Electronic Payment Fraud Detection Techniques
|
|
|
- Bernadette Tyler
- 10 years ago
- Views:
Transcription
1 World of Computer Science and Information Technology Journal (WCSIT) ISSN: Vol. 2, No. 4, , 2012 Electronic Payment Fraud Detection Techniques Adnan M. Al-Khatib CIS Dept. Faculty of Information Technology Jerash University, Jarash - Jordan Abstract In this paper, we discuss the fraudulent transactions that occur in electronic payment systems. We evaluate various techniques that can be used in detecting fraudulent transactions of card-not-present payment systems. The presented evaluation based on the literature, and from our own studies for these techniques. It provides a basis for exploring the common ground between techniques and for analyzing experimental studies and scenarios in practice. Keywords- Electronic Payment; Credit Card; Card-Not-Present; Fraud Detection; Data Mining; Machine learning; Neural Network; Expert System. I. INTRODUCTION Electronic Fraud is increasing with the expansion of modern technology and global communication. This increase in the fraudulent transactions, resulting in substantial losses to the businesses, and therefore, fraud detection has become an important issue to be considered. Fraud detection can be seen as a problem of classification of legitimate transactions from the fraudulent transactions. Existing fraud detection techniques have been implemented by a number of methods such as data mining, statistics, and artificial intelligence. In general, fraud detection is a prediction problem and its objective is to maximize correct prediction and maintain incorrect predictions at an acceptable level of cost. Recent studies have shown that data mining using Artificial Intelligence (AI) techniques achieved better performance than traditional statistical methods for building prediction models [2, 12]. AI techniques, particularly rule-based expert systems, case-based reasoning systems and machine learning (ML) techniques such as neural networks have been used to support such analysis and classification problems. The major difference between traditional statistical methods and machine learning methods is that: in statistical methods usually researchers impose structures to different models, and construct the model by estimating parameters to fit the data or observation, while machine learning techniques allow learning the particular structure of the model from the data [12]. As a result, the structures of the models used in statistical methods are relatively simple, easy to interpret and tend to under-fit the data while models obtained in machine learning methods are usually very complicated, hard to explain and tend to overfit the data. Under-fit and over-fit of the data is in fact the trade-off between the explanatory power and parsimony of a model, where explanatory power leads to high prediction accuracy and parsimony usually assures generalizability and interpretability of the model. In this paper, section 2 presents fraudulent transaction scenario of card-not-present. Section 3 briefly discusses the various techniques that can be used in detecting fraudulent transactions of credit cards. Section 4 evaluates the presented techniques based on the literature, and from our own studies. Finally, section 5 concludes the paper with some future remarks. II. CREDIT CARD FRAUD Credit card fraud is divided into two types: credit-card (offline) fraud and card-not-present (online) fraud. Offline fraud is committed by using a stolen physical card at storefront or call center. Online fraud is committed via web, phone shopping or cardholder-not-present. In online fraud only the card s details are needed, and a manual signature and card imprint are not required at the time of purchase. Fraud detection for credit card means the process of classifying the transactions into two classes: a class of legitimate and a class of fraudulent transactions. In general, the objective of fraud detection is to maximize correct predictions and maintain incorrect predictions at an acceptable level of cost. A. Problems with credit card fraud detection Fraud detection system should have some properties in order to perform good results, such as: - The system should be able to handle skewed distributions, since only a very small percentage of all credit card transactions are fraudulent [3, 7]. - The ability to handle noise (errors in the data). Noise limits the accuracy of generalization [10]. - Overlapping data: many transactions may be assumed fraudulent, while actually they are legitimate (false alarm). The opposite also may happen, when a fraudulent transaction appears to be normal (false negative). The system should
2 have the ability to eliminate or minimize these problems to give higher accuracy [1, 7, 10]. - The systems should be able to adapt themselves to new kinds of fraud. - There is a need for good metrics to evaluate the classifier system. For example, overall accuracy is not suited for evaluation on a skewed distribution, since even with a very high accuracy; almost all fraudulent transactions can be misclassified [7, 11]. - The system should take into account the cost of the fraudulent behavior detected and the cost associated with stopping it. For example, no profit is made by stopping a fraudulent transaction of only a few dollars [7, 11]. III. FRAUD DETECTION TECHNIQUES Researchers have developed two general categories of detection techniques; misuse and anomaly detections. In misuse detection, well-known fraudulent transactions are encoded into patterns, which are then used to match new transactions to identify the fraudulent ones. In anomaly detection, normal behavior of user and system activities are first summarized into normal profiles, which are then used as yardsticks, so that run-time activities that result in significant deviation from the user profiles are considered as probable fraudulent transactions. In this section we will briefly describe some current fraud detection techniques used in detecting credit cards fraud, and mention the advantages and disadvantages of these techniques: A. Neural Networks Neural Networks (NN) are an Artificial Intelligence (AI) techniques or methods that represent models of biological learning systems. They are