119 research outputs found

    Immune network algorithm in monthly streamflow prediction at Johor river

    Get PDF
    This study proposes an alternative method in generating future stream flow data with single-point river stage. Prediction of stream flow data is important in water resources engineering for planning and design purposes in order to estimate long term forecasting. This paper utilizes Artificial Immune System (AIS) in modelling the stream flow of one stations of Johor River. AIS has the abilities of self-organizing, memory, recognition, adaptive and ability of learning inspired from the immune system. Immune Network Algorithm is part of the three main algorithm in AIS. The model of Immune Network Algorithm used in this study is aiNet. The training process in aiNet is partly inspired by clonal selection principle and the other part uses antibody interactions for removing redundancy and finding data patterns. Like any other traditional statistical and stochastic techniques, results from this study, exhibit that, Immune Network Algorithm is capable of producing future stream flow data at monthly duration with various advantages

    A Comprehensive Survey of Data Mining-based Fraud Detection Research

    Full text link
    This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines the professional fraudster, formalises the main types and subtypes of known fraud, and presents the nature of data evidence collected within affected industries. Within the business context of mining the data to achieve higher cost savings, this research presents methods and techniques together with their problems. Compared to all related reviews on fraud detection, this survey covers much more technical articles and is the only one, to the best of our knowledge, which proposes alternative data and solutions from related domains.Comment: 14 page

    The Study of Fraud Detection in Financial and Credit Institutions with Real Data

    Get PDF
    This paper presents a review of data mining techniques for the fraud detection Development of information systems such as data due to it has become a source of important organizations Method and techniques are required for efficient access to data sharing the data extracting information from data and using this information In recent years data mining technology is an important method that it has changed to extract concepts from the data set Scientific data mining and business intelligence technology is as a valuable and some what hidden to provide large volumes of data This research studies using service analyzes software annual transactions related to 20000 account number of financial institutions in the country The main data mining techniques used for financial fraud detection FFD are logistic models neural networks and decision trees all of which provide primarysolutions to the problems inherent in the detection and classification of fraudulent data The proposed method is clustering clients based on client type An appropriate rule for each cluster is determined by the behavior of group members in case of deviation from specified behavior will be known among suspected cases The rules of the C5 have been applied in decision tree algorithm Model is able to extract about a lot of the rules related to client behavio

    Data Mining Techniques for Fraud Detection

    Get PDF
    The paper presents application of data mining techniques to fraud analysis. We present some classification and prediction data mining techniques which we consider important to handle fraud detection. There exist a number of data mining algorithms and we present statistics-based algorithm, decision tree-based algorithm and rule-based algorithm. We present Bayesian classification model to detect fraud in automobile insurance. Naïve Bayesian visualization is selected to analyze and interpret the classifier predictions. We illustrate how ROC curves can be deployed for model assessment in order to provide a more intuitive analysis of the models. Keywords: Data Mining, Decision Tree, Bayesian Network, ROC Curve, Confusion Matri

    Data Mining Techniques in Fraud Detection

    Get PDF
    The paper presents application of data mining techniques to fraud analysis. We present some classification and prediction data mining techniques which we consider important to handle fraud detection. There exist a number of data mining algorithms and we present statistics-based algorithm, decision treebased algorithm and rule-based algorithm. We present Bayesian classification model to detect fraud in automobile insurance. Naïve Bayesian visualization is selected to analyze and interpret the classifier predictions. We illustrate how ROC curves can be deployed for model assessment in order to provide a more intuitive analysis of the models

    Detecting market manipulation in stock market data

    Get PDF
    Anomaly Detection is an extensively researched problem that has diverse applications in many domains. Anomaly detection is the process of finding data points or patterns that do not conform to expected behavior within a dataset. Solutions to this problem have used techniques from disciplines such as statistics, machine learning, data mining, spectral theory and information theory. In the case of stock market data, the input is a non-linear complex time series that render statistical methods ineffective. The aim of this thesis, is to detect anomalies within the Standard and Poor and Qatar Stock Exchange using the behavior of similar time series. Many works on stock market manipulation focus on supervised learning techniques, which require labeled datasets. The labeling process requires substantial efforts. Anomalous behavior is also dynamic in nature. For those reasons, the development of an unsupervised market manipulation detection technique would be very interesting. The Contextual Anomaly Detector (CAD) is an unsupervised method that finds anomalies by looking at similarly behaving time series and uses them to predict expected values. When the predicted value is different from the actual value in the time series by a certain threshold, it is considered an anomaly. This thesis will look at the Contextual Anomaly Detector (CAD) and implement a different preprocessing step to improve recall and precision
    corecore