Random Sampling is Important 9 A myth, an urban legend, and the real reason NOTES FOR SUMMER STATISTICS INSTITUTE COURSE
1 2 CONTENTS OF DAY 2 I. More Precise Definition of Simple Random Sample 3 Connection with independent random variables 3 Problems with small populations 8 II. Why Random Sampling is Important 9 A myth,
OBJECTIVE ASSESSMENT OF FORECASTING ASSIGNMENTS USING SOME FUNCTION OF PREDICTION ERRORS
OBJECTIVE ASSESSMENT OF FORECASTING ASSIGNMENTS USING SOME FUNCTION OF PREDICTION ERRORS CLARKE, Stephen R. Swinburne University of Technology Australia One way of examining forecasting methods via assignments
E-commerce Transaction Anomaly Classification
E-commerce Transaction Anomaly Classification Minyong Lee [email protected] Seunghee Ham [email protected] Qiyi Jiang [email protected] I. INTRODUCTION Due to the increasing popularity of e-commerce
Eligibility Traces. Suggested reading: Contents: Chapter 7 in R. S. Sutton, A. G. Barto: Reinforcement Learning: An Introduction MIT Press, 1998.
Eligibility Traces 0 Eligibility Traces Suggested reading: Chapter 7 in R. S. Sutton, A. G. Barto: Reinforcement Learning: An Introduction MIT Press, 1998. Eligibility Traces Eligibility Traces 1 Contents:
A Comparative Study of the Pickup Method and its Variations Using a Simulated Hotel Reservation Data
A Comparative Study of the Pickup Method and its Variations Using a Simulated Hotel Reservation Data Athanasius Zakhary, Neamat El Gayar Faculty of Computers and Information Cairo University, Giza, Egypt
Chapter 14 Managing Operational Risks with Bayesian Networks
Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian
Benford s Law and Digital Frequency Analysis
Get M.A.D. with the Numbers! Moving Benford s Law from Art to Science BY DAVID G. BANKS, CFE, CIA September/October 2000 Until recently, using Benford s Law was as much of an art as a science. Fraud examiners
DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
Fighting Fraud with Data Mining & Analysis
Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: [email protected] Copyright 2008 Leonard Vona and Fraud
EDUCATION AND EXAMINATION COMMITTEE SOCIETY OF ACTUARIES RISK AND INSURANCE. Copyright 2005 by the Society of Actuaries
EDUCATION AND EXAMINATION COMMITTEE OF THE SOCIET OF ACTUARIES RISK AND INSURANCE by Judy Feldman Anderson, FSA and Robert L. Brown, FSA Copyright 25 by the Society of Actuaries The Education and Examination
Practical Calculation of Expected and Unexpected Losses in Operational Risk by Simulation Methods
Practical Calculation of Expected and Unexpected Losses in Operational Risk by Simulation Methods Enrique Navarrete 1 Abstract: This paper surveys the main difficulties involved with the quantitative measurement
Data Mining Applications in Higher Education
Executive report Data Mining Applications in Higher Education Jing Luan, PhD Chief Planning and Research Officer, Cabrillo College Founder, Knowledge Discovery Laboratories Table of contents Introduction..............................................................2
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
The Effective Use of Benford s Law to Assist in Detecting Fraud in Accounting Data
Journal of Forensic Accounting 1524-5586/Vol.V(2004), pp. 17-34 2004 R.T. Edwards, Inc. Printed in U.S.A. The Effective Use of Benford s Law to Assist in Detecting Fraud in Accounting Data Cindy Durtschi
Plastic Card Fraud Detection using Peer Group analysis
Plastic Card Fraud Detection using Peer Group analysis David Weston, Niall Adams, David Hand, Christopher Whitrow, Piotr Juszczak 29 August, 2007 29/08/07 1 / 54 EPSRC Think Crime Peer Group - Peer Group
Time series analysis as a framework for the characterization of waterborne disease outbreaks
Interdisciplinary Perspectives on Drinking Water Risk Assessment and Management (Proceedings of the Santiago (Chile) Symposium, September 1998). IAHS Publ. no. 260, 2000. 127 Time series analysis as a
Finite Mathematics Using Microsoft Excel
Overview and examples from Finite Mathematics Using Microsoft Excel Revathi Narasimhan Saint Peter's College An electronic supplement to Finite Mathematics and Its Applications, 6th Ed., by Goldstein,