networks of many simple processors or units that are connected and process numeric values [5]. It is structured as a directed graph with many nodes (processing elements) and arcs (interconnections) between them. The node computes a weighted sum of its inputs and generates an output. This output then becomes an input to other nodes in the network. The process continues until one or more outputs are generated. NN have been used as a powerful data mining technique in industry to do classification, clustering, generalization, and forecasting (predictions). For examples; it can be used to distinguish legal from fraudulent transactions, detect Internet fraud on an e- commerce site, predict which transaction may be a fraudulent transaction, etc. In addition, NN are one of the first and most successful applications in the area of detecting credit card fraud. B. Rule Induction Rule induction (RI) creates a decision tree (DT) or a set of decision rules from training examples with a known classification. DT is a predictive modeling technique used in classification, clustering, and prediction tasks. DT is defined as a tree where the root and each internal node are labeled with a question about an independent variable. The arcs from each node represent each possible answer to the associated question. Each leaf node represents a prediction (dependent variable) of a solution to the problem under consideration. The knowledge represented in DT can be extracted and represented in IF-THEN rules. One rule is created for each path from the root to a leaf node. DT classification is a two step process: induction process to construct a DT using training data, and the second step, is to apply the DT to new instances or records of the data to determine its class. C. Expert Systems Rules can be generated from information obtained from a human expert or group of experts and stored in a rulebased system as IF-THEN rules. If information is stored in a Knowledge base (KB) then it is called a Knowledge base system (KBS), or an Expert system (ES). The rules in the ES used to perform operations on a data to inference in order to reach appropriate conclusion. ES provide powerful and flexible solutions to many application problems. In the financial area, it can be used for several applications such as financial analysis and fraud detection. Suspicious activity or transaction can be detected from deviations from "normal' spending patterns through the use of ES [6]. D. Case-based reasoning (CBR) The basic idea of CBR is to adapt solutions that were used to solve previous problems and use them to solve new problems. In CBR, descriptions of past experience of human specialists, represented as cases, are stored in a database for later retrieval when the user encounters a new case with similar parameters. These cases can be used for classification purposes. Given a new problem, a CBR system tries to find a matching case. There are several algorithms used with this approach [9], but the nearest neighbor matching algorithm is often used. In this algorithm the training data is the model, and when a new case or instance is presented to the model, the algorithm looks at all the data to find a subset of cases that are most similar to it and uses them to predict the outcome. E. Genetic algorithms (GAs) GAs are search procedures based on the evolutionary computing methods. Given a population of potential problem solutions (individuals), evolutionary computing expands this population with new and potentially better solutions. In data mining, GAs may be used for clustering, prediction, and even association rules. These techniques can be used to find the fittest models from a set of models to represent the data. F. Inductive logic programming (ILP) ILP uses first order predicate logic to define a concept by using a set of positive and negative examples. This logic program is then used to classify new examples. In this approach of classification; complex relationship among components or attributes can be easily expressed, which improve the expressive power of the model. Domain knowledge can be easily represented in an ILP system, which improves the effectiveness of the system. The model expressed in predicate logic is also easy to understand. G. Regression Regression is a statistical techniques generally used to predict future values based on past values by fitting a set of points to a curve. Regression assumes that target data fit into some known type of function (e.g., linear, logistic, etc). In the banking systems, linear regression can be used to build a classification model of two classes, and then use
3 this model to approve or reject a new loan application, or classify a transaction as fraudulent or non-fraudulent transaction. H. Summary of the advantages and disadvantages of the techniques Table 1 summarizes the advantages and disadvantages of the above techniques. TABLE 1: ADVANTAGES AND DISADVANTAGES OF THE ABOVE DETECTION TECHNIQUES. Technique Advantages Disadvantages NN Effective in dealing with noisy data, in predicting patterns, in solving complex problems, and in processing new instances. Can generate code to be used in real-time systems, highly accurate, portable, fast, and outperform other techniques poor explanation capability, less efficient in processing large data sets, difficult to setup and operate, sensitive to data format, different data representations can produce different results, can never be exact, it is only accurate. In addition, it is only work with numeric data with values between 0 and 1; non numerical data need to be converted and normalized. RI ES CBR GA ILP Regression Scalable, high predictive accuracy, easy to use, easy to explain results, easy to interpret the rules, easy to implement applications. Easy to modify the KB, easy to develop and build the system, easy to manage complexity or missing information. Have high degree of accuracy, explanation facilities, and have good performance. Rules from other techniques such as NN and DT can be extracted, modified, and stored in the KB. Useful in domain that has a large number of examples, has the ability to work with incomplete or noisy data, effective, flexible, easy to update and maintain, can be used in a hybrid approach. Works well with