...2000_ ________ __ _______ _7_ _2_ *Peter J. Bentley, *Jungwon Kim, **Gil-Ho Jung and ***Jong-Uk Choi *Department of Computer Science, University College London **Department of Computer Science, SungKyunKwan University *** Department of 888 , Sangmyung University e-mail: J.Kim@cs.ucl.ac.uk Fuzzy Darwinian Detection of Credit Card Fraud Peter J. Bentley, *Jungwon Kim, **Gil-Ho Jung and ***Jong-Uk Choi *Department of Computer Science, University College London **Department of Computer Science, SungKyunKwan University *** Department of 888 , Sangmyung University e-mail: J.Kim@cs.ucl.ac.uk 요 약 Credit evaluation is one of the most important and difficult tasks for credit card companies, mortgage companies, banks and other financial institutes. Incorrect credit judgement causes huge financial losses. This work describes the use of an evolutionary-fuzzy system capable of classifying suspicious and non-suspicious credit card transactions. The paper starts with the details of the system used in this work. A series of experiments are described, showing that the complete system is capable of attaining good accuracy and intelligibility levels for real data. 1. INTRODUCTION Fraud is a big problem today. Looking at credit card transactions alone, with millions of purchases every month, it is simply not humanly possible to check every one. And when many purchases are made with stolen credit cards, this inevitably results in losses of significant sums. The only viable solution to problems...
Words: 3343 - Pages: 14
...T.C BAHÇEŞEHİR ÜNİVERSİTESİ DEVELOPING AN EXPERT-SYSTEM FOR DIABETICS BY SUPPORTING WITH ANFIS Master Thesis ALİ KARA İSTANBUL, 2008 T.C BAHÇEŞEHİR ÜNİVERSİTESİ INSTITUTE OF SCIENCE COMPUTER ENGINEERING DEVELOPING AN EXPERT-SYSTEM FOR DIABETICS BY SUPPORTING WITH ANFIS Master Thesis Ali KARA Supervisor: ASSOC.PROF.DR. ADEM KARAHOCA İSTANBUL, 2008 T.C BAHÇEŞEHİR ÜNİVERSİTESİ INSTITUTE OF SCIENCE COMPUTER ENGINEERING Name of the thesis: Developing an Expert-System for Diabetics by supporting with ANFIS Name/Last Name of the Student: Ali Kara Date of Thesis Defense: Jun .09. 2008 The thesis has been approved by the Institute of Science. Prof. Dr. A. Bülent ÖZGÜLER Director ___________________ I certify that this thesis meets all the requirements as a thesis for the degree of Master of Science. Assoc. Prof. Dr. Adem KARAHOCA Program Coordinator ____________________ This is to certify that we have read this thesis and that we find it fully adequate in scope, quality and content, as a thesis for the degree of Master of Science. Examining Committee Members Assoc.Prof.Dr. Adem KARAHOCA Prof.Dr. Nizamettin AYDIN Asst.Prof.Dr. Yalçın ÇEKİÇ Signature ____________________ ____________________ ____________________ ii To my father ACKNOWLEDGEMENTS This thesis is dedicated to my father for being a role model in front of my educational life. I would like to express my gratitude to Assoc. Prof. Dr. Adem Karahoca, for not only being such...
