3,054 research outputs found

    Data Mining: How Popular Is It?

    Get PDF
    Data Mining is a process used in the industry, to facilitate decision making. As the name implies, large volumes of data is mined or sifted, to find useful information for decision making. With the advent of E-business, Data Mining has become more important to practitioners. The purpose of this paper is to find out the importance of Data Mining by looking at the different application areas that have used data mining for decision making

    FRAUD PREVENTION AND DETECTION SYSTEM IN NIGERIA BANKING INDUSTRIES

    Get PDF
    Fraud is on the rise as a result of the advent of modern technology and the global superhighways of banking transactions, resulting in billions of dollars in losses worldwide each year. Although fraud prevention technologies are the most effective method of combating fraud, fraudsters are flexible and will usually find a way around them over time. We need fraud detection approaches if we are to catch fraudsters after fraud prevention has failed. Statistics and machine learning are effective fraud detection technologies that have been used to detect money laundering, e-commerce credit card fraud, telecommunications fraud, and computer intrusion, to name a few. The program is simple to use, and anyone with permission can use it. The importance of computer technology has expanded as it has advanced in all areas of human endeavor.                        Keywords: Fraud Detection, Fraud Prevention, Banking Industries, Telecommunications

    Security Analysis and Improvement Model for Web-based Applications

    Get PDF
    Today the web has become a major conduit for information. As the World Wide Web?s popularity continues to increase, information security on the web has become an increasing concern. Web information security is related to availability, confidentiality, and data integrity. According to the reports from http://www.securityfocus.com in May 2006, operating systems account for 9% vulnerability, web-based software systems account for 61% vulnerability, and other applications account for 30% vulnerability. In this dissertation, I present a security analysis model using the Markov Process Model. Risk analysis is conducted using fuzzy logic method and information entropy theory. In a web-based application system, security risk is most related to the current states in software systems and hardware systems, and independent of web application system states in the past. Therefore, the web-based applications can be approximately modeled by the Markov Process Model. The web-based applications can be conceptually expressed in the discrete states of (web_client_good; web_server_good, web_server_vulnerable, web_server_attacked, web_server_security_failed; database_server_good, database_server_vulnerable, database_server_attacked, database_server_security_failed) as state space in the Markov Chain. The vulnerable behavior and system response in the web-based applications are analyzed in this dissertation. The analyses focus on functional availability-related aspects: the probability of reaching a particular security failed state and the mean time to the security failure of a system. Vulnerability risk index is classified in three levels as an indicator of the level of security (low level, high level, and failed level). An illustrative application example is provided. As the second objective of this dissertation, I propose a security improvement model for the web-based applications using the GeoIP services in the formal methods. In the security improvement model, web access is authenticated in role-based access control using user logins, remote IP addresses, and physical locations as subject credentials to combine with the requested objects and privilege modes. Access control algorithms are developed for subjects, objects, and access privileges. A secure implementation architecture is presented. In summary, the dissertation has developed security analysis and improvement model for the web-based application. Future work will address Markov Process Model validation when security data collection becomes easy. Security improvement model will be evaluated in performance aspect

    Business Analytics Using Predictive Algorithms

    Get PDF
    In today's data-driven business landscape, organizations strive to extract actionable insights and make informed decisions using their vast data. Business analytics, combining data analysis, statistical modeling, and predictive algorithms, is crucial for transforming raw data into meaningful information. However, there are gaps in the field, such as limited industry focus, algorithm comparison, and data quality challenges. This work aims to address these gaps by demonstrating how predictive algorithms can be applied across business domains for pattern identification, trend forecasting, and accurate predictions. The report focuses on sales forecasting and topic modeling, comparing the performance of various algorithms including Linear Regression, Random Forest Regression, XGBoost, LSTMs, and ARIMA. It emphasizes the importance of data preprocessing, feature selection, and model evaluation for reliable sales forecasts, while utilizing S-BERT, UMAP, and HDBScan unsupervised algorithms for extracting valuable insights from unstructured textual data

    Advanced Information Systems and Technologies

    Get PDF
    This book comprises the proceedings of the VI International Scientific Conference “Advanced Information Systems and Technologies, AIST-2018”. The proceeding papers cover issues related to system analysis and modeling, project management, information system engineering, intelligent data processing, computer networking and telecomunications, modern methods and information technologies of sustainable development. They will be useful for students, graduate students, researchers who interested in computer science

    Supply chain operation strategies and risk management with working capital consideration: a case study of the supply chain of lightning protection products in China

    Get PDF
    JEL: G32; D21With the advent of economic globalization, competition is increasingly hinged on supply chain. Meanwhile, working capital becomes a key element of a successful supply chain. This thesis researches the supply chain of a typical lightning protection products manufacturer in China, i.e. Company Z. The thesis starts with the working capital issues in the supply chain of Company Z; then, with the help of questionnaires and a sensible indicator system and weight assignments; analyzes and summarizes the status quo of the working capital and related key issues in the supply chain consisting of Company Z and its suppliers and customers. Building on such analysis, a two-dimensional classification matrix is created to divide suppliers and customers into four groups (namely, strategic-type, partner-type, general-type, and bottleneck-type) and supply chain operation strategies are devised for each group. Furthermore, based on such supply chain operations strategies of Company Z, a working capital risk management mechanism with an early warning system is developed, and a supply chain-based financing platform is designed to help the supply chain participants seek financing and share the risks with working capital.Com o advento da era da globalização económica, a cadeia de suprimentos tornou-se cada vez mais importante para a concorrência empresarial, e ao mesmo tempo, o fundo de maneio tornou-se num elemento chave para o sucesso da gestão da cadeia de suprimentos. Neste trabalho, a cadeia de suprimentos de uma empresa chinesa de fabricação de produtos típicos de proteção contra relâmpagos, a empresa Z, é o objeto de estudo. Tomando como ponto de partida os problemas de fundo de maneio existentes na cadeia de suprimentos da empresa Z, por meio de questionários combinados com o estabelecimento de um sistema de indexação e de ponderação, foram realizadas análises precisas sobre problemas-chaves existentes e da situação atual da gestão do fundo de maneio da cadeia de suprimentos a montante e a jusante da empresa Z. Estabeleceram-se matrizes bidimensionais de classificação para respectivamente subdividir os fornecedores e clientes em quatro categorias, a saber, categoria de fornecedores/clientes estratégicos, categoria de fornecedores/clientes parceiros, categoria de fornecedores/clientes comuns e categoria de fornecedores/clientes críticos (“engarrafamentos”) e propor estratégias diferentes na cadeia de suprimentos para diferentes categorias. Por fim, o nosso estudo indica que segundo a estratégia de operação da cadeia de suprimentos da empresa Z, deve ser estabelecido um mecanismo de controle e gestão de risco de fundo de maneio, um sistema de alerta de risco e, ainda, projetar uma plataforma de financiamento a fim de prover o financiamento emergente da cadeia de suprimentos da empresa Z e a partilha dos riscos de gestão do fundo de maneio
    corecore