noisy data, and easy to integrate with other systems. Usually combined into other techniques to increase the performance of those techniques. has powerful modeling language that can model complex relationships Easy to understand, easy to build, and used with two class classification. Logistic regression can give better accuracy than some learning techniques for small data sets. Not easy to handle continuous data, difficult to handle missing data, over-fitting problem may occur, data size and attributes to use for splitting and in which order to choose them and number of splits for each attribute impact the performance of building the tree. Poor in handling missing information or unexpected data values, and knowledge representation languages do not approach human flexibility. May suffer from the problem of incomplete or noisy data. Require extensive tool knowledge to set up and operate, and difficult to understand. Has low predictive accuracy, very sensitive to noise, and their performance deteriorates rapidly in the presence of spurious data. Poor with noise or outliers data, not applicable to complex applications, not work well with nonnumeric data, accuracy is good, but not high, not good for large data sets. IV. TECHNIQUES EVALUATION Several data mining tools for fraud detection are used widely in different organizations, but which are the most effective in terms of money, accuracy and time for a given application. A. Factors that affect the performance of data mining techniques There are several factors that affect the performance and accuracy of a data mining techniques. Understanding these factors is useful in evaluating and selecting an appropriate technique for an application. In this section a description of some of these factors is given: - Noise in data: data sets often contain noise in the form of inaccuracies and inconsistencies in the data. For example, inadequate data validation procedures may allow the user to enter incorrect data. - Missing data: attributes required for analysis may not be available. Missing data may cause problems in the training phase and in the classification process. Therefore, the ability of the technique to maintain this problem is an important factor. - Measuring performance: The performance of classification algorithm is usually examined by evaluating the accuracy of the classification. Accuracy of a data mining technique strongly influences its effectiveness. Higher predictive accuracy with actual data is a desirable feature. Classification accuracy is usually calculated by determining the percentage of records placed in the correct class. This ignores the fact that there also may be a cost associated with an incorrect assignment to the wrong class, which also should be determined. With two classes, there are four possible outcomes. Given a class C, and a record r to be classified, the four outcomes are: True positive (TP): r predicted to be in C and is actually in it. False positive (FP): r predicted to be in C and is not actually in it (False alarm). True negative (TN): r not predicted to be in C and is not actually in it. False negative (FN): r not predicted to be in C but is actually in it. TP and TN represent correct actions, but FP and FN represent incorrect actions. The performance of a classification could be determined by associating cost with each type of these outcomes. So maximizing TP and minimizing FP and FN are desirable characteristics of a data mining application. Some studies [1, 8] show that, overall predictive accuracy of fraud detection is inappropriate as the single measure of predictive performance. For example; If 1% of the transactions are fraudulent (usual probability of fraud), then a model that always predicts "legitimate" will be 99% accurate, and at the same time may not catch the fraudulent transactions. So of the 1% fraudulent transactions, there is a need to compute models that predict 100% of these, yet produce no false alarms (i.e. predict no legitimate transactions to be fraudulent). In addition, a model that predicts less than 100% of the fraudulent transactions may not be accurate.
4 For example, if a model predicts 90% of the fraudulent transactions, then it may correctly predict the lowest cost transactions, and being entirely wrong about the top 10% most expensive frauds. Therefore, there is a need for a cost model in order to best judge the success of the fraud detection technique. - Scalability: usually data mining applications use too large data sets. These data sets loaded into RAM and may slow the processing and the running of the algorithm. In addition the network bandwidth capability of a system may affect the processing. So scalability of the data mining technique becomes an important issue. - Different data types: Business databases or data sets contain data of various types (numeric, ordinal, and nominal etc). If a data mining technique can handle different data types, it will be more useful for business data mining. - Explanation capability: the prediction result is more likely to be accepted by business manger, if it is explainable in business terms. Understanding the model building and involvement of the user in data loading and manipulation of the algorithm parameters will increase the accuracy and performance of the system. Therefore, the ability to explain the results is an important factor. - Ease of integration: data mining application usually work with other information systems (IS) such as DSS or DBMS. Therefore, ease of integration with other information systems is a desirable characteristic of data mining application. - Ease of operation: A technique that is easy to understand, easy to build and that requires fewer preprocessing activities is more useful to an end user. - Skewed distribution: usually fraud detection data is highly skewed or imbalanced. Examples given in [10, 1, 8] show that skewed distribution of the data could be a major factor on the classifier performance. So ability of the data mining model to handle this problem is a desirable characteristic. B. Related work Several studies to evaluate the different data mining techniques for credit card fraud detection were held. Each study evaluated the different techniques according to some of the above factors. Several