Words: 6346 - Pages: 26
...Edge detection using Fuzzy Logic and Automata Theory Title Page By Takkar Mohit Supervisor A Thesis Submitted to In Partial Fulfillment of the Requirements for the Degree of Master of Engineering in Electronics & Communication December 2014 . Table of Contents Title Page i CERTIFICATE ii COMPLIANCE CERTIFICATE iii THESIS APPROVAL CERTIFICATE iv DECLARATION OF ORIGINALITY v Acknowledgment vi Table of Contents vii List of Figures x Abstract xiii Chapter 1 Introduction 1 1.1 Edge Detection: Analysis 3 1.1.1 Fuzzy Logic in Image Processing 4 1.1.2 Fuzzy Logic for Edge Detection 5 1.1.3 Cellular Learning Automata 6 Chapter 2 Literature Review 7 2.1 Edge Detection: Methodology 7 2.1.1 First Order Derivative Edge Detection 7 2.1.1.1 Prewitts Operator 7 2.1.1.2 [pic] Sobel Operator 8 2.1.1.3 Roberts Cross Operator 11 2.1.1.4 Threshold Selection 11 2.1.2 Second Order Derivative Edge Detection 11 2.1.2.1 Marr-Hildreth Edge Detector 11 2.1.2.2 Canny Edge Detector 12 2.1.3 Soft Computing Approaches to Edge Detection 13 2.1.3.1 Fuzzy Based Approach 14 2.1.3.2 Genetic Algorithm Approach 14 2.1.4 Cellular Learning Automata 15 Chapter 3 Fuzzy Image Processing 18 3.1 Need for Fuzzy Image Processing 19 3.2 Introduction to Fuzzy sets and Crisp sets 20 3.2.1 Classical sets (Crisp sets) 20 3.2.2 Fuzzy sets 21 3.3 Fuzzification 22 3.4 Membership Value Assignment 22 3.5...
Words: 9151 - Pages: 37
...Porter's Five Forces Supplier Power: Here you assess how easy it is for suppliers to drive up prices. This is driven by the number of suppliers of each key input, the uniqueness of their product or service, their strength and control over you, the cost of switching from one to another, and so on. The fewer the supplier choices you have, and the more you need suppliers' help, the more powerful your suppliers are. Buyer Power: Here you ask yourself how easy it is for buyers to drive prices down. Again, this is driven by the number of buyers, the importance of each individual buyer to your business, the cost to them of switching from your products and services to those of someone else, and so on. If you deal with few, powerful buyers, then they are often able to dictate terms to you. Competitive Rivalry: What is important here is the number and capability of your competitors. If you have many competitors, and they offer equally attractive products and services, then you'll most likely have little power in the situation, because suppliers and buyers will go elsewhere if they don't get a good deal from you. On the other hand, if no-one else can do what you do, then you can often have tremendous strength. Threat of Substitution: This is affected by the ability of your customers to find a different way of doing what you do - for example, if you supply a unique software product that automates an important process, people may substitute by doing the process manually or by outsourcing...
Words: 4647 - Pages: 19
...Data Mining for Fraud Detection: Toward an Improvement on Internal Control Systems? Mieke Jans, Nadine Lybaert, Koen Vanhoof Abstract Fraud is a million dollar business and it’s increasing every year. The numbers are shocking, all the more because over one third of all frauds are detected by ’chance’ means. The second best detection method is internal control. As a result, it would be advisable to search for improvement of internal control systems. Taking into consideration the promising success stories of companies selling data mining software, along with the positive results of research in this area, we evaluate the use of data mining techniques for the purpose of fraud detection. Are we talking about real success stories, or salesmanship? For answering this, first a theoretical background is given about fraud, internal control, data mining and supervised versus unsupervised learning. Starting from this background, it is interesting to investigate the use of data mining techniques for detection of asset misappropriation, starting from unsupervised data. In this study, procurement fraud stands as an example of asset misappropriation. Data are provided by an international service-sector company. After mapping out the purchasing process, ’hot spots’ are identified, resulting in a series of known frauds and unknown frauds as object of the study. 1 Introduction Fraud is a million dollar business and it is increasing every year. ”45% of companies worldwide have fallen victim...
Words: 6259 - Pages: 26
...A fuzzy logic approach to urban land-use mapping Henning Sten Hansen National Environmental Research Institute, Ministry of Environment & Energy Frederiksborgvej 399, DK-4000, Roskilde, Denmark Phone : +45 46 30 18 07 Fax : +45 46 30 12 12 HSH@DMU.DK Abstract. The growth of cities represents huge problems for modern societies. Monitoring, analysing and modelling the urban dynamic call for detailed mapping of urban land-use. Traditionally, urban land-use mapping is based on orthophotos and satellite images, but deriving land-use from remote-sensing alone is not satisfactory. The Danish Building & Dwelling Register is a database containing detailed information like year of construction, use, area etc. Therefore, this database provides a useful foundation for urban land-use mapping. To be able to track urban land-use changes over time, we have chosen square cells (100m x 100m) as basic mapping units. Generally, land cover and land-use mapping are based on crisp classification, but in the current project we have applied a fuzzy modeling approach to land-use mapping. Fuzzy classification offers a better choice in urban land-use mapping, because it can indicate the primary, secondary etc. land-use simultaneously. This will offer more meaningful information for planners and a more detailed understanding of the land-use patterns. Based on these principles, a nation wide urban land-use database for the year 1997 is established. 1 Introduction Metropolitan areas all over the...
Words: 4617 - Pages: 19
...Framework and Infrastructure...................................................................................................................... 3 MODELLING AND APPLICATION OF DSS TO TRAFFIC MANAGEMENT .......................................................... 8 MSTEM By (Hasan, 2010) .......................................................................................................................... 8 Fuzzy Logic Application by (Almejalli, Dahal, & Hossain, 2006) .............................................................. 12 MultiAgent Modelling by (Ossowski, et al., 2005) .................................................................................. 15 Conclusion ................................................................................................................................................... 18 References .................................................................................................................................................. 19 Table of Figures Figure 1: Basic Variables and relationships in transportation system analysis ............................................ 3 Figure 2: Hassan M.K Framework ................................................................................................................. 4 Figure 3: Abstract dialogue between DSS and DM....
Words: 3368 - Pages: 14
...Fuzzy Control Kevin M. Passino Department of Electrical Engineering The Ohio State University Stephen Yurkovich Department of Electrical Engineering The Ohio State University An Imprint of Addison-Wesley Longman, Inc. Menlo Park, California • Reading, Massachusetts Don Mills, Ontaria • Sydney • Bonn • Harlow, England • Berkeley, California • Amsterdam • Mexico City ii Assistant Editor: Laura Cheu Editorial Assistant: Royden Tonomura Senior Production Editor: Teri Hyde Marketing Manager: Rob Merino Manufacturing Supervisor: Janet Weaver Art and Design Manager: Kevin Berry Cover Design: Yvo Riezebos (technical drawing by K. Passino) Text Design: Peter Vacek Design Macro Writer: William Erik Baxter Copyeditor: Brian Jones Proofreader: Holly McLean-Aldis Copyright c 1998 Addison Wesley Longman, Inc. All rights reserved. No part of this publication may be reproduced, or stored in a database or retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Printed simultaneously in Canada. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and AddisonWesley was aware of a trademark claim, the designations have been printed in initial caps or in all caps. MATLAB is a registered trademark of The MathWorks...
Words: 211473 - Pages: 846
...(IJCSIS) International Journal of Computer Science and Information Security, Vol. 10, No. 3, March 2012 An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique Josphineleela.R Dr.M.Ramakrishnan Research scholar Department of Computer Science and Engineering Sathyabamauniversity Chennai,India ilanleela@yahoo.com Professor/HOD-IT Velammal Engineering College Chennai,India ramkrishod@gmail.com Abstract— Biometric time and attendance system is one of the most successful applications of biometric technology. One of the main advantage of a biometric time and attendance system is it avoids "buddy-punching". Buddy punching was a major loophole which will be exploiting in the traditional time attendance systems. Fingerprint recognition is an established field today, but still identifying individual from a set of enrolled fingerprints is a time taking process. Most fingerprint-based biometric systems store the minutiae template of a user in the database. It has been traditionally assumed that the minutiae template of a user does not reveal any information about the original fingerprint. This belief has now been shown to be false; several algorithms have been proposed that can reconstruct fingerprint images from minutiae templates. In this paper, a novel fingerprint reconstruction algorithm is proposed to reconstruct the phase image, which is then converted into the grayscale image. The proposed reconstruction algorithm ...
Words: 3558 - Pages: 15
...CSE- 401 DISTRIBUTED SYSTEMS [3 1 0 4] 1. Distributed System Models: Introduction , Examples , Architecture models , Fundamental models (1.1,1.2,1.4, 2.1-2.3 of Text1 ) ..2hrs 2. Interprocess Communication, Distributed Objects and Remote Invocation: Introduction , External data representation and marshalling, Communication models, Communication between distributed objects , Remote procedure call Case study: Interprocess communication in UNIX, Java RMI . (4.1-4.6, 5.1-5.5 of Text1) ..6hrs 3. Operating System Introduction , Operating system layer, Processes and threads, Communication and invocation, Architecture (6.1-6.6 of Text1) ..4hrs. 4. Distributed File Systems and Name Services: Introduction , File service architecture, Name services, Domain Name System, Directory and directory services. Case study: Sun network file system, Global name service. (8.1-8.3, 9.1-9.4 of Text1) …6hrs 5. Synchronization: Clock Synchronization, Physical clocks, Logical clocks, Global state (5.1-5.3 of Text2) ..5hrs 6. Transactions&...
Words: 5050 - Pages: 21
...Intelligent Systems Laboratory WDA Centre of Enterprise in Manufacturing Engineering University of Wales Cardiff PO Box 688 Newport Road Cardiff CF2 3ET UK Other titles in this series Assembly Line Design B. Rekiek and A. Delchambre Advances in Design H.A. ElMaraghy and W.H. ElMaraghy (Eds.) Effective Resource Management in Manufacturing Systems: Optimization Algorithms in Production Planning M. Caramia and P. Dell’Olmo Condition Monitoring and Control for Intelligent Manufacturing L. Wang and R.X. Gao (Eds.) Optimal Production Planning for PCB Assembly W. Ho and P. Ji Trends in Supply Chain Design and Management H. Jung, F.F. Chen and B. Jeong (Eds.) Process Planning and Scheduling for Distributed Manufacturing L. Wang and W. Shen (Eds.) Collaborative Product Design and Manufacturing Methodologies and Applications W.D. Li, S.K. Ong, A.Y.C. Nee and C. McMahon (Eds.) R. Venkata Rao Decision Making in the Manufacturing Environment Using Graph Theory and Fuzzy Multiple Attribute Decision Making Methods 123 R. Venkata Rao, PhD Department of Mechanical Engineering Sardar Vallabhbhai National Institute of Technology, Surat Ichchanath Surat 395 007 Gujarat State India British Library Cataloguing in Publication Data Rao, R. Venkata Decision making in the manufacturing environment : using graph theory and fuzzy multiple attribute decision making methods. - (Springer series in advanced manufacturing) 1. Production management - Decision making 2. Graph theory 3. Fuzzy decision...
Words: 75183 - Pages: 301
...Power Flow on a Transmission Line UPFC Description and Operation Series Converter: Four Modes of Operation • Automatic Power Control Karl Schoder West Virginia University UPFC Modeling UPFC Steady-State or Load Flow Model • UPFC Dynamic Model • Interfacing the UPFC with the Power Network Control Design UPFC Basic Control Design • Power System Damping Control through UPFC Using Fuzzy Control Case Study Test System • Tracking Real and Reactive Power Flows • Operation under Fault Conditions Conclusion 20.1 Introduction An electric power system is an interconnection of generating units to load centers through high-voltage electric transmission lines. It consists of generation, transmission, and distribution subsystems, which used to belong to the same electric utility in a given geographical area. But, currently, the electric power industry is in transition from large, vertically integrated utilities providing power at regulated rates to an industry that will incorporate competitive companies selling unbundled power at possibly lower rates. With this new structure, which will include separate generation, distribution, and transmission companies with an open-access policy, comes the need for tighter control strategies. The strategies must maintain the level of reliability that consumers not only have taken for granted but expect even in the event of considerable structural changes, such as a loss of a large generating unit or a transmission line, and loading conditions...
