Assessment of Fraud Pretentious Business Region Research Articles Using Data Mining Approaches
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 7
Abstract
In any organization, fraud detection and prevention is daunting task because millions of dollars lost with the different nature of fraudulent activities. Organizations got to engage intelligent and innovative techniques to detect fraud at the earliest opportunity to protect business and their shareholders, customers and employees. This paper surveyed different fraud detection research articles from the year 2004 to 2012 based on data mining techniques. This research work used to analyze the different affected business areas which discusses the data mining algorithms by higher fraud coverage. It also highlights the important challenges and limitations involved with the data mining techniques for detecting fraudulent activities.
Authors and Affiliations
Beulah Jeba Jaya Y. , Dr. J. Jebamalar Tamilselvi
A Study on the Effectiveness of Different Patch Size and Shape for Eyes and Mouth Detection
Template matching is one of the simplest methods used for eyes and mouth detection. However, it can be modified and extended to become a powerful tool. Since the patch itself plays a significant role in optimizing detect...
Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis
This paper discuss various opportunistic routing algorithm which is based on broadcast nature of opportunistic network and also provide novel solution of routing which have less data loss. This research work proposed bro...
A Single Hidden Layered Fuzzy Back propagation Algorithm for Joint Radio Resource Management in Radio Access Systems
In this paper, we propose a single hidden layered fuzzy neural algorithm, which is able to provide a better quality of service constraints in a multi-cell scenario with three different radio access technologies (RATs) na...
Ambient Intelligence: The Next Generation Technology
Configuration of the computing and communications systems found at home and in the workplace is a complex system design that currently requires the attention of the user. Recently, researchers have begun to explore compu...
Image Compression Using Fast 2-D DCT Technique
Image Compression is a method, which reduces the size of the data to reduce the amount of space required to store the data. The Discrete cosine transform (DCT) is a method for transforms a signal or image from spatial do...