...severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time Analysis, Fraud, Data Mining, Retail Banking Industry, Data Preprocessing, Data Classification, Behavior-based Models, Supervised Analysis, Semi-supervised Analysis Sammanfattning Privatbankerna har drabbats hårt av bedrägerier de senaste åren. Bedragare har lyckats kringgå forskning och...
Words: 56858 - Pages: 228
...MEDWAY SCHOOL OF ENGINEERING Programme: Msc. Information Technology Management for Business Course: Knowledge Management and Exploitation Course Tutor: Dr. A.A.F. Al-Shawabkeh Topic Using Data Mining and Knowledge Management to Improve Business Performance By Nurudeen Babatunde Lawal 000620744 Table of Contents Content Page No. Table of Contents 2 List of Figures 3 Abstract 4 Chapter One 5 1.1 Overview of Business 5 1.2 Nature of Business 5 1.3 Business Challenges 6 Chapter Two 2.1 Knowledge and Knowledge Management 8 2.1.1 Knowledge 8 2.1.2 Knowledge management 9 2.1.3 Knowledge Management Process 9 2.1.4 Knowledge Discovery from Database 10 2.2 Data Mining 12 2.2.1 Data Mining Tasks in Knowledge Management 12 2.2.2 Data Mining and Knowledge Management in Business 14 Chapter Three 17 3.1 Implementation Challenges of KM in Business 17 3.2 Limitations of Data Mining Applications 18 3.3 Conclusion 18 References 19 List of Figures Figure No. Description Page No. Figure 1 Forms of Knowledge Organisation 8 Figure 2 Integration of KM Technologies with KM Process Cycle 10 Figure 3 DM and KDD Process 11 Figure 4 Intersection of DM and KM 14 Abstract ...
Words: 5606 - Pages: 23
...severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time Analysis, Fraud, Data Mining, Retail Banking Industry, Data Preprocessing, Data Classification, Behavior-based Models, Supervised Analysis, Semi-supervised Analysis Sammanfattning Privatbankerna har drabbats hårt av bedrägerier de senaste åren. Bedragare har lyckats kringgå forskning och...
Words: 56858 - Pages: 228
...TITLE PAGE Wearable Obstacle Detection for the Blind that can Detect Discrete Elevation using Gizduino Microcontroller by Nicole Sam Rey P. Cuaresma Carissa D. Eustaquio Glenda T. Ofiana A Thesis Report Submitted to the School of Electrical, Electronics, and Computer Engineering in Partial Fulfilment of the Requirements for the Degree Bachelor of Science in Computer Engineering Mapúa Institute of Technology May 2015 ii iii ACKNOWLEDGEMENT The researchers would like to express their deepest gratitude to all those who gave contribution to the completion of this paper. To our adviser, Engr. Glenn V. Magwili, for his patience and efforts in stimulating suggestions and encouragement that helped the whole group in order to create a device that can help many people. To our former instructors who have taught us valuable knowledge throughout our academic progress.This research would also not be possible without the belief of the research panel members. The researchers would also like to thank the unconditional support, patience and understanding of their families throughout the process. To the researchers’ colleagues who had also given support and shared their knowledge during the course of completing the research. Lastly, to the Almighty God who had bestowed them with wisdom and strength throughout the research and their life. To the Lord who gave blessings and guidance for the success of this research. iv TABLE OF CONTENTS TITLE...
Words: 15527 - Pages: 63
...• ACFE= Association of Certified Fraud Examiners; conducts comprehensive fraud studies; Report to the Nation on Occupational Fraud & Abuse • Fraud - deception that includes: a representation, about a material point, which is false, and intentionally or recklessly so, which is believed, and acted upon by the victim to the victim’s damage. Fraud is an act of dishonesty with the intention to deceive or cover the truth to gain an advantage. Most critical element: confidence. Fraud can be classified as (in terms of organization): against or on behalf of • Occupational fraud - use of one’s occupation for personnel enrichment through deliberate misuse or misapplication of the employing org’s resources or assets. Categories: Asset misappropriation (steal asset), f.s fraud (manipulate f.s), Corruption scheme (misuse connections). • Employee embezzlement-can be: direct (e.g: asset misappropriation, making dummy company and making employer pay for goods not actually delivered) (from perpetrator to employer); or indirect (corruption, taking bribes from outside) (3rd party involved) • Management fraud- aka financial statement fraud; involves top management’s deceptive manipulation of f.s.; more inclusive • Investment scam-consumer fraud: Ponzi scheme, telemarketing, identity theft, money scam, advance fee scam, letter of credit fraud, etc. • Vendor fraud-overcharge, send inferior goods, charge for goods not shipped; • Customer fraud-not pay, shoplift; • Miscellaneous¬-other ...
Words: 1542 - Pages: 7
...The Survey of Digital Technology and Internet Use measures the adoption and use of various digital technologies, including the Internet. The use of the Internet and digital technology has become pervasive in today's society. Like electricity, the Internet has become so ingrained in the way that business operates, it can be considered a General Purpose Technology (GPT) because it affects the way the entire economy functions. The use of digital technologies and electronic commerce, while of great potential, also pose numerous challenges to both businesses and policy makers. In order to understand the effects and impacts of these technologies, it is essential to first understand who is using them and how. The data from this survey are used by businesses and policy makers to monitor the uptake and adoption patterns of Information and Communication Technologies (ICTs) and assess their impact on the economy. Results are also monitored by international organizations such as the Organization for Economic Co-operation and Development (OECD) for benchmarking purposes and to study the development and the influence of the digital economy. Statistical activity Science and technology (S&T) and the information society are changing the way we live, learn and work. The concepts are closely intertwined: science generates new understanding of the way the world works, technology applies it to develop innovative products and services and the information society is one of the results...
Words: 3974 - Pages: 16
...SUBJECT REVIEW Regression Methods in the Empiric Analysis of Health Care Data GRANT H. SKREPNEK, PhD ABSTRACT OBJECTIVE: The aim of this paper is to provide health care decision makers with a conceptual foundation for regression analysis by describing the principles of correlation, regression, and residual assessment. SUMMARY: Researchers are often faced with the need to describe quantitatively the relationships between outcomes andpre d i c t o r s , with the objective of ex p l a i n i n g trends, testing hypotheses, or developing models for forecasting. Regression models are able to incorporate complex mathematical functions and operands (the variables that are manipulated) to best describe the associations between sets of variables. Unlike many other statistical techniques, regression allows for the inclusion of variables that may control for confounding phenomena or risk factors. For robust analyses to be conducted, however, the assumptions of regression must be understood and researchers must be aware of diagnostic tests and the appropriate procedures that may be used to correct for violations in model assumptions. CONCLUSION: Despite the complexities and intricacies that can exist in re gre s s i o n , this statistical technique may be applied to a wide range of studies in managed care settings. Given the increased availability of data in administrative databases, the application of these procedures to pharmacoeconomics and outc o m e s assessments may result in...
Words: 9010 - Pages: 37
...Chemistry Modern Analytical Chemistry David Harvey DePauw University Boston Burr Ridge, IL Dubuque, IA Madison, WI New York San Francisco St. Louis Bangkok Bogotá Caracas Lisbon London Madrid Mexico City Milan New Delhi Seoul Singapore Sydney Taipei Toronto McGraw-Hill Higher Education A Division of The McGraw-Hill Companies MODERN ANALYTICAL CHEMISTRY Copyright © 2000 by The McGraw-Hill Companies, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a data base or retrieval system, without the prior written permission of the publisher. This book is printed on acid-free paper. 1 2 3 4 5 6 7 8 9 0 KGP/KGP 0 9 8 7 6 5 4 3 2 1 0 ISBN 0–07–237547–7 Vice president and editorial director: Kevin T. Kane Publisher: James M. Smith Sponsoring editor: Kent A. Peterson Editorial assistant: Jennifer L. Bensink Developmental editor: Shirley R. Oberbroeckling Senior marketing manager: Martin J. Lange Senior project manager: Jayne Klein Production supervisor: Laura Fuller Coordinator of freelance design: Michelle D. Whitaker Senior photo research coordinator: Lori Hancock Senior supplement coordinator: Audrey A. Reiter Compositor: Shepherd, Inc. Typeface: 10/12 Minion Printer: Quebecor Printing Book Group/Kingsport Freelance cover/interior designer: Elise Lansdon Cover image: © George Diebold/The...