Words: 7922 - Pages: 32
...Engineering Mathematics – III Digital Electronics Digital Electronics (Practical) Microprocessors Microprocessors (Practical) 0 3 0 3 3 0 3 0 15 0 1 0 1 1 0 1 0 5 3 0 2 0 0 2 0 2 09 3 4 2 4 4 2 4 2 29 2 4 1 4 4 1 4 1 25 50 50 50 50 250 Internal Total Sessional Marks 50 50 50 50 50 50 50 50 50 450 100 50 100 50 100 100 50 100 50 700 7. 8. Total ASC405 CSE 415 Analysis & Design of Algorithms Analysis & Design of Algorithms (Practical) Database Management System Database Management System (Practical) Object Oriented Programming Object Oriented Programming (Practical) Cyber Law & IPR Computer Architecture & Organization Internal Total Sessional Marks 50 100 50 50 50 50 50 50 100 50 100 50 3 3 15 0 1 4 0 0 9 3 4 28 3 4 25 50 50 250 50 50 400 100 100 650 2 Scheme of Examination of B.E. in Computer Science & Engineering Third Year - Fifth Semester Sr. Paper Subject Title Scheme of Teaching Univesity Internal Sessional Code External L T P Hou Credit Marks Total Marks rs s 1. CSE511 Operating System 3 1 0 4 4 50 50...
Words: 14784 - Pages: 60
...Executive Board Affairs and Public Relations (FMA) ‹ Editorial processing: Doris Datschetzky, Yi-Der Kuo, Alexander Tscherteu, (all OeNB) Thomas Hudetz, Ursula Hauser-Rethaller (all FMA) Design: Peter Buchegger, Secretariat of the Governing Board and Public Relations (OeNB) Typesetting, printing, and production: OeNB Printing Office Published and produced at: Otto Wagner Platz 3, 1090 Vienna, Austria Inquiries: Oesterreichische Nationalbank Secretariat of the Governing Board and Public Relations Otto Wagner Platz 3, 1090 Vienna, Austria Postal address: PO Box 61, 1011 Vienna, Austria Phone: (+43-1) 40 420-6666 Fax: (+43-1) 404 20-6696 Orders: Oesterreichische Nationalbank Documentation Management and Communication Systems Otto Wagner Platz 3, 1090 Vienna, Austria Postal address: PO Box 61, 1011 Vienna, Austria Phone: (+43-1) 404 20-2345 Fax: (+43-1) 404 20-2398 Internet: http:/ /www.oenb.at http:/ /www.fma.gv.at Paper: Salzer Demeter, 100% woodpulp paper, bleached without chlorine, acid-free, without optical whiteners DVR 0031577 Preface The ongoing development of contemporary risk management methods and the increased use of innovative financial products such as securitization and credit derivatives have brought about substantial changes in the...
Words: 60860 - Pages: 244
...Exam Name___________________________________ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Dell Computer's use of information systems to improve efficiency and implement "mass customization" techniques to maintain consistent profitability and an industry lead illustrates which business objective? A) improved flexibility B) survival C) competitive advantage D) improved business practices 2) Tata Motor's new information system, enabling it to automate processes in product design and production engineering planning, is best categorized as a(n) A) TPS B) DSS C) ESS D) KMS 3) As discussed in the chapter opening case, which of the four generic strategies to combat competitive forces formed the basis of e-Bay's growth strategy? A) low-cost leadership B) focus on market niche C) product differentiation D) customer and supplier intimacy 4) Information systems A) pose traditional ethical situations in new manners. B) raise ethical questions primarily related to information rights and obligations. C) raise the same ethical questions created by the industrial revolution. D) raise new ethical questions. 5) Place the following eras of IT infrastructure evolution in order, from earliest to most recent: (1) Cloud Computing Era (2) Client/Server, (3) Enterprise Era, (4) Personal Computer, and (5) Mainframe and Minicomputer. A) 5, 4, 2, 1, 3 B) 4, 5, 3, 2, 1 C) 4, 5, 2, 3, 1 D) 5, 4, 2, 3, 1 6) A DBMS reduces data redundancy and inconsistency...
Words: 8082 - Pages: 33