machine learning algorithms (ID3, CART, BAYES, and RIPPER) and meta-learning strategies on real world credit card data (one million transactions) were tested in [10] to select the best classifier. This study shows that skewed class distribution could be a major factor on classifier performance and that True and False positive rates are the critical evaluation metrics for the accuracy of the models built. The study reported that 50%/50% distribution of fraud/non-fraud training data will generate classifiers with the highest True positive rate and low False positive rate. The best classifier in the study was a metaclassifier BAYES. The next two are CART and RIPPER. All the three trained on a 50%/50% fraud/non-fraud distribution, and each attained a True positive rate of approximately 80% and False positive rate less than 17% for base classifiers and 13% for the meta-classifier. ID3 was the last with True positive rate 76% and False positive rate 23%. A comparative study between Bayesian Belief Network (BBN) using STAGE algorithm and Artificial Neural Network (ANN) using BP algorithm for credit card fraud detection was held in [7]. The results show that: BBNs were more accurate (in some cases 8% more of catching fraudulent transactions) and much faster to train than ANN, but ANN is much faster than BBNs when applied to new instances. In [1]; authors employ five different inductive learning programs: Bayes (with Bayesian learning algorithm), C4.5, ID3, CART, Ripper (rule induction algorithm), and a metalearning methods to compute accurate classification models for detecting electronic credit-card fraud. They used three metrics: the overall accuracy, the TP FP spread and a cost model. There results show that metaclassifiers outperform all base classifiers, and in some cases by a significant margin. Also, results show that the most accurate classifiers are not necessarily the most cost effective. For example; Bayesian base classifiers are less accurate than Ripper and C4.5 base classifiers, but they are the best under the cost model. Also the results show that partitioning the large data set into smaller subsets improves the cost saving. In addition, the performance of classification was sensitive to the changes in the data sets. An expert system model for credit-card fraud detection was presented in [6]. The model's rule base was constructed through the input of many fraud experts within a bank. The model's performance was measured based on classification accuracy and based on the cost of misclassification. It was assumed that the cost of one fraud would be approximately equal to the cost of disturbing twenty good customers. The expert model was able to classify 89.68% accuracy overall and 80.45% correct within the fraud class. This expert model was compared with other three different models of fraud detection with the same data sets and it outperforms all of them. A comparative study to select a suitable data mining tool or product for fraud detection was carried in [4]. In this paper 40 data mining tools were chosen to be evaluated. Three stages of evaluation were done, and only the top five tools were continued to be evaluated in the third stage. In the third stage, an extensive evaluation includes the areas of client-server compliance, automation capabilities, breadth of algorithms implemented, ease of use, and overall accuracy was held. Results show that decision trees and neural networks allowed the best crosscomparison, and proved to be better than the other models. Decision Trees were better than Neural Networks at reducing false alarms and specifying misclassification costs. In addition, the pruning options for the trees were better developed than the stopping rules for the networks, so the hazard of over-fit was less. A comparative research between three machine learning methods (ANNs, CBR, and RI) and one statistical method - least squares regression (LSR), to build prediction systems was held in [2]. The study compares the prediction systems in terms of accuracy, explanatory value and configurability. The results show that all approaches are sensitive to changes in the training data set and may not cope well with heterogeneity. ANN was the best in accuracy, but the worst in explanatory value and configurability. CBR and LSR were the best in explanatory value and configurability, and good in accuracy. RI is good 741
5 in explanatory value, but the last in accuracy and configurability. Several studies [10, 1, 8, 3] show that hybrid Techniques of classification can outperform a single classification technique with a significant margin. With hybrid architecture two or more classification techniques can be integrated or combined to get cooperative effect where the strength of one technique can compensate for the weakness of another. One study uses NN, GA, and RI to mine classification rules from a database. This approach combines the robustness and search ability of GA with high predictive accuracy of NN and interpretability of rules to create a data mining system that outperforms systems based on a single technique. Other studies [10, 1] show that combining classifiers computed by different machine learning algorithms produces a meta-classification that has the best overall performance. In [3], a study of combing BP, naïve Bayesian (NB), and C4.5 algorithms was held to build a meta-classifier to improve cost saving in credit card fraud detection. Results show that this approach performs better than the base classifiers used in the combination, and outperform the common technique (BP) used in industry. Also, results show that partitioning the data set and using multiple algorithms approach achieves higher cost savings. Combination of rule-based and case-based systems can: Offer a first check against known cases before undertaking rule-based reasoning and the associated search cost; and it can record search-based results as cases for future use, which can avoid duplicating costly search. In addition, it might be advantageous to use multiple algorithms for classification of the same problem. This will increase confidence in the results when predictions from two models are identical, and appropriately raising a flag when the two models disagree. An evaluation comparison