0 évaluation0% ont trouvé ce document utile (0 vote)
15 vues2 pages
This project evaluates a decision tree in order to differentiate the good andfraudulent customers. Kmeans clusteringalgorithm, ADA cost algorithm are used in this project. The aim of data mining is to extract knowledge from large amounts of data.
This project evaluates a decision tree in order to differentiate the good andfraudulent customers. Kmeans clusteringalgorithm, ADA cost algorithm are used in this project. The aim of data mining is to extract knowledge from large amounts of data.
Droits d'auteur :
Attribution Non-Commercial (BY-NC)
Formats disponibles
Téléchargez comme DOC, PDF, TXT ou lisez en ligne sur Scribd
This project evaluates a decision tree in order to differentiate the good andfraudulent customers. Kmeans clusteringalgorithm, ADA cost algorithm are used in this project. The aim of data mining is to extract knowledge from large amounts of data.
Droits d'auteur :
Attribution Non-Commercial (BY-NC)
Formats disponibles
Téléchargez comme DOC, PDF, TXT ou lisez en ligne sur Scribd
DETECTION In the modern days, improved fraud detection has becomeessential to maintain the viability of the country’s payment system. Largescale data mining techniques can improve on the state of art in commercialpractice. The aim of data mining is to extract knowledge from largeamounts of data. This knowledge is nontrivial and hidden in the data.Machine learning is often used in the process of data mining. The aim ofmachine learning is to adapt to new circumstances, to detect and extrapolate.A distinction can be made between unsupervised and supervised machinelearning algorithms. This approach addresses the efficiency and scalabilityissues by dividing large dataset of labeled transactions (either fraudulent orlegitimate) in to smaller subsets by applying data mining algorithms. Also, this project evaluates other useful data like outstandingbalance, transaction management involved for a particular month and a year.This project evaluates a decision tree in order to differentiate the good andfraudulent customers. A graph that visualizes the good and bad customerscan also be done with respective values obtained. ALGORITHM: The algorithms used in this project are: k- means clusteringalgorithm, ADA cost algorithm. These algorithms evaluate the requiredvalues for the purpose of finding out the fraudulent customers. The Hardware Interfaces for this system are: • Processor with at least 1GHz speed. • More than 256 MB Ram. • Type-3 driver support. Software Interfaces The various Software Interfaces for this system are: • JDK1.5 • JNDI • JSP • Tomcat Server • Internet Explorer 6.0 or Netscape 4.0 browser with JVM support • Oracle-10g • Windows 2000 professional