The use of data mining of to create of a fraud prevention and detection system in credit card
Keywords:
Data Mining, Fraud, Prevention, System, Detection and MethodologiesAbstract
After defining the problem, we'll examine the various techniques (pre-and post-dynamic) for managing installment card fraud recognition, as well as collect all the data from various elements of card-based monetary fraud (regions, fraudulent activity, etc.). When all of the information has been gathered, it's time to put it into practice. It is best to avoid using data that has been gleaned from several sources because it has little practical use until it can be combined. For this collaboration, we're looking into novel data-combination approaches that can help us find the location of financial fraud. The Fraud Prevention and Detection systems were developed utilizing a variety of data mining techniques, including rule learning, rule generation, and rule selection.
Downloads
References
Francisca N. O; 2011, “Data mining application in credit card fraud detectionsystem,” Journal of Engineering Science and Technology, vol. 6, no. 3, pp. 311–322.
Quah J. T. S and Sriganesh M; 2008, “Real-time credit card fraud detection usingcomputational intelligence,” Expert Systems with Applications, vol. 35, no. 4, pp.1721–1732.
ZaslavskyVandStrizhakA;2006,“Creditcardfrauddetectionusingself-organizingmaps,”Information&Security, vol. 18,pp. 48–63.
DumanEandOzcelikM.H;2011,“Detectingcreditcardfraudbygeneticalgorithm and scatter search,”Expert Systems with Applications, vol. 38, no. 10,pp. 13057–13063.
Yogeesh N and Dr. P.K. Chenniappan, "A CONCEPTUAL DISCUSSION ABOUT AN INTUITIONISTIC FUZZY-SETS AND ITS APPLICATIONS", International Journal of Advanced Research in IT and Engineering, 1(6), 2012, 45-55.
Maes S, Tuyls K, Vanschoen winkel B, and Manderick B; 1993, “Credit card frauddetectionusingBayesianandneuralnet-works,”inProceedingsofthe1stInternationalNAISO Congresson Neuro Fuzzy Technologies, pp. 261–270.
Srivastava A, Kundu A, Sural S, and Mazumdar A. K; 2008, “Credit card frauddetection using hidden Markov model,” IEEE Transactions on Dependable andSecureComputing, vol. 5, no. 1, pp. 37–48.
Hand D. J; 2007, "Mining Personal Banking Data to Detect Fraud," in SelectedContributions in Data Analysis and Classification, Studies in Classification, DataAnalysis,and KnowledgeOrganization.BerlinHeidelberg:Springer,pp.377--386.
Seyedhossein L and Hashemi M. R; 2010, “Mining information from credit cardtime series for timelier fraud detection,” in Proceeding of the 5th InternationalSymposiumonTelecommunications(IST'10),pp.619–624,Tehran,Iran,December.
S´anchez D, Vila M. A, Cerda L, and Serrano J. M; 2009, “Association rulesapplied to credit card fraud detection,” Expert Systems with Applications, vol. 36,no. 2, pp. 3630–3640.
Yogeesh N, "Study on Clustering Method Based on K-Means Algorithm", Journal of Advances and Scholarly Researches in Allied Education (JASRAE),17(1),2020,2230-7540
LuQ and Ju C; 2011, “Research on credit card fraud detection model based onclassweightedsupportvectormachine,”JournalofConvergenceInformationTechnology,vol. 6,no. 1, pp. 62–68.
Suryasa, I. W., Rodríguez-Gámez, M., & Koldoris, T. (2022). Post-pandemic health and its sustainability: Educational situation. International Journal of Health Sciences, 6(1), i-v. https://doi.org/10.53730/ijhs.v6n1.5949
WongN,RayP,StephensG,andLewisL;2012,“Artificialimmunesystemsfor thedetection ofcredit cardfraud,”Information Systems,vol. 22,no. 1,pp. 53–76.
Darmayanti, P. A. R. ., & Armayanti, L. Y. . (2020). The differences between gross motor, fine motor and language development on toddler based on the age of breast milk weaning. International Journal of Health & Medical Sciences, 3(1), 123-129. https://doi.org/10.31295/ijhms.v3n1.191
Panigrahi S, Kundu A, Sural S, and Majumdar A. K; 2009, “Credit card frauddetection:afusionapproachusingDempster-ShafertheoryandBayesianlearning,”Information Fusion, vol.10, no. 4, pp. 354–363.
Yogeesh N, "Mathematical Approach to Representation of Locations Using K-Means Clustering Algorithm", International Journal of Mathematics And its Applications (IJMAA), 9(1), 2021, 2347-1557
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.