Words: 88362 - Pages: 354
...j o u r n a l h o m e p a g e : w w w. e l s ev i e r. c o m / l o c a t e / d s s Detection of financial statement fraud and feature selection using data mining techniques P. Ravisankar a, V. Ravi a,⁎, G. Raghava Rao a, I. Bose b a b Institute for Development and Research in Banking Technology, Castle Hills Road #1, Masab Tank, Hyderabad 500 057, AP, India School of Business, The University of Hong Kong, Pokfulam Road, Hong Kong a r t i c l e i n f o a b s t r a c t Recently, high profile cases of financial statement fraud have been dominating the news. This paper uses data mining techniques such as Multilayer Feed Forward Neural Network (MLFF), Support Vector Machines (SVM), Genetic Programming (GP), Group Method of Data Handling (GMDH), Logistic Regression (LR), and Probabilistic Neural Network (PNN) to identify companies that resort to financial statement fraud. Each of these techniques is tested on a dataset involving 202 Chinese companies and compared with and without feature selection. PNN outperformed all the techniques without feature selection, and GP and PNN outperformed others with feature selection and with marginally equal accuracies. © 2010 Elsevier B.V. All rights reserved. Article history: Received 20 November 2009 Received in revised form 14 June 2010 Accepted 3 November 2010 Available online 12 November 2010 Keywords: Data mining Financial fraud detection Feature selection t-statistic Neural networks SVM GP 1. Introduction Financial fraud...
Words: 10935 - Pages: 44
...Data Mining for Fraud Detection: Toward an Improvement on Internal Control Systems? Mieke Jans, Nadine Lybaert, Koen Vanhoof Abstract Fraud is a million dollar business and it’s increasing every year. The numbers are shocking, all the more because over one third of all frauds are detected by ’chance’ means. The second best detection method is internal control. As a result, it would be advisable to search for improvement of internal control systems. Taking into consideration the promising success stories of companies selling data mining software, along with the positive results of research in this area, we evaluate the use of data mining techniques for the purpose of fraud detection. Are we talking about real success stories, or salesmanship? For answering this, first a theoretical background is given about fraud, internal control, data mining and supervised versus unsupervised learning. Starting from this background, it is interesting to investigate the use of data mining techniques for detection of asset misappropriation, starting from unsupervised data. In this study, procurement fraud stands as an example of asset misappropriation. Data are provided by an international service-sector company. After mapping out the purchasing process, ’hot spots’ are identified, resulting in a series of known frauds and unknown frauds as object of the study. 1 Introduction Fraud is a million dollar business and it is increasing every year. ”45% of companies worldwide have fallen victim...
Words: 6259 - Pages: 26
...Project Title Use of Data mining by government agencies and practical applications (Describe the Data Mining technologies, how these are being used in government agencies. Provide practical applications and examples) Compiled By:- Sneha Gang (Student # - 84114) Karan Sawhney (Student # - 85471) Raghunath Cherancheri Balan (Student # - 86088) Sravan Yella (Student # - 87041) Mrinalini Shah (Student # - 86701) Use of Data mining by government agencies and practical applications * Abstract (Sneha Garg) With an enormous amount of data stored in databases and data warehouses, it is increasingly important to develop powerful tools for analysis of such data and mining interesting knowledge from it. Data mining is a process of inferring knowledge from such huge data. It is a modern and powerful tool, automatizing the process of discovering relationships and combinations in raw data and using the results in an automatic decision support. This project provides an overview of data mining, how government uses it quoting some practical examples. Data mining can help in extracting predictive information from large quantities of data. It uses mathematical and statistical calculations to uncover trends and correlations among the large quantities of data stored in a database. It is a blend of artificial intelligence technology, statistics, data warehousing, and machine learning. These patterns...
Words: 4505 - Pages: 19
...of two-stage segmentation methods for choice-based conjoint data: a simulation study Marjolein Crabbe, Bradley Jones and Martina Vandebroek DEPARTMENT OF DECISION SCIENCES AND INFORMATION MANAGEMENT (KBI) KBI 1109 A Comparison of Two-Stage Segmentation Methods for Choice-Based Conjoint Data: A Simulation Study Marjolein Crabbe Bradley Jones Martina Vandebroek Abstract Due to the increasing interest in market segmentation in modern marketing research, several methods for dealing with consumer heterogeneity and for revealing market segments have been described in the literature. In this study, the authors compare eight two-stage segmentation methods that aim to uncover consumer segments by classifying subject-specific indicator values. Four different indicators are used as a segmentation basis. The forces, which are subject-aggregated gradient values of the likelihood function, and the dfbetas, an outlier detection measure, are two indicators that express a subject’s effect on the estimation of the aggregate partworths in the conditional logit model. Although the conditional logit model is generally estimated at the aggregate level, this research obtains individual-level partworth estimates for segmentation purposes. The respondents’ raw choices are the final indicator values. The authors classify the indicators by means of cluster analysis and latent class models. The goal of the study is to compare the segmentation performance of the methods with respect to their success...
Words: 12792 - Pages: 52
...Anx.31 J - M Sc CS (SDE) 2007-08 with MQP Page 1 of 16 Annexure No. SCAA Dated BHARATHIAR UNIVERSITY, COIMBATORE – 641 046 M. Sc COMPUTER SCIENCE For School of Distance Education (Effective from the academic Year 2007-2008) Scheme of Examinations 31 J 29.02.2008 Year Subject and Paper I Paper I Paper II Paper III Paper IV Practical I Paper V Paper VI Paper VII Practical II Project Advanced Computer Architecture Computer Graphics & Multimedia Software Engineering Computer Networks Computer Graphics and Multimedia Lab Advanced Operating System Internet programming and Web Design Data Mining and Warehousing Internet programming and Web Design Lab Project Work and Viva Voce Total University Examinations Durations Max in Hrs Marks 3 100 3 100 3 100 3 100 3 100 3 3 3 3 100 100 100 100 100 1000 II For project work and viva voce (External) Breakup: Project Evaluation : 75 Viva Voce : 25 1 Anx.31 J - M Sc CS (SDE) 2007-08 with MQP Page 2 of 16 YEAR – I PAPER I: ADVANCED COMPUTER ARCHITECTURE Subject Description: This paper presents the concept of parallel processing, solving problem in parallel processing, Parallel algorithms and different types of processors. Goal: To enable the students to learn the Architecture of the Computer. Objectives: On successful completion of the course the students should have: Understand the concept of Parallel Processing. Learnt the different types of Processors. Learnt the Parallel algorithms. Content: Unit I...
Words: 3613 - Pages: 15
...by cytotoxic T lymphocytes) is a common biomarker used to identify malignant melanoma (MM) in patients, it falls under the MHC (major histocompatability complex) I class. MART-1 is encoded by the MLANA gene in humans and is present normally on the surface of benign nevi (beauty marks), as well as on melanocytes, the pigment-producing cells of your skin that become abnormal and grow out of control if malignant melanoma has developed. Approximately 76,000 new cases of melanoma are diagnosed annually in the Unites States, which accounts for about 2% of the total skin cancer diagnosis in United States annually; however 75% of skin cancer related deaths are the result of MM which exhibits how devastating this form of cancer is. With early detection of melanoma being correlated highly to improved prognosis of patients, it is necessary to create a point of care device that can measure the presence of MART-1 antigen in peripheral blood as a screening technique during annual examinations and upon identification of suspicious skin lesions Protein melan-A is a protein that in humans is encoded by the MLANA gene . A fragment of the protein, usually consisting of the nine amino acids 27 to 35, is bound byMHC class I complexes which present it to T cells of the immune system. These complexes can be found on the surface of melanoma cells. Decameric peptides (26-35) are being investigated as cancer vaccines. The names MART-1 and melan-A were coined by two groups of researchers...
Words: 4004 - Pages: 17
...Metasploit Vulnerability Scanner Executive Proposal Paul Dubuque Table of Contents Page 3 Executive Summary Page 5 Background Information Page 6 Recommended Product Page 7 Product Capabilities Page 10 Cost and Training Page 11 References Page 13 Product Reviews Executive Summary To: Advanced Research Corporation Mr. J. Smith, CEO; Ms. S. Long, V.P. Mr. W Donaldson, CCO; Mr. A. Gramer, CCO & Mr. B. Schuler, CFO CC. Ms. K. Young, MR. G. Holdsoth From: P. Dubuque, IT Manager Advance Research Corporation (ARC) has grown rapidly during the last five years and has been very successful in developing new and innovative devices and medicines for the health care industry. ARC has expanded to two locations, New York, NY and Reston, VA which has led to an expanded computer network in support of business communications and research. ARC has been the victim of cyber-attacks on its network and web site, as well as false alegations of unethical practices. ARC’s network is growing, with over two thousand devices currently and reaching from VA to NY. ARC needs to ensure better security of communications, intellectual property (IP) and public image, all of which affect ARC’s reputation with the public and investors. ARC has previously limited information technology (IT) expenditures to desktop computers and network infrastructure hardware such as routers, firewalls and servers. It is imperative that ARC considers information security (IS) and begins to invest in products...
Words: 2593 - Pages: 11