THE FIRST-DIGIT PHENOMENON
THE FIRST-DIGIT PHENOMENON T. P. Hill A century-old observation concerning an unexpected pattern in the first digits of many tables of numerical data has recently been discovered to also hold for the stock
Bayesian networks - Time-series models - Apache Spark & Scala
Bayesian networks - Time-series models - Apache Spark & Scala Dr John Sandiford, CTO Bayes Server Data Science London Meetup - November 2014 1 Contents Introduction Bayesian networks Latent variables Anomaly
Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study
Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study Mieke Jans, Nadine Lybaert, and Koen Vanhoof Hasselt University, Agoralaan Building D, 3590 Diepenbeek, Belgium http://www.uhasselt.be/
VERSION NINE. Be A Better Auditor. You Have The Knowledge. We Have The Tools. NEW FEATURES AND ENHANCEMENTS
VERSION NINE Be A Better Auditor. You Have The Knowledge. We Have The Tools. NEW FEATURES AND ENHANCEMENTS IDEA VERSION NINE NEW FEATURES ENHANCEMENTS CaseWare, the global leader in audit analytics software,
Learning in Abstract Memory Schemes for Dynamic Optimization
Fourth International Conference on Natural Computation Learning in Abstract Memory Schemes for Dynamic Optimization Hendrik Richter HTWK Leipzig, Fachbereich Elektrotechnik und Informationstechnik, Institut
Java Modules for Time Series Analysis
Java Modules for Time Series Analysis Agenda Clustering Non-normal distributions Multifactor modeling Implied ratings Time series prediction 1. Clustering + Cluster 1 Synthetic Clustering + Time series
Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG
Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Using Data Mining Methods to Predict Personally Identifiable Information in Emails Liqiang Geng 1, Larry Korba 1, Xin Wang, Yunli Wang 1, Hongyu Liu 1, Yonghua You 1 1 Institute of Information Technology,
Machine Learning. 01 - Introduction
Machine Learning 01 - Introduction Machine learning course One lecture (Wednesday, 9:30, 346) and one exercise (Monday, 17:15, 203). Oral exam, 20 minutes, 5 credit points. Some basic mathematical knowledge
Description of the Sample and Limitations of the Data
Section 3 Description of the Sample and Limitations of the Data T his section describes the 2007 Corporate sample design, sample selection, data capture, data cleaning, and data completion. The techniques
Simulation Exercises to Reinforce the Foundations of Statistical Thinking in Online Classes
Simulation Exercises to Reinforce the Foundations of Statistical Thinking in Online Classes Simcha Pollack, Ph.D. St. John s University Tobin College of Business Queens, NY, 11439 [email protected]
Glossary of Terms Ability Accommodation Adjusted validity/reliability coefficient Alternate forms Analysis of work Assessment Battery Bias
Glossary of Terms Ability A defined domain of cognitive, perceptual, psychomotor, or physical functioning. Accommodation A change in the content, format, and/or administration of a selection procedure
How To Understand And Solve A Linear Programming Problem
At the end of the lesson, you should be able to: Chapter 2: Systems of Linear Equations and Matrices: 2.1: Solutions of Linear Systems by the Echelon Method Define linear systems, unique solution, inconsistent,
Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions
Fighting Identity Fraud with Data Mining Groundbreaking means to prevent fraud in identity management solutions Contents Executive summary Executive summary 3 The impact of identity fraud? 4 The forgery
Risk Analysis and Quantification
Risk Analysis and Quantification 1 What is Risk Analysis? 2. Risk Analysis Methods 3. The Monte Carlo Method 4. Risk Model 5. What steps must be taken for the development of a Risk Model? 1.What is Risk
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, [email protected] Abstract: Independent
COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES
COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES JULIA IGOREVNA LARIONOVA 1 ANNA NIKOLAEVNA TIKHOMIROVA 2 1, 2 The National Nuclear Research