between the above techniques is given in table 2 bellow. H(igh), M(edium), and L(ow) indicate the expected ranking for each of them. V. CONCLUSION In this paper, credit card fraud detection is briefly discussed. It presents the fraudulent transactions scenario of card-not-present, the various detection techniques of credit cards, and an evaluation of these techniques. Fraud detection systems for these types of fraud can be seen as a problem of classification of legitimate transactions from the fraudulent transactions. Several data mining techniques used in different organizations for credit card fraud detection are briefly presented in this paper. Our study shows that the efficiency and performance of these techniques depend on there capability in dealing with several problems such as: noisy and missing in the data used, the performance measure used, scalability, different data types used, explanation capability of the technique, ease of integration with other systems, ease of operation, and skewed distribution of the data used. Our study shows that the typical fraud detection techniques attempt to maximize accuracy rate and minimize false alarm rate at an acceptable level of cost. Also, it shows that hybrid or meta-learning classifier techniques can outperform a single classification technique with a significant margin. In this case the strength of one technique can compensate for the weakness of another. Also, the study shows that partitioning the data set and using multiple algorithms approach achieves higher cost savings. In addition, it might be advantageous to use multiple algorithms for classification of the same problem. This will increase confidence in the results when predictions from two models are identical, and raising a flag when the two models disagree. TABLE 2: A COMPARISON BETWEEN THE ABOVE DETECTION TECHNIQUES. Characteristics RI NN CBR GA ILP ES Regression Ability to handle noisy data M L M L M M H Ability to handle missing data M M L M H M H Process large data sets (Scalability) L M M M M M H Process different data types M M L M H 1 M Predictive accuracy M L M M H M M Explanation capability L H L M L L L Ease of integration M M L L L L M Ease to build and operate M H L H H L L REFERENCES [1] Andreas L. Prodromidis and Salvatore J. Stolfo; "Agent-Based Distributed Learning Applied to Fraud Detection"; Department of Computer Science- Columbia University; [2] Carolyn Mair, Gada Kadoda, Martin Lefley, and others; "An investigation of machine learning based prediction systems"; The journal of System Software 53; 2000; pp [3] Clifton Phua, Damminda Alahakoon, and Vincent Lee; "Minority Report in Fraud Detection: Classification of Skewed Data"; Sigkdd Explorations, Vol. 6, Issue 1, p.p [4] Dean W. Abbott, I. philip Matkovsky, John F. Elder; "An Evaluation of High-end Data Mining Tools for Fraud Detection; Elder Research San Diego. CA 9212; oct [5] Jesus Mena; "Investigative Data mining for Security and Criminal Detection"; B. H. pub. Company; 2003 [6] Kevin J. Leonard; "The development of a rule based expert system model for fraud alert consumer credit"; European journal of operational research, vol. 80, p.p ; [7] Maes S. Tuyls K. Vanschoenwinkel B. and Manderick B.; "Credit Card Fraud Detection Using Bayesian and Neural Networks"; Vrije University Brussel Belgium; [8] R. Brause, T. Langsdor-f, M. Hepp; "Neural Data Mining for Credit Card Fraud Detection"; Goethe-University-Frankfurt; [9] R. Wheeler, S. Aitken; "Multiple algorithms for fraud detection"; Knowledge-Based Systems 13; 2000; pp [10] Salvatore J. Stolfo, David W. Fan, Wenke Lee and Andreas L. Prodromidis; "Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results"; Department of Computer Science- Columbia University; [11] Salvatore J. Stolfo, Wei Fan, Wenke Lee and Andreas L. Prodromidis; "Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project"; Department of Computer Science- Columbia University; /99, 1999 IEEE. [12] Zan Huang, Hsinchun Chen, Chia-Jung Hsu, Wun-Hwa Chen, Soushan Wu; "Credit rating analysis with support vector machines and neural networks: a market comparative study"; Decision Support Systems 37 (2004); pp
A Study of Detecting Credit Card Delinquencies with Data Mining using Decision Tree Model
A Study of Detecting Credit Card Delinquencies with Data Mining using Decision Tree Model ABSTRACT Mrs. Arpana Bharani* Mrs. Mohini Rao** Consumer credit is one of the necessary processes but lending bears
Credit Card Fraud Detection Using Meta-Learning: Issues 1 and Initial Results
From: AAAI Technical Report WS-97-07. Compilation copyright 1997, AAAI (www.aaai.org). All rights reserved. Credit Card Fraud Detection Using Meta-Learning: Issues 1 and Initial Results Salvatore 2 J.
Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results 1
Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results 1 Salvatore J. Stolfo, David W. Fan, Wenke Lee and Andreas L. Prodromidis Department of Computer Science Columbia University
To improve the problems mentioned above, Chen et al. [2-5] proposed and employed a novel type of approach, i.e., PA, to prevent fraud.
Proceedings of the 5th WSEAS Int. Conference on Information Security and Privacy, Venice, Italy, November 20-22, 2006 46 Back Propagation Networks for Credit Card Fraud Prediction Using Stratified Personalized
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin
Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)
Credit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Meta Learning Algorithms for Credit Card Fraud Detection
International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume 6, Issue 6 (March 213), PP. 16-2 Meta Learning Algorithms for Credit Card Fraud Detection
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Data Mining - Evaluation of Classifiers
Data Mining - Evaluation of Classifiers Lecturer: JERZY STEFANOWSKI Institute of Computing Sciences Poznan University of Technology Poznan, Poland Lecture 4 SE Master Course 2008/2009 revised for 2010
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Tina R. Patil, Mrs. S. S. Sherekar Sant Gadgebaba Amravati University, Amravati [email protected], [email protected]
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
Data Mining Part 5. Prediction
Data Mining Part 5. Prediction 5.1 Spring 2010 Instructor: Dr. Masoud Yaghini Outline Classification vs. Numeric Prediction Prediction Process Data Preparation Comparing Prediction Methods References Classification
Experiments in Web Page Classification for Semantic Web
Experiments in Web Page Classification for Semantic Web Asad Satti, Nick Cercone, Vlado Kešelj Faculty of Computer Science, Dalhousie University E-mail: {rashid,nick,vlado}@cs.dal.ca Abstract We address
Financial Statement Fraud Detection: An Analysis of Statistical and Machine Learning Algorithms
Financial Statement Fraud Detection: An Analysis of Statistical and Machine Learning Algorithms Johan Perols Assistant Professor University of San Diego, San Diego, CA 92110 [email protected] April
A COMPARATIVE ASSESSMENT OF SUPERVISED DATA MINING TECHNIQUES FOR FRAUD PREVENTION
A COMPARATIVE ASSESSMENT OF SUPERVISED DATA MINING TECHNIQUES FOR FRAUD PREVENTION Sherly K.K Department of Information Technology, Toc H Institute of Science & Technology, Ernakulam, Kerala, India. [email protected]
Machine Learning. Chapter 18, 21. Some material adopted from notes by Chuck Dyer
Machine Learning Chapter 18, 21 Some material adopted from notes by Chuck Dyer What is learning? Learning denotes changes in a system that... enable a system to do the same task more efficiently the next
Welcome. Data Mining: Updates in Technologies. Xindong Wu. Colorado School of Mines Golden, Colorado 80401, USA
Welcome Xindong Wu Data Mining: Updates in Technologies Dept of Math and Computer Science Colorado School of Mines Golden, Colorado 80401, USA Email: xwu@ mines.edu Home Page: http://kais.mines.edu/~xwu/
AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM
AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM ABSTRACT Luis Alexandre Rodrigues and Nizam Omar Department of Electrical Engineering, Mackenzie Presbiterian University, Brazil, São Paulo [email protected],[email protected]
A Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2
2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 1 School of
Detecting Credit Card Fraud by Decision Trees and Support Vector Machines
Detecting Credit Card Fraud by Decision Trees and Support Vector Machines Y. Sahin and E. Duman Abstract With the developments in the Information Technology and improvements in the communication channels,
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
Random forest algorithm in big data environment
Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest
E-commerce Transaction Anomaly Classification
E-commerce Transaction Anomaly Classification Minyong Lee [email protected] Seunghee Ham [email protected] Qiyi Jiang [email protected] I. INTRODUCTION Due to the increasing popularity of e-commerce
Customer Classification And Prediction Based On Data Mining Technique
Customer Classification And Prediction Based On Data Mining Technique Ms. Neethu Baby 1, Mrs. Priyanka L.T 2 1 M.E CSE, Sri Shakthi Institute of Engineering and Technology, Coimbatore 2 Assistant Professor
Credit Card Fraud Detection Using Hidden Markov Model
International Journal of Soft Computing and Engineering (IJSCE) Credit Card Fraud Detection Using Hidden Markov Model SHAILESH S. DHOK Abstract The most accepted payment mode is credit card for both online
Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing E-mail Classifier
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-6, January 2013 Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing
Data Mining Classification: Decision Trees
Data Mining Classification: Decision Trees Classification Decision Trees: what they are and how they work Hunt s (TDIDT) algorithm How to select the best split How to handle Inconsistent data Continuous
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES Vijayalakshmi Mahanra Rao 1, Yashwant Prasad Singh 2 Multimedia University, Cyberjaya, MALAYSIA 1 [email protected]
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
Healthcare Data Mining: Prediction Inpatient Length of Stay
3rd International IEEE Conference Intelligent Systems, September 2006 Healthcare Data Mining: Prediction Inpatient Length of Peng Liu, Lei Lei, Junjie Yin, Wei Zhang, Wu Naijun, Elia El-Darzi 1 Abstract
Data Mining. Nonlinear Classification
Data Mining Unit # 6 Sajjad Haider Fall 2014 1 Nonlinear Classification Classes may not be separable by a linear boundary Suppose we randomly generate a data set as follows: X has range between 0 to 15
DATA MINING APPLICATION IN CREDIT CARD FRAUD DETECTION SYSTEM
Journal of Engineering Science and Technology Vol. 6, No. 3 (2011) 311-322 School of Engineering, Taylor s University DATA MINING APPLICATION IN CREDIT CARD FRAUD DETECTION SYSTEM FRANCISCA NONYELUM OGWUELEKA
Enhancing Quality of Data using Data Mining Method
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 9, SEPTEMBER 2, ISSN 25-967 WWW.JOURNALOFCOMPUTING.ORG 9 Enhancing Quality of Data using Data Mining Method Fatemeh Ghorbanpour A., Mir M. Pedram, Kambiz Badie, Mohammad
Learning Example. Machine learning and our focus. Another Example. An example: data (loan application) The data and the goal
Learning Example Chapter 18: Learning from Examples 22c:145 An emergency room in a hospital measures 17 variables (e.g., blood pressure, age, etc) of newly admitted patients. A decision is needed: whether
Application of Hidden Markov Model in Credit Card Fraud Detection
Application of Hidden Markov Model in Credit Card Fraud Detection V. Bhusari 1, S. Patil 1 1 Department of Computer Technology, College of Engineering, Bharati Vidyapeeth, Pune, India, 400011 Email: [email protected]
Data Mining Practical Machine Learning Tools and Techniques
Ensemble learning Data Mining Practical Machine Learning Tools and Techniques Slides for Chapter 8 of Data Mining by I. H. Witten, E. Frank and M. A. Hall Combining multiple models Bagging The basic idea
Chapter 12 Discovering New Knowledge Data Mining
Chapter 12 Discovering New Knowledge Data Mining Becerra-Fernandez, et al. -- Knowledge Management 1/e -- 2004 Prentice Hall Additional material 2007 Dekai Wu Chapter Objectives Introduce the student to
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
Classification and Prediction techniques using Machine Learning for Anomaly Detection.
Classification and Prediction techniques using Machine Learning for Anomaly Detection. Pradeep Pundir, Dr.Virendra Gomanse,Narahari Krishnamacharya. *( Department of Computer Engineering, Jagdishprasad
Classification algorithm in Data mining: An Overview
Classification algorithm in Data mining: An Overview S.Neelamegam #1, Dr.E.Ramaraj *2 #1 M.phil Scholar, Department of Computer Science and Engineering, Alagappa University, Karaikudi. *2 Professor, Department
CREDIT CARD FRAUD DETECTION BASED ON ONTOLOGY GRAPH
CREDIT CARD FRAUD DETECTION BASED ON ONTOLOGY GRAPH Ali Ahmadian Ramaki 1, Reza Asgari 2 and Reza Ebrahimi Atani 3 1 Department of Computer Engineering, Guilan University, Rasht, Iran [email protected]
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model Twinkle Patel, Ms. Ompriya Kale Abstract: - As the usage of credit card has increased the credit card fraud has also increased
DATA PREPARATION FOR DATA MINING
Applied Artificial Intelligence, 17:375 381, 2003 Copyright # 2003 Taylor & Francis 0883-9514/03 $12.00 +.00 DOI: 10.1080/08839510390219264 u DATA PREPARATION FOR DATA MINING SHICHAO ZHANG and CHENGQI
Consolidated Tree Classifier Learning in a Car Insurance Fraud Detection Domain with Class Imbalance
Consolidated Tree Classifier Learning in a Car Insurance Fraud Detection Domain with Class Imbalance Jesús M. Pérez, Javier Muguerza, Olatz Arbelaitz, Ibai Gurrutxaga, and José I. Martín Dept. of Computer
Data Mining Algorithms Part 1. Dejan Sarka
Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka ([email protected]) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses
Learning is a very general term denoting the way in which agents:
What is learning? Learning is a very general term denoting the way in which agents: Acquire and organize knowledge (by building, modifying and organizing internal representations of some external reality);
ON INTEGRATING UNSUPERVISED AND SUPERVISED CLASSIFICATION FOR CREDIT RISK EVALUATION
ISSN 9 X INFORMATION TECHNOLOGY AND CONTROL, 00, Vol., No.A ON INTEGRATING UNSUPERVISED AND SUPERVISED CLASSIFICATION FOR CREDIT RISK EVALUATION Danuta Zakrzewska Institute of Computer Science, Technical
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
Data Mining in Financial Application
Journal of Modern Accounting and Auditing, ISSN 1548-6583 December 2011, Vol. 7, No. 12, 1362-1367 Data Mining in Financial Application G. Cenk Akkaya Dokuz Eylül University, Turkey Ceren Uzar Mugla University,
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
The Credit Card Fraud Detection Analysis With Neural Network Methods
The Credit Card Fraud Detection Analysis With Neural Network Methods 1 M.Jeevana Sujitha, 2 K. Rajini Kumari, 3 N.Anuragamayi 1,2,3 Dept. of CSE, A.S.R College of Engineering & Tech., Tetali, Tanuku, AP,
DATA MINING, DIRTY DATA, AND COSTS (Research-in-Progress)
DATA MINING, DIRTY DATA, AND COSTS (Research-in-Progress) Leo Pipino University of Massachusetts Lowell [email protected] David Kopcso Babson College [email protected] Abstract: A series of simulations
An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
Towards applying Data Mining Techniques for Talent Mangement
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Towards applying Data Mining Techniques for Talent Mangement Hamidah Jantan 1,
Data Mining Analytics for Business Intelligence and Decision Support
Data Mining Analytics for Business Intelligence and Decision Support Chid Apte, T.J. Watson Research Center, IBM Research Division Knowledge Discovery and Data Mining (KDD) techniques are used for analyzing
Rule based Classification of BSE Stock Data with Data Mining
International Journal of Information Sciences and Application. ISSN 0974-2255 Volume 4, Number 1 (2012), pp. 1-9 International Research Publication House http://www.irphouse.com Rule based Classification
Data Mining for Knowledge Management. Classification
1 Data Mining for Knowledge Management Classification Themis Palpanas University of Trento http://disi.unitn.eu/~themis Data Mining for Knowledge Management 1 Thanks for slides to: Jiawei Han Eamonn Keogh
Fraud Detection for Online Retail using Random Forests
Fraud Detection for Online Retail using Random Forests Eric Altendorf, Peter Brende, Josh Daniel, Laurent Lessard Abstract As online commerce becomes more common, fraud is an increasingly important concern.
Overview. Evaluation Connectionist and Statistical Language Processing. Test and Validation Set. Training and Test Set
Overview Evaluation Connectionist and Statistical Language Processing Frank Keller [email protected] Computerlinguistik Universität des Saarlandes training set, validation set, test set holdout, stratification
Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm
Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm Martin Hlosta, Rostislav Stríž, Jan Kupčík, Jaroslav Zendulka, and Tomáš Hruška A. Imbalanced Data Classification
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Feature Subset Selection in E-mail Spam Detection
Feature Subset Selection in E-mail Spam Detection Amir Rajabi Behjat, Universiti Technology MARA, Malaysia IT Security for the Next Generation Asia Pacific & MEA Cup, Hong Kong 14-16 March, 2012 Feature
IDENTIFYING BANK FRAUDS USING CRISP-DM AND DECISION TREES
IDENTIFYING BANK FRAUDS USING CRISP-DM AND DECISION TREES Bruno Carneiro da Rocha 1,2 and Rafael Timóteo de Sousa Júnior 2 1 Bank of Brazil, Brasília-DF, Brazil [email protected] 2 Network Engineering
FRAUD DETECTION IN MOBILE TELECOMMUNICATION
FRAUD DETECTION IN MOBILE TELECOMMUNICATION Fayemiwo Michael Adebisi 1* and Olasoji Babatunde O 1. 1 Department of Mathematical Sciences, College of Natural and Applied Science, Oduduwa University, Ipetumodu,
A Comparative Analysis of Classification Techniques on Categorical Data in Data Mining
A Comparative Analysis of Classification Techniques on Categorical Data in Data Mining Sakshi Department Of Computer Science And Engineering United College of Engineering & Research Naini Allahabad [email protected]
Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2
Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2 1Department of Computer Engineering & Application, NITTTR, Shyamla Hills, Bhopal M.P.,
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
Minority Report in Fraud Detection: Classification of Skewed Data
ABSTRACT Minority Report in Fraud Detection: Classification of Skewed Data This paper proposes an innovative fraud detection method, built upon existing fraud detection research and Minority Report, to
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
Introduction to Data Mining
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
A Study Of Bagging And Boosting Approaches To Develop Meta-Classifier
A Study Of Bagging And Boosting Approaches To Develop Meta-Classifier G.T. Prasanna Kumari Associate Professor, Dept of Computer Science and Engineering, Gokula Krishna College of Engg, Sullurpet-524121,
REVIEW OF ENSEMBLE CLASSIFICATION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
Statistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit
Statistics in Retail Finance Chapter 7: Fraud Detection in Retail Credit 1 Overview > Detection of fraud remains an important issue in retail credit. Methods similar to scorecard development may be employed,
Knowledge Discovery from patents using KMX Text Analytics
Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs [email protected] Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers
A Hybrid Data Mining Model to Improve Customer Response Modeling in Direct Marketing
A Hybrid Data Mining Model to Improve Customer Response Modeling in Direct Marketing Maryam Daneshmandi [email protected] School of Information Technology Shiraz Electronics University Shiraz, Iran
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
Decision Tree Learning on Very Large Data Sets
Decision Tree Learning on Very Large Data Sets Lawrence O. Hall Nitesh Chawla and Kevin W. Bowyer Department of Computer Science and Engineering ENB 8 University of South Florida 4202 E. Fowler Ave. Tampa
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
Evaluation & Validation: Credibility: Evaluating what has been learned
Evaluation & Validation: Credibility: Evaluating what has been learned How predictive is a learned model? How can we evaluate a model Test the model Statistical tests Considerations in evaluating a Model
BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL
The Fifth International Conference on e-learning (elearning-2014), 22-23 September 2014, Belgrade, Serbia BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL SNJEŽANA MILINKOVIĆ University
A Regression Approach for Forecasting Vendor Revenue in Telecommunication Industries
A Regression Approach for Forecasting Vendor Revenue in Telecommunication Industries Aida Mustapha *1, Farhana M. Fadzil #2 * Faculty of Computer Science and Information Technology, Universiti Tun Hussein
Mining the Software Change Repository of a Legacy Telephony System
Mining the Software Change Repository of a Legacy Telephony System Jelber Sayyad Shirabad, Timothy C. Lethbridge, Stan Matwin School of Information Technology and Engineering University of Ottawa, Ottawa,
Data Mining: A Preprocessing Engine
Journal of Computer Science 2 (9): 735-739, 2006 ISSN 1549-3636 2005 Science Publications Data Mining: A Preprocessing Engine Luai Al Shalabi, Zyad Shaaban and Basel Kasasbeh Applied Science University,
Data Mining Techniques
15.564 Information Technology I Business Intelligence Outline Operational vs. Decision Support Systems What is Data Mining? Overview of Data Mining Techniques Overview of Data Mining Process Data Warehouses
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
Journal of Engineering Science and Technology Review 7 (4) (2014) 89-96
Jestr Journal of Engineering Science and Technology Review 7 (4) (2014) 89-96 JOURNAL OF Engineering Science and Technology Review www.jestr.org Applying Fuzzy Logic and Data Mining Techniques in Wireless
Predicting earning potential on Adult Dataset
MSc in Computing, Business Intelligence and Data Mining stream. Business Intelligence and Data Mining Applications Project Report. Predicting earning potential on Adult Dataset Submitted by: xxxxxxx Supervisor:
