Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2
|
|
- Meghan Booker
- 8 years ago
- Views:
Transcription
1 Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2 1Department of Computer Engineering & Application, NITTTR, Shyamla Hills, Bhopal M.P., INDIA 2Associate Professor, Department of Computer Engineering & Application, NITTTR, Shyamla Hills, Bhopal M.P., INDIA isharajak20@gmail.com, kjmathai@nitttrbpl.ac.in A B S T R A C T These days, financial institutions usually develop fraud detection systems targeted to their own asset bases. Fraud detection systems are most prevalent in credit card transactions, telecommunications, network intrusions, finance and insurance, and scientific applications. In recent years the number of fraud cases has been on a rise. The traditional and age-old system of intelligence and fraud record maintenance has failed to live up to the requirements of the existing fraud scenario. There are many discussions about frauds and fraudulent activities in different industries. Hence fraudulent activities in the areas of businesses and our daily lives, have now become an important area of research. There are various Hybrid approaches for the Fraud Detection, like through classification, clustering, regression, association etc. In this paper, the researcher is concentrating on a hybrid approach based on danger theory and support vector machine (SVM) which takes advantages of Danger theory to remove fraud transactions and then SVM support to classify these transactions. Index Terms Support Vector Machine (SVM), Danger Theory, Fraud Detection, Credit Card Fraud, Ensemble Approach, Hybrid Approach. I. INTRODUCTION The main reason of doing Fraud is for financial benefits or becoming a reason of loss by deception either by implicit or explicit ways; it is a way for get fraudster benefits by the means of unlawful advantage. Credit card fraud is a major problem for financial institutions globally. Globally, It is main reason and accountable for dollars in losses per annum. Fraud can be defined as criminal deception intended to result in financial gain. Along with the developments in the Information Technology, fraud has been extending all over the world with results of huge financial losses [1]. With the increased use of credit cards, fraudsters are also finding more opportunities to fraudulent activities which effects bank as well as card holders to large financial losses [2]. Fraud detection is a vital business function for minimizing the effects of unauthorized transactions upon organizations customer service delivery, bottom line expenditure and business reputation through deployment of innovative fraud technology frameworks. Fraud detection is about identifying fraud as soon as possible and responding to it [3]. Institutions are now moving towards increasingly proactive methods of fraud detection for real time screening of financial data, and triggering of a preventive response prior to transaction completion in order to minimize the potential fraud deficit [4]. To understand the concept of various aspects like Credit data Fraud detection, Artificial Immune system, Support Vector Machine and their integration, have been explained in the paper. The structure of this paper is as follows: in section II the critical aspects of credit card fraud detection, Section III, briefly explains the need of Artificial Immune System and Danger Theory and Section IV to before implementing , IJAFRC All Rights Reserved
2 the Support Vector Machine. The Section V presents the proposed research based on SVM and Danger Theory based integrated solution for Fraud Detection. II. CREDIT CARD FRAUD DETECTION Most vulnerable areas of fraudulent activities are in unauthorized credit card usage, cell phone bill, superfluous insurance claim and stock exchange insider trading. Stolen credit cards are used in an unusual way than the normal pattern. The usage pattern of a stolen credit card is compared against the regular usage data of the actual owner and thus fraudsters are detected from the credit card transaction data [6]. Criminal rings of illegal insurance claimants and providers manipulate the claim processing system for unauthorized claims. Tracking such activities help the company to avoid financial losses. Neural network based techniques have been successfully applied to detect such outliers. Insider trading is a criminal activity in the stock market, where profit is made by insider from the available information before this information gets public. All together, Credit cards are a fine destination for fraud, since in a very short time a large amount of money can be earned without taking too many hazards. This is because, the crime is only detected normally several weeks after date [5]. As we know that Credit card fraud is very critical and sensitive issue. In this, credit card fraud can be done to make purchases without permission or counterfeiting a credit card [7]. Various kind of credit card frauds are: online credit card fraud, shave and paste, stolen card numbers, advance payments etc. If the same scenario grows up continuously then, this fraud will go beyond number of paid checks. And this thing could happen even before the end of the decade. As the industry continues to expand and offer credit to more and more consumers, fraud will also grow. In the case of fraud detection mechanism, it is given a set of credit card transactions, the process of through which it identifies those transactions that are fraudulent. A desirable fraud detection system needs good metrics to evaluate the system. The system should take into account the cost of the fraudulent behaviour detected and the cost associated with stopping it. In fact, there is a decision layer on top of the fraud detection system. This layer decides what actions to take when fraudulent behaviour is detected via the fraud detection system [5, 8]. III. ARTIFICIAL IMMUNE SYSTEM The problems found in a computer security system are quite similar to those encountered in a Biological Immune System (BIS), since both of them have to maintain stability in a changing environment. Due to numerous desirable characteristics of the natural immune system, such as diversity, self tolerance, immune memory, distributed computation, self-organization, self-learning, self-adaptation, and robustness, BIS has attracted many researchers attention [9] [10]. At the same time, Artificial Immune System (AIS) have become an increasingly popular computational intelligence paradigm [11][12]. Artificial Immune System (AIS) are still relatively young and the natural immune system (NIS) is one of the most complex systems under active study by biologists, there are some distinct viewpoints about the main goal of the NIS. These ideas and understandings are extremely important for AIS researchers and designers. The main two distinct viewpoints are between self & non-self theory and this is with approach of danger theory. The classical immunology stipulates say that that an response of immune is gets start when and only when the specific body meets a particle which something called non-self or another way around foreign particle[13]. This viewpoint is generally accepted by immunologists, and the models are created by AIS researchers based on this approach. A lot of question marks arise from this viewpoint, and a new theory called Danger Theory has been developed. The ultimate and most vital aspect of behind the seen of danger theory is that the immune system which is responsible to react, actually does not react to non-self but at the same point time to danger. Likewise the concept or phenomena of , IJAFRC All Rights Reserved
3 the self and non-self theories, it basically ropes the requirement for narrow-mindedness in all. Moreover at the same point of time, it get different in order to answer that what and how it should be reacted. It would not react to foreignness, all together in other words we can consider that this system reacts to consider it as danger [14].The concept of AIS in whole including Danger theory can be used to find abnormal users who could be part of fraud activity. There are so many advantages of using Danger Theory. It makes convenient approach to separate abnormal data from the normal dataset which makes the process so convenient and effective. It improves the quality of the output by eliminating bad causes. But at the same time it over bourdon the system too. It is so because it requires extra time to filter out abnormality. Therefore researcher believes the need of Artificial Immune System and Danger theory before implementing the Support Vector Machine to filter abnormal data from actual dataset for the cause of detecting the credit fraud. IV. SUPPORT VECTOR MACHINE The Support Vector Machine (SVM) is solely developed by prominent person Vapnik [15]. Is is really very hard to maintain the ease and quality of SVM training is very much far from the capacities of more traditional methods. It could be that SVM could be more complex for so many areas for example text and image classification, handwriting recognition, and bioinformatics etc. One of the vital importance point regarding the SVM that it is good enough on data sets which have lot of attributes, even though with very few cases on which we need to train the model. The support vector machine [SVM] is a training algorithm. It trains the classifier to predict the class of the new sample. SVM is mainly based on the idea of decision planes which explicitly talked about decision boundary and point out the area which form the decision boundary between the classes called support vector treat as parameter. SVM is based on the machine learning algorithm invented by vapnik in 1960 s. It is also based on the structure risk minimization principle to prevent over fitting. There are two key implementations of SVM technique that are mathematical programming and kernel function. It finds an Optimal separates hyper plane between data point of different classes in a high dimensional space. Assuming two classes for classification, P and N for Yn= 1,-1, which can be extended to K class classification by using K two class classifiers. Support Vector Classifier (SVC) searches hyper plane for classification. But SVC is outlined so kernel functions are introduced in order to non line on decision surface. A. Linear SVC Let w is weight vector, Xn is the nearest data point. w T +b 1 for x n ε P And w T x n+b 1 for x n ε N. A2 Support Vectors Optimal Hyperplane Optimal Margin A1 Figure 1. Linear SVC , IJAFRC All Rights Reserved
4 For optimization the problem minimizes the ½[w T w] Subject to y n (w T w+b) 1 for n=1to N. B. Non linear SVC Non-linear SVC can be used to learn nonlinear decision function space. SVM can also be extended for learning non-linear decision function. C. Non separable case Noise is present in the training data, some data point may be misclassified. (i) Advantages a. Accurate methods among all machine learning algorithms. It finds the best classification function of training data b. SVM prevents over fitting than other methods. (ii) Disadvantages a. It is computationally expensive. b. SVMs require large amount of training time and large amount of storage and poor interpretability of results. (iii) Challenge in SVM a. Implementation of SVM is determined by the kernel so find best kernels for appropriate application is the open challenge. b. SVM model is very expensive for the space and evaluation. V. PROPOSED WORK Now looking to the advantages of Danger theory before implementing the Support Vector Machine the researchers proposes to develop an immune Support Vector Machine (SVM) approach for Credit Card Fraud Detection System as shown in figure 2. Dataset from LOG file of Web Users HYBRID APPROACH -- DANGER THEORY & SVM CLASSIFIER Various Pattern Analyses Figure 2. Architecture of Proposed Work , IJAFRC All Rights Reserved
5 The proposed ensemble method has two folds, as shown in fig Danger Theory 2. Support Vector Machine (SVM) The researcher assumes that implementation of hybrid- two approach would give better results than single approach. Before implementing a SVM technique to find Fraud detection, researcher would use danger theory to rectify the bad user s data prior to start of actual work (as discussed in section III). That is the main reason behind all ensemble approach of credit card fraud detection. VI. CONCLUSION AND FUTURE WORK Due to the rapid advances of electronic commerce on the Internet, the use of credit cards for purchasing has become necessary and also convenient. But with the growing number of credit card transactions, more opportunities become available for thieves to steal credit card numbers and subsequently commit fraud. Transaction fraud detection is an important, but hard, real world problem. A significant amount of engineering is required to produce effective solutions. The above challenge motivates researcher to improve the performance of fraud detection system. There is scope for improvement of the fraud detection system by increasing the performance in terms of fraud classification. The researcher believe SVM model in conjunction with Danger theory concept of Artificial Immune System (AIS) can efficiently optimized to reduce Credit card frauds so that the user can experience best performance with high scalability and reliability solution. VII. REFERENCES [1] S. Panigrahi, A. Kundu, and et ai, "Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning", Inf ormation Fusion, Vol.lO, No. 4, pp , [2] CA. W. Paasch, "Credit card fraud detection using artificial neural networks tuned bv genetic algorithms." Thesis (Ph.D.), The Hong Kong University of Science and Technology, February [3] R. Huang, H. Tawfik and A.K. Nagar, "A Novel Hybrid Artificial Immune Inspired Approach for Online Break-in Fraud Detection, " Faculty of Business and Computer Sciences, Liverpool Hope University, Liverpool, United Kingdom International Conference on Computational Science, ICCS [4] M. Krivko, "A Hybrid Model For Plastic Card Fraud Detection Systems", Expert Systems with Applications, Vol. 37, No. 8, pp , [5] Maes, S., Tuyls, K., Vanschoenwinkel, B. & Manderick, B. Credit Card Fraud Detection using Bayesian and Neural Networks, Proc. of the 1 st International NAISO Congress on Neuro Fuzzy Technologies, (2002). [6] R. J. Bolton and D. J. H, Unsupervised profiling methods for fraud detection, in Proc. Credit Scoring and Credit Control VII, 2001, pp , IJAFRC All Rights Reserved
6 [7] Balan, Lăcrămioara, and Mihai Popescu. "Credit card fraud." The USV Annals of Economics and Public Administration 11.1 (2011): [8] Tetro, Donald, Edward Lipton, and Andrew Sackheim. "System and method for enhanced fraud detection in automated electronic credit card processing," U.S. Patent No. 6,095, Aug [9] F. Sun, and F. Xu, Antibody concentration based method for network security situation awareness, Proc. of the 3nd International Conference on Bioinformatics and Biomedical Engineering (icbbe 2009), IEEE Press, pp. 1-4, June [10] F. Sun, S. Cheng, A gene technology inspired paradigm for user authentication, Proc. of the 3nd International Conference on Bioinformatics and Biomedical Engineering(iCBBE 2009), IEEE Press, pp. 1-3, June [11] W. Zhang, C. Wu, and X. Liu, Construction and enumeration of Boolean functions with maximum algebraic immunity, Science In China, Series F: Information Science, vol. 52, pp.32-40, January [12] F. Sun, and Z. Wu, A new risk assessment model for e-government network security based on antibody concentration, IEEE, Proc. of the 2009 International Conference on E-Learning, E- Business, Enterprise Information Systems, and E-Government. pp , December [13] Perelson, A. S. & Weisbuch, G. (1997), Immunology for Physicists," Rev. of Modem Physics, 69(4), pp [14] P. Matzinger, (2002), "The Danger Model: A Renewed Sense of Self', Science, 296, pp [15] V. Vapnik, The nature of statistical learning theory, New York: Springer-Verlag, , IJAFRC All Rights Reserved
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
More informationENSREdm: E-government Network Security Risk Evaluation Method Based on Danger Model
Research Journal of Applied Sciences, Engineering and Technology 5(21): 4988-4993, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: July 31, 2012 Accepted: September
More informationKnowledge Discovery from patents using KMX Text Analytics
Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs anton.heijs@treparel.com Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers
More informationScalable Developments for Big Data Analytics in Remote Sensing
Scalable Developments for Big Data Analytics in Remote Sensing Federated Systems and Data Division Research Group High Productivity Data Processing Dr.-Ing. Morris Riedel et al. Research Group Leader,
More informationTo improve the problems mentioned above, Chen et al. [2-5] proposed and employed a novel type of approach, i.e., PA, to prevent fraud.
Proceedings of the 5th WSEAS Int. Conference on Information Security and Privacy, Venice, Italy, November 20-22, 2006 46 Back Propagation Networks for Credit Card Fraud Prediction Using Stratified Personalized
More informationNetwork Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
More informationA STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
More informationLluis Belanche + Alfredo Vellido. Intelligent Data Analysis and Data Mining
Lluis Belanche + Alfredo Vellido Intelligent Data Analysis and Data Mining a.k.a. Data Mining II Office 319, Omega, BCN EET, office 107, TR 2, Terrassa avellido@lsi.upc.edu skype, gtalk: avellido Tels.:
More informationOpen Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *
Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network
More informationDATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
More informationAn Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
More informationArtificial Neural Network and Location Coordinates based Security in Credit Cards
Artificial Neural Network and Location Coordinates based Security in Credit Cards 1 Hakam Singh, 2 Vandna Thakur Department of Computer Science Career Point University Hamirpur Himachal Pradesh,India Abstract
More informationData Mining Application for Cyber Credit-card Fraud Detection System
, July 3-5, 2013, London, U.K. Data Mining Application for Cyber Credit-card Fraud Detection System John Akhilomen Abstract: Since the evolution of the internet, many small and large companies have moved
More informationIntrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department
More informationApplication of Hidden Markov Model in Credit Card Fraud Detection
Application of Hidden Markov Model in Credit Card Fraud Detection V. Bhusari 1, S. Patil 1 1 Department of Computer Technology, College of Engineering, Bharati Vidyapeeth, Pune, India, 400011 Email: vrunda1234@gmail.com
More informationResearch Article FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining
e Scientific World Journal, Article ID 252797, 10 pages http://dx.doi.org/10.1155/2014/252797 Research Article FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining K.
More informationEFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
More informationBIOINF 585 Fall 2015 Machine Learning for Systems Biology & Clinical Informatics http://www.ccmb.med.umich.edu/node/1376
Course Director: Dr. Kayvan Najarian (DCM&B, kayvan@umich.edu) Lectures: Labs: Mondays and Wednesdays 9:00 AM -10:30 AM Rm. 2065 Palmer Commons Bldg. Wednesdays 10:30 AM 11:30 AM (alternate weeks) Rm.
More informationBEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
ISSN: 2229-6956(ONLINE) ICTACT JOURNAL ON SOFT COMPUTING, JULY 2012, VOLUME: 02, ISSUE: 04 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES V. Dheepa 1 and R. Dhanapal 2 1 Research
More informationMachine Learning. 01 - Introduction
Machine Learning 01 - Introduction Machine learning course One lecture (Wednesday, 9:30, 346) and one exercise (Monday, 17:15, 203). Oral exam, 20 minutes, 5 credit points. Some basic mathematical knowledge
More informationPROBLEM REDUCTION IN ONLINE PAYMENT SYSTEM USING HYBRID MODEL
PROBLEM REDUCTION IN ONLINE PAYMENT SYSTEM USING HYBRID MODEL Sandeep Pratap Singh 1, Shiv Shankar P. Shukla 1, Nitin Rakesh 1 and Vipin Tyagi 2 1 Department of Computer Science and Engineering, Jaypee
More informationShafzon@yahool.com. Keywords - Algorithm, Artificial immune system, E-mail Classification, Non-Spam, Spam
An Improved AIS Based E-mail Classification Technique for Spam Detection Ismaila Idris Dept of Cyber Security Science, Fed. Uni. Of Tech. Minna, Niger State Idris.ismaila95@gmail.com Abdulhamid Shafi i
More informationFeature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier
Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier D.Nithya a, *, V.Suganya b,1, R.Saranya Irudaya Mary c,1 Abstract - This paper presents,
More informationIdentifying Online Credit Card Fraud using Artificial Immune Systems
Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title Identifying online credit card fraud using
More informationUnsupervised Outlier Detection in Time Series Data
Unsupervised Outlier Detection in Time Series Data Zakia Ferdousi and Akira Maeda Graduate School of Science and Engineering, Ritsumeikan University Department of Media Technology, College of Information
More informationMachine Learning for Fraud Detection
Enhedens navn Machine Learning for Fraud Detection Dídac Rodríguez Arbonès didac@di.ku.dk Fraud Fraud in Denmark is a substantial issue. The financial institutions are keen on prevention. It is a very
More informationComputational intelligence in intrusion detection systems
Computational intelligence in intrusion detection systems --- An introduction to an introduction Rick Chang @ TEIL Reference The use of computational intelligence in intrusion detection systems : A review
More informationTechniques for Fraud Detection
Analysis on Credit Card Fraud Detection Methods 1 Renu HCE Sonepat 2 Suman HCE Sonepat Abstract Due to the theatrical increase of fraud which results in loss of dollars worldwide each year, several modern
More informationUsing Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
More informationREVIEW OF ENSEMBLE CLASSIFICATION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
More informationSURVIVABILITY OF COMPLEX SYSTEM SUPPORT VECTOR MACHINE BASED APPROACH
1 SURVIVABILITY OF COMPLEX SYSTEM SUPPORT VECTOR MACHINE BASED APPROACH Y, HONG, N. GAUTAM, S. R. T. KUMARA, A. SURANA, H. GUPTA, S. LEE, V. NARAYANAN, H. THADAKAMALLA The Dept. of Industrial Engineering,
More informationData Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over
More informationMachine learning for algo trading
Machine learning for algo trading An introduction for nonmathematicians Dr. Aly Kassam Overview High level introduction to machine learning A machine learning bestiary What has all this got to do with
More informationOperations Research and Knowledge Modeling in Data Mining
Operations Research and Knowledge Modeling in Data Mining Masato KODA Graduate School of Systems and Information Engineering University of Tsukuba, Tsukuba Science City, Japan 305-8573 koda@sk.tsukuba.ac.jp
More informationElectronic Payment Fraud Detection Techniques
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 4, 137-141, 2012 Electronic Payment Fraud Detection Techniques Adnan M. Al-Khatib CIS Dept. Faculty of Information
More informationNeural Networks in Data Mining
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V6 PP 01-06 www.iosrjen.org Neural Networks in Data Mining Ripundeep Singh Gill, Ashima Department
More informationIntroduction to Data Mining
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
More informationHYBRID PROBABILITY BASED ENSEMBLES FOR BANKRUPTCY PREDICTION
HYBRID PROBABILITY BASED ENSEMBLES FOR BANKRUPTCY PREDICTION Chihli Hung 1, Jing Hong Chen 2, Stefan Wermter 3, 1,2 Department of Management Information Systems, Chung Yuan Christian University, Taiwan
More informationImpact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
More informationMA2823: Foundations of Machine Learning
MA2823: Foundations of Machine Learning École Centrale Paris Fall 2015 Chloé-Agathe Azencot Centre for Computational Biology, Mines ParisTech chloe agathe.azencott@mines paristech.fr TAs: Jiaqian Yu jiaqian.yu@centralesupelec.fr
More informationSearch Taxonomy. Web Search. Search Engine Optimization. Information Retrieval
Information Retrieval INFO 4300 / CS 4300! Retrieval models Older models» Boolean retrieval» Vector Space model Probabilistic Models» BM25» Language models Web search» Learning to Rank Search Taxonomy!
More informationAn Evaluation of Neural Networks Approaches used for Software Effort Estimation
Proc. of Int. Conf. on Multimedia Processing, Communication and Info. Tech., MPCIT An Evaluation of Neural Networks Approaches used for Software Effort Estimation B.V. Ajay Prakash 1, D.V.Ashoka 2, V.N.
More informationMachine Learning in FX Carry Basket Prediction
Machine Learning in FX Carry Basket Prediction Tristan Fletcher, Fabian Redpath and Joe D Alessandro Abstract Artificial Neural Networks ANN), Support Vector Machines SVM) and Relevance Vector Machines
More informationRecognizing The Theft of Identity Using Data Mining
Recognizing The Theft of Identity Using Data Mining Aniruddha Kshirsagar 1, Lalit Dole 2 1,2 CSE Department, GHRCE, Nagpur, Maharashtra, India Abstract Identity fraud is the great matter of concern in
More informationCredit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
More informationA Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM
Journal of Computational Information Systems 10: 17 (2014) 7629 7635 Available at http://www.jofcis.com A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM Tian
More informationModeling and Design of Intelligent Agent System
International Journal of Control, Automation, and Systems Vol. 1, No. 2, June 2003 257 Modeling and Design of Intelligent Agent System Dae Su Kim, Chang Suk Kim, and Kee Wook Rim Abstract: In this study,
More informationFraud Detection in Online Banking Using HMM
2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Fraud Detection in Online Banking Using HMM Sunil Mhamane + and L.M.R.J
More informationIs a Data Scientist the New Quant? Stuart Kozola MathWorks
Is a Data Scientist the New Quant? Stuart Kozola MathWorks 2015 The MathWorks, Inc. 1 Facts or information used usually to calculate, analyze, or plan something Information that is produced or stored by
More informationClassification and Prediction techniques using Machine Learning for Anomaly Detection.
Classification and Prediction techniques using Machine Learning for Anomaly Detection. Pradeep Pundir, Dr.Virendra Gomanse,Narahari Krishnamacharya. *( Department of Computer Engineering, Jagdishprasad
More informationHow To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
More informationPredictive Analytics using Genetic Algorithm for Efficient Supply Chain Inventory Optimization
182 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.3, March 2010 Predictive Analytics using Genetic Algorithm for Efficient Supply Chain Inventory Optimization P.Radhakrishnan
More informationDecision Support Systems
Decision Support Systems 50 (2011) 602 613 Contents lists available at ScienceDirect Decision Support Systems journal homepage: www.elsevier.com/locate/dss Data mining for credit card fraud: A comparative
More informationE-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm
E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm Ismaila Idris Dept of Cyber Security Science, Federal University of Technology, Minna, Nigeria. Idris.ismaila95@gmail.com
More informationOptimizing content delivery through machine learning. James Schneider Anton DeFrancesco
Optimizing content delivery through machine learning James Schneider Anton DeFrancesco Obligatory company slide Our Research Areas Machine learning The problem Prioritize import information in low bandwidth
More informationHow To Detect Credit Card Fraud
Card Fraud Howard Mizes December 3, 2013 2013 Xerox Corporation. All rights reserved. Xerox and Xerox Design are trademarks of Xerox Corporation in the United States and/or other countries. Outline of
More informationHow To Improve Cloud Computing With An Ontology System For An Optimal Decision Making
International Journal of Computational Engineering Research Vol, 04 Issue, 1 An Ontology System for Ability Optimization & Enhancement in Cloud Broker Pradeep Kumar M.Sc. Computer Science (AI) Central
More informationSVM Ensemble Model for Investment Prediction
19 SVM Ensemble Model for Investment Prediction Chandra J, Assistant Professor, Department of Computer Science, Christ University, Bangalore Siji T. Mathew, Research Scholar, Christ University, Dept of
More informationAn Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
More informationA Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model Twinkle Patel, Ms. Ompriya Kale Abstract: - As the usage of credit card has increased the credit card fraud has also increased
More informationUsing reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
More informationDetection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
More informationIntrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
More informationA Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
More informationE-commerce Transaction Anomaly Classification
E-commerce Transaction Anomaly Classification Minyong Lee minyong@stanford.edu Seunghee Ham sham12@stanford.edu Qiyi Jiang qjiang@stanford.edu I. INTRODUCTION Due to the increasing popularity of e-commerce
More informationIDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION
http:// IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION Harinder Kaur 1, Raveen Bajwa 2 1 PG Student., CSE., Baba Banda Singh Bahadur Engg. College, Fatehgarh Sahib, (India) 2 Asstt. Prof.,
More informationNEURAL NETWORKS IN DATA MINING
NEURAL NETWORKS IN DATA MINING 1 DR. YASHPAL SINGH, 2 ALOK SINGH CHAUHAN 1 Reader, Bundelkhand Institute of Engineering & Technology, Jhansi, India 2 Lecturer, United Institute of Management, Allahabad,
More informationPredictive Analytics Techniques: What to Use For Your Big Data. March 26, 2014 Fern Halper, PhD
Predictive Analytics Techniques: What to Use For Your Big Data March 26, 2014 Fern Halper, PhD Presenter Proven Performance Since 1995 TDWI helps business and IT professionals gain insight about data warehousing,
More informationArtificial Neural Networks and Support Vector Machines. CS 486/686: Introduction to Artificial Intelligence
Artificial Neural Networks and Support Vector Machines CS 486/686: Introduction to Artificial Intelligence 1 Outline What is a Neural Network? - Perceptron learners - Multi-layer networks What is a Support
More informationMachine Learning in Spam Filtering
Machine Learning in Spam Filtering A Crash Course in ML Konstantin Tretyakov kt@ut.ee Institute of Computer Science, University of Tartu Overview Spam is Evil ML for Spam Filtering: General Idea, Problems.
More informationBEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
More informationNeural Networks and Support Vector Machines
INF5390 - Kunstig intelligens Neural Networks and Support Vector Machines Roar Fjellheim INF5390-13 Neural Networks and SVM 1 Outline Neural networks Perceptrons Neural networks Support vector machines
More informationRobust Outlier Detection Technique in Data Mining: A Univariate Approach
Robust Outlier Detection Technique in Data Mining: A Univariate Approach Singh Vijendra and Pathak Shivani Faculty of Engineering and Technology Mody Institute of Technology and Science Lakshmangarh, Sikar,
More informationSURVEY OF TEXT CLASSIFICATION ALGORITHMS FOR SPAM FILTERING
I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 233-237 SURVEY OF TEXT CLASSIFICATION ALGORITHMS FOR SPAM FILTERING K. SARULADHA 1 AND L. SASIREKA 2 1 Assistant Professor, Department of Computer Science and
More informationAutomatic Bank Fraud Detection Using Support Vector Machines
Automatic Bank Fraud Detection Using Support Vector Machines Djeffal Abdelhamid 1, Soltani Khaoula 1, Ouassaf Atika 2 1 Computer science department, LESIA Laboratory, Biskra University, Algeria 2 Economic
More informationAn Analysis on Density Based Clustering of Multi Dimensional Spatial Data
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data K. Mumtaz 1 Assistant Professor, Department of MCA Vivekanandha Institute of Information and Management Studies, Tiruchengode,
More informationDoctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
More informationVisualization of Breast Cancer Data by SOM Component Planes
International Journal of Science and Technology Volume 3 No. 2, February, 2014 Visualization of Breast Cancer Data by SOM Component Planes P.Venkatesan. 1, M.Mullai 2 1 Department of Statistics,NIRT(Indian
More informationRandom forest algorithm in big data environment
Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest
More informationPrediction of Stock Performance Using Analytical Techniques
136 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 5, NO. 2, MAY 2013 Prediction of Stock Performance Using Analytical Techniques Carol Hargreaves Institute of Systems Science National University
More informationA Survey on Outlier Detection Techniques for Credit Card Fraud Detection
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud
More informationKEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
More informationMachine Learning: Overview
Machine Learning: Overview Why Learning? Learning is a core of property of being intelligent. Hence Machine learning is a core subarea of Artificial Intelligence. There is a need for programs to behave
More informationWireless Remote Monitoring System for ASTHMA Attack Detection and Classification
Department of Telecommunication Engineering Hijjawi Faculty for Engineering Technology Yarmouk University Wireless Remote Monitoring System for ASTHMA Attack Detection and Classification Prepared by Orobh
More informationA Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
More informationEvaluation of Feature Selection Methods for Predictive Modeling Using Neural Networks in Credits Scoring
714 Evaluation of Feature election Methods for Predictive Modeling Using Neural Networks in Credits coring Raghavendra B. K. Dr. M.G.R. Educational and Research Institute, Chennai-95 Email: raghavendra_bk@rediffmail.com
More informationIntroduction to Support Vector Machines. Colin Campbell, Bristol University
Introduction to Support Vector Machines Colin Campbell, Bristol University 1 Outline of talk. Part 1. An Introduction to SVMs 1.1. SVMs for binary classification. 1.2. Soft margins and multi-class classification.
More informationData Mining Analytics for Business Intelligence and Decision Support
Data Mining Analytics for Business Intelligence and Decision Support Chid Apte, T.J. Watson Research Center, IBM Research Division Knowledge Discovery and Data Mining (KDD) techniques are used for analyzing
More information2. IMPLEMENTATION. International Journal of Computer Applications (0975 8887) Volume 70 No.18, May 2013
Prediction of Market Capital for Trading Firms through Data Mining Techniques Aditya Nawani Department of Computer Science, Bharati Vidyapeeth s College of Engineering, New Delhi, India Himanshu Gupta
More informationMANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College
More informationIdentification algorithms for hybrid systems
Identification algorithms for hybrid systems Giancarlo Ferrari-Trecate Modeling paradigms Chemistry White box Thermodynamics System Mechanics... Drawbacks: Parameter values of components must be known
More informationCSci 538 Articial Intelligence (Machine Learning and Data Analysis)
CSci 538 Articial Intelligence (Machine Learning and Data Analysis) Course Syllabus Fall 2015 Instructor Derek Harter, Ph.D., Associate Professor Department of Computer Science Texas A&M University - Commerce
More informationApplication of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance Action Recommendation
Application of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance Action Recommendation James K. Kimotho, Christoph Sondermann-Woelke, Tobias Meyer, and Walter Sextro Department
More informationPredictive Dynamix Inc
Predictive Modeling Technology Predictive modeling is concerned with analyzing patterns and trends in historical and operational data in order to transform data into actionable decisions. This is accomplished
More informationMaking Sense of the Mayhem: Machine Learning and March Madness
Making Sense of the Mayhem: Machine Learning and March Madness Alex Tran and Adam Ginzberg Stanford University atran3@stanford.edu ginzberg@stanford.edu I. Introduction III. Model The goal of our research
More informationA fast multi-class SVM learning method for huge databases
www.ijcsi.org 544 A fast multi-class SVM learning method for huge databases Djeffal Abdelhamid 1, Babahenini Mohamed Chaouki 2 and Taleb-Ahmed Abdelmalik 3 1,2 Computer science department, LESIA Laboratory,
More informationAnalysis of kiva.com Microlending Service! Hoda Eydgahi Julia Ma Andy Bardagjy December 9, 2010 MAS.622j
Analysis of kiva.com Microlending Service! Hoda Eydgahi Julia Ma Andy Bardagjy December 9, 2010 MAS.622j What is Kiva? An organization that allows people to lend small amounts of money via the Internet
More informationClassifying Large Data Sets Using SVMs with Hierarchical Clusters. Presented by :Limou Wang
Classifying Large Data Sets Using SVMs with Hierarchical Clusters Presented by :Limou Wang Overview SVM Overview Motivation Hierarchical micro-clustering algorithm Clustering-Based SVM (CB-SVM) Experimental
More informationEXTENDED CENTROID BASED CLUSTERING TECHNIQUE FOR ONLINE SHOPPING FRAUD DETECTION
EXTENDED CENTROID BASED CLUSTERING TECHNIQUE FOR ONLINE SHOPPING FRAUD DETECTION Priya J Rana 1, Jwalant Baria 2 1 ME IT, Department of IT, Parul institute of engineering & Technology, Gujarat, India 2
More information