GN47: Stochastic Modelling of Economic Risks in Life Insurance
GN47: Stochastic Modelling of Economic Risks in Life Insurance Classification Recommended Practice MEMBERS ARE REMINDED THAT THEY MUST ALWAYS COMPLY WITH THE PROFESSIONAL CONDUCT STANDARDS (PCS) AND THAT
Incorporating Internal Gradient and Restricted Diffusion Effects in Nuclear Magnetic Resonance Log Interpretation
The Open-Access Journal for the Basic Principles of Diffusion Theory, Experiment and Application Incorporating Internal Gradient and Restricted Diffusion Effects in Nuclear Magnetic Resonance Log Interpretation
Evaluating Trading Systems By John Ehlers and Ric Way
Evaluating Trading Systems By John Ehlers and Ric Way INTRODUCTION What is the best way to evaluate the performance of a trading system? Conventional wisdom holds that the best way is to examine the system
Monte Carlo simulations and option pricing
Monte Carlo simulations and option pricing by Bingqian Lu Undergraduate Mathematics Department Pennsylvania State University University Park, PA 16802 Project Supervisor: Professor Anna Mazzucato July,
Institute of Actuaries of India Subject CT3 Probability and Mathematical Statistics
Institute of Actuaries of India Subject CT3 Probability and Mathematical Statistics For 2015 Examinations Aim The aim of the Probability and Mathematical Statistics subject is to provide a grounding in
Benford s Law and Fraud Detection, or: Why the IRS Should Care About Number Theory!
Benford s Law and Fraud Detection, or: Why the IRS Should Care About Number Theory! Steven J Miller Williams College [email protected] http://www.williams.edu/go/math/sjmiller/ Bronfman Science
Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP [email protected]. Copyright 2015 Edward S.
MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP [email protected] Fraud Awareness & Internal Controls Awareness Internal
Temporal Difference Learning in the Tetris Game
Temporal Difference Learning in the Tetris Game Hans Pirnay, Slava Arabagi February 6, 2009 1 Introduction Learning to play the game Tetris has been a common challenge on a few past machine learning competitions.
Understanding the effects of fraud and abuse on your group benefits plan
Understanding the effects of fraud and abuse on your group benefits plan Let s work together to prevent them GROUP INSURANCE Fraud and abuse have a big impact on your group benefits plan The cost of healthcare
Predictive Modeling in Workers Compensation 2008 CAS Ratemaking Seminar
Predictive Modeling in Workers Compensation 2008 CAS Ratemaking Seminar Prepared by Louise Francis, FCAS, MAAA Francis Analytics and Actuarial Data Mining, Inc. www.data-mines.com [email protected]
Creating Synthetic Temporal Document Collections for Web Archive Benchmarking
Creating Synthetic Temporal Document Collections for Web Archive Benchmarking Kjetil Nørvåg and Albert Overskeid Nybø Norwegian University of Science and Technology 7491 Trondheim, Norway Abstract. In
t Tests in Excel The Excel Statistical Master By Mark Harmon Copyright 2011 Mark Harmon
t-tests in Excel By Mark Harmon Copyright 2011 Mark Harmon No part of this publication may be reproduced or distributed without the express permission of the author. [email protected] www.excelmasterseries.com
Mining Signatures in Healthcare Data Based on Event Sequences and its Applications
Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Siddhanth Gokarapu 1, J. Laxmi Narayana 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India 1
Machine Learning: Overview
Machine Learning: Overview Why Learning? Learning is a core of property of being intelligent. Hence Machine learning is a core subarea of Artificial Intelligence. There is a need for programs to behave
An Application of Inverse Reinforcement Learning to Medical Records of Diabetes Treatment
An Application of Inverse Reinforcement Learning to Medical Records of Diabetes Treatment Hideki Asoh 1, Masanori Shiro 1 Shotaro Akaho 1, Toshihiro Kamishima 1, Koiti Hasida 1, Eiji Aramaki 2, and Takahide
Recognizing The Theft of Identity Using Data Mining
Recognizing The Theft of Identity Using Data Mining Aniruddha Kshirsagar 1, Lalit Dole 2 1,2 CSE Department, GHRCE, Nagpur, Maharashtra, India Abstract Identity fraud is the great matter of concern in
D A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
Cheating behavior and the Benford s Law Professor Dominique Geyer, (E-mail : [email protected]) Nantes Graduate School of Management, France
Cheating behavior and the Benford s Law Professor Dominique Geyer, (Email : [email protected]) Nantes Graduate School of Management, France Abstract Previous studies (Carslaw, ; Thomas, ; Niskanen &
Strategic Online Advertising: Modeling Internet User Behavior with
2 Strategic Online Advertising: Modeling Internet User Behavior with Patrick Johnston, Nicholas Kristoff, Heather McGinness, Phuong Vu, Nathaniel Wong, Jason Wright with William T. Scherer and Matthew
Comparison of Major Domination Schemes for Diploid Binary Genetic Algorithms in Dynamic Environments
Comparison of Maor Domination Schemes for Diploid Binary Genetic Algorithms in Dynamic Environments A. Sima UYAR and A. Emre HARMANCI Istanbul Technical University Computer Engineering Department Maslak
EXPLORING SPATIAL PATTERNS IN YOUR DATA
EXPLORING SPATIAL PATTERNS IN YOUR DATA OBJECTIVES Learn how to examine your data using the Geostatistical Analysis tools in ArcMap. Learn how to use descriptive statistics in ArcMap and Geoda to analyze
How to report the percentage of explained common variance in exploratory factor analysis
UNIVERSITAT ROVIRA I VIRGILI How to report the percentage of explained common variance in exploratory factor analysis Tarragona 2013 Please reference this document as: Lorenzo-Seva, U. (2013). How to report
The Variability of P-Values. Summary
The Variability of P-Values Dennis D. Boos Department of Statistics North Carolina State University Raleigh, NC 27695-8203 [email protected] August 15, 2009 NC State Statistics Departement Tech Report
Enhanced data mining analysis in higher educational system using rough set theory
African Journal of Mathematics and Computer Science Research Vol. 2(9), pp. 184-188, October, 2009 Available online at http://www.academicjournals.org/ajmcsr ISSN 2006-9731 2009 Academic Journals Review
In this presentation, you will be introduced to data mining and the relationship with meaningful use.
In this presentation, you will be introduced to data mining and the relationship with meaningful use. Data mining refers to the art and science of intelligent data analysis. It is the application of machine
Statistical estimation using confidence intervals
0894PP_ch06 15/3/02 11:02 am Page 135 6 Statistical estimation using confidence intervals In Chapter 2, the concept of the central nature and variability of data and the methods by which these two phenomena
6 Scalar, Stochastic, Discrete Dynamic Systems
47 6 Scalar, Stochastic, Discrete Dynamic Systems Consider modeling a population of sand-hill cranes in year n by the first-order, deterministic recurrence equation y(n + 1) = Ry(n) where R = 1 + r = 1
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
How To Write A Data Analysis
Mathematics Probability and Statistics Curriculum Guide Revised 2010 This page is intentionally left blank. Introduction The Mathematics Curriculum Guide serves as a guide for teachers when planning instruction
Survey of more than 1,500 Auditors Concludes that Audit Professionals are Not Maximizing Use of Available Audit Technology
Survey of more than 1,500 Auditors Concludes that Audit Professionals are Not Maximizing Use of Available Audit Technology Key findings from the survey include: while audit software tools have been available
December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B. KITCHENS
December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B KITCHENS The equation 1 Lines in two-dimensional space (1) 2x y = 3 describes a line in two-dimensional space The coefficients of x and y in the equation
Data Mining Approach For Subscription-Fraud. Detection in Telecommunication Sector
Contemporary Engineering Sciences, Vol. 7, 2014, no. 11, 515-522 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4431 Data Mining Approach For Subscription-Fraud Detection in Telecommunication
