Académique Documents
Professionnel Documents
Culture Documents
BAREILLY-243101(U.P)
Synopsis
On
SUBMITTED TO: Ms. Jyoti Agarwal PROJECT GUIDE: Ms. Priya Agarwal
SUMITTED BY: Abrar Ahmad (080004) Akhil Kr. Gupta (080006) Rudraansh Sethi (080085) Manoj Kr. Kannaujiya (080051)
[SYNOPSIS
CONTENTS
1. TITLE 2. OBJECTIVE OF PROJECT 3. REQUIREMENT SPECIFICATION 3.1 3.2 HARDWARE SOFTWARE
4. FEASIBILTY AND FUNTIONALITY 5. METHODOLOGY 6. ADVANTAGES OF PROJECT 7. PROJECT APPLICATION 8. PROJECT RISK 9. FUTURE ENHANCEMENTS 10. PROJECT LIMITATIONS 11.REFERNCES 12.SIGNATORY
[SYNOPSIS
1. Title: CREDIT CARD FRAUD DETECTION SYSTEM USING HIDDEN MARKOV MODEL
3. Requirement Specification:
3.1) Software Requirement: Operating System: Windows XP/VISTA/2000/7 Application: Net Beans 6.5 Platform: JRE/JDK
[SYNOPSIS
This project is based upon Hidden Markov Model. HMMs can be applied to the gesture-recognition problem. It is primarily concerned with empirically picking the HMM parameters from some sample data. Detects fraud to analyze the spending patterns on every card and to figure out any inconsistency with respect to the usual spending patterns. Fraud detection system is based on the analysis of existing purchase data of cardholder
[SYNOPSIS
5. Methodology:
This project is developed under JAVA and applet as front end, so methodology adopted in this software is based on object oriented concept.
Proper security provisions are made from malicious threats and hacking tools so that user account cannot be harmed intentionally or non intentionally from frauds. Proper hierarchy of the users is maintained as per authority to access the data and use the services provided by the authority. Track all the necessary details during transaction process. In case of the existing system even the original card holder is also checked for fraud detection. But in this system no need to check the original user as we maintain a log. The log which is maintained will also be a proof for the bank for the transaction made. This reduces the tedious work of an employee in the bank. We can find the most accurate detection using this technique.
[SYNOPSIS
7. Project Applications:
The different areas where we can use this application are : It can be used on the server of any organization providing financial transactions. It can also be used in banks and modifications can be easily done according to requirements.
8. Project Risks:
Proper network security is necessary.
9. Future Enhancements:
[SYNOPSIS
Proper Document hierarchy should be maintained for accessing the required credit card.
[SYNOPSIS
REFERNCES
Data Compression by Khalid Sayood http://www.wikipedia.com http://www. ieeexplore.ieee.org
[SYNOPSIS
Group No: 12 Group Members: Abrar Ahmad.. Akhil Kr. Gupta. Manoj Kr. Kannaujiya Rudraansh Sethi .
Project Incharge:
HOD Of CS Deptt: