This document presents a machine learning-based system for detecting ATM fraud. It examines current types of ATM fraud and proposes using machine learning algorithms to build a detection system. The study evaluates supervised, unsupervised and semi-supervised machine learning approaches for this task. It specifically explores hidden Markov models, support vector machines and decision trees for fraud detection. The document outlines the methodology, including data collection, model training and testing. Charts and figures show sample outputs from the system, including detected fraud over time. The system is found to effectively detect fraud while minimizing false positives. Machine learning is concluded to be well-suited for ATM fraud detection.
IRJET- Credit Card Fraud Detection using Machine LearningIRJET Journal
This document discusses using machine learning algorithms to detect credit card fraud. It begins with an introduction to machine learning and its applications. A literature review covers previous research using algorithms like AdaBoost, decision trees, random forests, SVM and logistic regression for fraud detection. The proposed system architecture has five layers of control, including security checks, transaction blocking rules, scoring rules, and human investigators. Dimensionality reduction using PCA and classification with SVM are applied to transaction data. Data visualization with heatmaps is also discussed. The document concludes machine learning proves accurate for fraud detection and future work could explore additional algorithms.
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...IRJET Journal
This document presents a comparative study of machine learning models for credit card fraud detection. It discusses various machine learning and deep learning techniques used for credit card fraud detection systems, including neural networks, decision trees, logistic regression, random forests, convolutional neural networks, and more. It reviews related literature on using meta learning and neural networks for fraud detection. The paper aims to compare the performance of these different models for credit card fraud detection using datasets from banks containing labeled fraudulent and non-fraudulent transactions.
Analysis on Fraud Detection Mechanisms Using Machine Learning TechniquesIRJET Journal
1) The document discusses using machine learning techniques like Random Forest Classifier and AdaBoost to detect fraud in blockchain transactions through an ensemble model.
2) It analyzes the individual accuracy of Random Forest and AdaBoost classifiers, finding accuracies over 99.99%, then ensembles their predictions using a stacking method.
3) The stacking ensemble model combines the predictions of the Random Forest and AdaBoost models into a new training set to potentially provide even more accurate fraud detection compared to the individual models.
Click Fraud Detection Of Advertisements using Machine LearningIRJET Journal
This document presents a study on detecting click fraud in online advertisements using machine learning algorithms. The researchers collected data on ad clicks from a large Chinese data platform handling billions of daily clicks, of which 90% are estimated to be fraudulent. They propose using ensemble algorithms like XGBoost and AdaBoost with feature engineering to classify clicks as valid or fraudulent. Several related works applying machine learning for click fraud detection are reviewed. The proposed system architecture involves data preprocessing, model training and testing, and performance evaluation. XGBoost achieved the best performance with 96.2% accuracy for click fraud detection on this dataset.
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET Journal
This document discusses using machine learning algorithms to identify human or bot accounts on Twitter. It describes collecting a dataset from various social media platforms and cleaning the data. Machine learning algorithms like linear regression and Naive Bayes are then applied to classify accounts as human or bot. The proposed system achieves over 90% accuracy compared to existing systems that achieve around 68% accuracy. It provides a real-time method for detecting fake identities on social media platforms.
A Review of deep learning techniques in detection of anomaly incredit card tr...IRJET Journal
This document summarizes a review of deep learning techniques for detecting anomalies in credit card transactions. It discusses how credit card fraud causes major financial losses and how machine learning can help identify fraudulent transactions. The document outlines the objectives of comparing support vector machines and random forests for credit card fraud detection and discusses challenges like class imbalance in the data. It presents the system architecture for credit card fraud detection and analyzes results on a dataset of European credit card transactions, finding random forests outperform decision trees. Future work to improve accuracy is also discussed.
IRJET - Automated Fraud Detection Framework in Examination HallsIRJET Journal
This document proposes an automated fraud detection framework to detect impersonation of candidates and possession of electronic gadgets in examination halls. It uses image processing techniques like face detection and recognition along with machine learning algorithms like Random Forest and Histogram of Oriented Gradients (HoG) for detection, classification and training. The framework is trained on datasets of images collected and labeled for anomalies. It detects impersonation and presence of gadgets during examinations by processing images using HoG and recognizing faces using a pre-trained Random Forest model for high accuracy classification.
IRJET - Fraud Detection in Credit Card using Machine Learning TechniquesIRJET Journal
This document discusses machine learning techniques for detecting credit card fraud. It begins with an abstract that outlines how credit card fraud causes major financial losses and how machine learning can help tackle this issue. It then provides background on credit card fraud and challenges in detecting it. The document describes the methodology used, including collecting transaction data, exploring relationships between features, and training models like random forests, decision trees, and support vector machines to classify transactions as fraudulent or legitimate. It finds these models achieved high accuracy scores between 99.7-99.8% but had low precision. The conclusion states that future work could focus on improving precision and considering additional algorithms and data processing techniques.
IRJET- Credit Card Fraud Detection using Machine LearningIRJET Journal
This document discusses using machine learning algorithms to detect credit card fraud. It begins with an introduction to machine learning and its applications. A literature review covers previous research using algorithms like AdaBoost, decision trees, random forests, SVM and logistic regression for fraud detection. The proposed system architecture has five layers of control, including security checks, transaction blocking rules, scoring rules, and human investigators. Dimensionality reduction using PCA and classification with SVM are applied to transaction data. Data visualization with heatmaps is also discussed. The document concludes machine learning proves accurate for fraud detection and future work could explore additional algorithms.
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...IRJET Journal
This document presents a comparative study of machine learning models for credit card fraud detection. It discusses various machine learning and deep learning techniques used for credit card fraud detection systems, including neural networks, decision trees, logistic regression, random forests, convolutional neural networks, and more. It reviews related literature on using meta learning and neural networks for fraud detection. The paper aims to compare the performance of these different models for credit card fraud detection using datasets from banks containing labeled fraudulent and non-fraudulent transactions.
Analysis on Fraud Detection Mechanisms Using Machine Learning TechniquesIRJET Journal
1) The document discusses using machine learning techniques like Random Forest Classifier and AdaBoost to detect fraud in blockchain transactions through an ensemble model.
2) It analyzes the individual accuracy of Random Forest and AdaBoost classifiers, finding accuracies over 99.99%, then ensembles their predictions using a stacking method.
3) The stacking ensemble model combines the predictions of the Random Forest and AdaBoost models into a new training set to potentially provide even more accurate fraud detection compared to the individual models.
Click Fraud Detection Of Advertisements using Machine LearningIRJET Journal
This document presents a study on detecting click fraud in online advertisements using machine learning algorithms. The researchers collected data on ad clicks from a large Chinese data platform handling billions of daily clicks, of which 90% are estimated to be fraudulent. They propose using ensemble algorithms like XGBoost and AdaBoost with feature engineering to classify clicks as valid or fraudulent. Several related works applying machine learning for click fraud detection are reviewed. The proposed system architecture involves data preprocessing, model training and testing, and performance evaluation. XGBoost achieved the best performance with 96.2% accuracy for click fraud detection on this dataset.
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET Journal
This document discusses using machine learning algorithms to identify human or bot accounts on Twitter. It describes collecting a dataset from various social media platforms and cleaning the data. Machine learning algorithms like linear regression and Naive Bayes are then applied to classify accounts as human or bot. The proposed system achieves over 90% accuracy compared to existing systems that achieve around 68% accuracy. It provides a real-time method for detecting fake identities on social media platforms.
A Review of deep learning techniques in detection of anomaly incredit card tr...IRJET Journal
This document summarizes a review of deep learning techniques for detecting anomalies in credit card transactions. It discusses how credit card fraud causes major financial losses and how machine learning can help identify fraudulent transactions. The document outlines the objectives of comparing support vector machines and random forests for credit card fraud detection and discusses challenges like class imbalance in the data. It presents the system architecture for credit card fraud detection and analyzes results on a dataset of European credit card transactions, finding random forests outperform decision trees. Future work to improve accuracy is also discussed.
IRJET - Automated Fraud Detection Framework in Examination HallsIRJET Journal
This document proposes an automated fraud detection framework to detect impersonation of candidates and possession of electronic gadgets in examination halls. It uses image processing techniques like face detection and recognition along with machine learning algorithms like Random Forest and Histogram of Oriented Gradients (HoG) for detection, classification and training. The framework is trained on datasets of images collected and labeled for anomalies. It detects impersonation and presence of gadgets during examinations by processing images using HoG and recognizing faces using a pre-trained Random Forest model for high accuracy classification.
IRJET - Fraud Detection in Credit Card using Machine Learning TechniquesIRJET Journal
This document discusses machine learning techniques for detecting credit card fraud. It begins with an abstract that outlines how credit card fraud causes major financial losses and how machine learning can help tackle this issue. It then provides background on credit card fraud and challenges in detecting it. The document describes the methodology used, including collecting transaction data, exploring relationships between features, and training models like random forests, decision trees, and support vector machines to classify transactions as fraudulent or legitimate. It finds these models achieved high accuracy scores between 99.7-99.8% but had low precision. The conclusion states that future work could focus on improving precision and considering additional algorithms and data processing techniques.
This document summarizes a research paper that aims to predict taxes using machine learning. It discusses using feature extraction and random forest algorithms on tax data to classify taxpayers and detect potential fraud. The methodology extracts numerical features from text data, uses random forest classification, and decision trees to predict future tax amounts owed. It finds this machine learning approach outperforms traditional statistical methods for tax prediction and fraud detection, helping improve tax compliance and design.
IRJET- Survey on Credit Card Fraud DetectionIRJET Journal
This document discusses various techniques for credit card fraud detection. It begins with an introduction to fraud detection and challenges in detecting credit card fraud. It then summarizes 6 research papers on different fraud detection techniques, including cost-sensitive decision trees, hidden Markov models, self-organizing maps, cortical learning algorithms, a fusion approach using Dempster-Shafer theory and Bayesian learning, and modified Fisher discriminant analysis. The document concludes that while various machine learning techniques have been applied to fraud detection, loss from credit card fraud continues to increase due to evolving fraud tactics, and improved dynamic systems are still needed.
This document proposes an "Anti-Fraud ATM Security System" that provides additional security layers to existing ATM systems. It summarizes the key modules of the proposed system: 1) User registration, 2) PIN verification that holds transactions until user confirmation, 3) Sending an SMS for transaction approval, 4) Activating the camera for facial recognition, 5) Tracing the ATM location if facial recognition fails, and 6) Permitting the transaction if a registered user approves. The system aims to prevent fraud, theft and provide second-level security for ATM transactions through user verification by SMS, facial recognition, and location tracking if needed. It was developed using C#.net, with a GUI created in
IRJET - House Price Prediction using Machine Learning and RPAIRJET Journal
This document discusses using machine learning and robotic process automation (RPA) to predict house prices. Specifically, it proposes using the CatBoost algorithm and RPA to extract real-time data for house price prediction. RPA involves using software robots to automate data extraction, while CatBoost will be used to predict prices based on the extracted dataset. The system aims to reduce problems faced by customers by providing more accurate price predictions compared to relying solely on real estate agents. It will extract data using RPA, clean the data, then apply machine learning algorithms like CatBoost to predict house prices based on various attributes.
IRJET - Automated Water Meter: Prediction of Bill for Water ConservationIRJET Journal
The document summarizes an approach for automated water meters that can help conserve water resources. It discusses how traditional manual water metering systems are labor intensive and prone to errors. Automated water meters using technologies like IoT and machine learning can help manage water resources more efficiently while reducing human intervention. The document then reviews different techniques proposed in previous research for implementing automated water metering systems, including using electronic interface modules, open source systems, convolutional neural networks for digit recognition, and systems that integrate meter reading, leakage detection, data processing and billing units.
Machine Learning Approaches to Predict Customer Churn in Telecommunications I...IRJET Journal
This project aimed to develop machine learning models to predict customer churn in the telecommunications industry. Four algorithms were evaluated - logistic regression, support vector machine, decision tree, and random forest. Logistic regression performed best with an accuracy of 79.25% and AUC score of 84.08%. The models analyzed customer attribute data to identify patterns and predict churn, helping telecom companies understand churn reasons and develop retention strategies. The results provide insights to improve customer experience and reduce costly customer churn.
INTELLIGENT ALGORYTHM FOR IMMEDIATE FINANCIAL STRATEGY FOR SMESijscai
In this work is discussed a scientific methodology concerning an intelligent algorithm oriented on financial
strategy for SMEs. The paper follows the research guidelines of ‘Frascati’ manual about knowledge gain
by innovative algorithms. Specifically has been applied a Support Vector Machine (SVM) algorithms
predicting financial score of Small and Medium Enterprises –SMEs-. For the output results has been
executed a Rapid Miner workflow. The used approach represents a methodology to follow in order to
improve a research project about financial technologies.
In this work is discussed a scientific methodology concerning an intelligent algorithm oriented on financial
strategy for SMEs. The paper follows the research guidelines of ‘Frascati’ manual about knowledge gain
by innovative algorithms. Specifically has been applied a Support Vector Machine (SVM) algorithms
predicting financial score of Small and Medium Enterprises –SMEs-. For the output results has been
executed a Rapid Miner workflow. The used approach represents a methodology to follow in order to
improve a research project about financial technologies
INTELLIGENT ALGORYTHM FOR IMMEDIATE FINANCIAL STRATEGY FOR SMESijscai
This document summarizes an intelligent algorithm developed to predict financial risk for small and medium enterprises (SMEs). The algorithm uses a support vector machine (SVM) model trained on SME financial data to predict the risk of credit default. A RapidMiner workflow was created to automatically load data, train the SVM model, optimize model parameters, apply the model to predict risks, and analyze results. The SVM model analyzed financial attributes of SMEs and predicted risks with 95.64% accuracy based on the confusion matrix and ROC curve results. The workflow provides a methodology for using machine learning to analyze SME financial data and predict risks to help inform immediate financial strategies.
IRJET- Credit Card Fraud Detection : A Comparison using Random Forest, SVM an...IRJET Journal
This document compares three machine learning algorithms - Random Forest, Support Vector Machine (SVM), and Artificial Neural Network (ANN) - for the task of credit card fraud detection. It finds that Random Forest has higher accuracy than SVM but lower accuracy than ANN. The key aspects covered are:
1) Each algorithm is trained on historical transaction data to learn normal vs. fraudulent patterns.
2) Random Forest, SVM, and ANN are described in terms of their basic approaches, advantages, disadvantages and code for training a model.
3) Testing finds that ANN has the highest accuracy for credit card fraud detection, so it would be the best algorithm to use from those studied.
Diabetes Disease Prediction Using Machine Learning AlgorithmsIRJET Journal
This document discusses using machine learning algorithms to predict diabetes. Specifically, it used the Random Forest Classifier algorithm on the Pima Indian Diabetes Dataset and achieved a prediction accuracy of 90.3%. It provides background on diabetes, machine learning, and supervised learning. Random Forest is a supervised learning algorithm that was trained on the dataset and tested to predict diabetes in new cases. The findings may help health professionals and researchers involved in diabetes prediction and research.
In Banking Loan Approval Prediction Using Machine LearningIRJET Journal
This document discusses using machine learning algorithms to predict loan approvals. It analyzes loan data using decision trees, logistic regression, and random forest algorithms. The random forest algorithm achieved the highest accuracy rate of 88.53% compared to 85% for decision trees and 83.04% for logistic regression. Therefore, the random forest algorithm is concluded to be best for loan approval prediction. Future work could involve applying these algorithms to other loan data sets and exploring additional machine learning methods.
IRJET - Automated Attendance System using Facial RecognitionIRJET Journal
This document describes an automated attendance system using facial recognition. The system uses the Haar-cascade algorithm with three classifiers (skin, mouth, eyes) implemented in Python's OpenCV library. It also uses PCA to maintain accuracy in facial detection. The system marks employee attendance in real-time by capturing images of employees entering and exiting through gates, without requiring employees to sign papers, use RFID cards, or biometrics. This makes the system more efficient than conventional methods. It provides accurate attendance records to help with performance monitoring and payroll processing.
IRJET - Customer Churn Analysis in Telecom IndustryIRJET Journal
This document discusses using machine learning techniques like logistic regression to analyze customer data and predict customer churn in the telecom industry. It proposes a system to build a churn prediction model using logistic regression on historical customer data to identify high-risk customers. The system would have options to view results, perform training and testing on new data, and analyze performance. It would also include a recommender system to recommend suitable plans for identified churn customers based on their usage patterns. The results show the model can predict churn with 80% accuracy and identify similar customers who may also churn.
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCEIRJET Journal
This document discusses using machine learning techniques to predict ransomware attacks. It begins by providing background on ransomware, data science, and machine learning. It then describes building a model using various machine learning algorithms like logistic regression, random forest, H-LICKS, and voting classifier on preprocessed ransomware data. The random forest algorithm achieved the highest accuracy of 90.5%. The model can classify six types of ransomware attacks with 97% accuracy, which is 3x faster than other models. This accurate and fast ransomware prediction model could help organizations detect and prevent attacks. Overall, applying advanced machine learning represents progress in combating the growing threat of ransomware.
A Comparative Study on Credit Card Fraud DetectionIRJET Journal
This document summarizes a study that compares the performance of multiple classification algorithms for detecting credit card fraud. The study uses a dataset of over 284,000 credit card transactions from European consumers. Various sampling techniques are applied to address the skewed nature of the data. Classification algorithms like random forest, logistic regression, and k-NN are evaluated based on metrics like accuracy, sensitivity, specificity, and precision. The results suggest that k-NN performs best in detecting credit card fraud from this imbalanced transaction dataset. The document also briefly reviews several other related studies on credit card fraud detection techniques.
The document describes an E-Gatepass system that was developed to simplify the process of issuing gate passes and reduce paperwork. The system uses a Model-View-Controller architecture and SQL Server database. It allows administrators to monitor users, faculty to approve student gatepass applications, and displays approved applications to guards. The system aims to automate the existing manual gatepass process. It was developed using Java, Spring Tool Suite and can be accessed on Windows devices by various user types like students, faculty and guards.
IRJET- Improvising Reliability of Autonomous Car using Risk DetectionIRJET Journal
This document describes a system to improve the reliability of autonomous vehicles by detecting risks associated with driver fatigue, distraction, or medical emergencies. The system uses a microcontroller and various modules like a camera to monitor the driver for conditions like fatigue. If detected, the system switches the vehicle from manual to autonomous mode and alerts caretakers. It implements algorithms using OpenCV and Dlib to analyze camera frames and detect drowsiness based on eye aspect ratio. Messages are sent to caretakers using the Twilio API. The system was able to successfully detect drowsiness and switch the vehicle to autonomous mode as well as send alerts.
The document discusses detecting automobile insurance claim fraud using machine learning techniques. It proposes using the ADASYN sampling technique to balance the dataset and then using a Random Forest classifier to classify insurance claims as fraudulent or genuine.
The literature review summarizes previous works that used techniques like SMOTE and Random Forest, and found Random Forest performed best. It also discusses papers that tested other classifiers like SVM and found ADASYN worked better than SMOTE for balancing data.
The proposed system would collect past claim data, balance it using ADASYN, split the data for training and testing a Random Forest model. The trained model could then classify new claims as fraudulent or not. This approach aims to more accurately detect fraud compared to traditional
The document discusses using data mining techniques to analyze crime data and predict crime trends. It describes collecting crime reports from various sources to create a database. Machine learning algorithms would then be applied to the crime data to discover patterns and relationships between different crimes. This analysis could help police identify crime hotspots and determine if a crime was committed in a known location. The proposed system aims to forecast crimes and trends based on past crime data, date and location to help prevent crimes. It discusses implementing the system using Python and testing it with sample input data.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
More Related Content
Similar to ATM fraud detection system using machine learning algorithms
This document summarizes a research paper that aims to predict taxes using machine learning. It discusses using feature extraction and random forest algorithms on tax data to classify taxpayers and detect potential fraud. The methodology extracts numerical features from text data, uses random forest classification, and decision trees to predict future tax amounts owed. It finds this machine learning approach outperforms traditional statistical methods for tax prediction and fraud detection, helping improve tax compliance and design.
IRJET- Survey on Credit Card Fraud DetectionIRJET Journal
This document discusses various techniques for credit card fraud detection. It begins with an introduction to fraud detection and challenges in detecting credit card fraud. It then summarizes 6 research papers on different fraud detection techniques, including cost-sensitive decision trees, hidden Markov models, self-organizing maps, cortical learning algorithms, a fusion approach using Dempster-Shafer theory and Bayesian learning, and modified Fisher discriminant analysis. The document concludes that while various machine learning techniques have been applied to fraud detection, loss from credit card fraud continues to increase due to evolving fraud tactics, and improved dynamic systems are still needed.
This document proposes an "Anti-Fraud ATM Security System" that provides additional security layers to existing ATM systems. It summarizes the key modules of the proposed system: 1) User registration, 2) PIN verification that holds transactions until user confirmation, 3) Sending an SMS for transaction approval, 4) Activating the camera for facial recognition, 5) Tracing the ATM location if facial recognition fails, and 6) Permitting the transaction if a registered user approves. The system aims to prevent fraud, theft and provide second-level security for ATM transactions through user verification by SMS, facial recognition, and location tracking if needed. It was developed using C#.net, with a GUI created in
IRJET - House Price Prediction using Machine Learning and RPAIRJET Journal
This document discusses using machine learning and robotic process automation (RPA) to predict house prices. Specifically, it proposes using the CatBoost algorithm and RPA to extract real-time data for house price prediction. RPA involves using software robots to automate data extraction, while CatBoost will be used to predict prices based on the extracted dataset. The system aims to reduce problems faced by customers by providing more accurate price predictions compared to relying solely on real estate agents. It will extract data using RPA, clean the data, then apply machine learning algorithms like CatBoost to predict house prices based on various attributes.
IRJET - Automated Water Meter: Prediction of Bill for Water ConservationIRJET Journal
The document summarizes an approach for automated water meters that can help conserve water resources. It discusses how traditional manual water metering systems are labor intensive and prone to errors. Automated water meters using technologies like IoT and machine learning can help manage water resources more efficiently while reducing human intervention. The document then reviews different techniques proposed in previous research for implementing automated water metering systems, including using electronic interface modules, open source systems, convolutional neural networks for digit recognition, and systems that integrate meter reading, leakage detection, data processing and billing units.
Machine Learning Approaches to Predict Customer Churn in Telecommunications I...IRJET Journal
This project aimed to develop machine learning models to predict customer churn in the telecommunications industry. Four algorithms were evaluated - logistic regression, support vector machine, decision tree, and random forest. Logistic regression performed best with an accuracy of 79.25% and AUC score of 84.08%. The models analyzed customer attribute data to identify patterns and predict churn, helping telecom companies understand churn reasons and develop retention strategies. The results provide insights to improve customer experience and reduce costly customer churn.
INTELLIGENT ALGORYTHM FOR IMMEDIATE FINANCIAL STRATEGY FOR SMESijscai
In this work is discussed a scientific methodology concerning an intelligent algorithm oriented on financial
strategy for SMEs. The paper follows the research guidelines of ‘Frascati’ manual about knowledge gain
by innovative algorithms. Specifically has been applied a Support Vector Machine (SVM) algorithms
predicting financial score of Small and Medium Enterprises –SMEs-. For the output results has been
executed a Rapid Miner workflow. The used approach represents a methodology to follow in order to
improve a research project about financial technologies.
In this work is discussed a scientific methodology concerning an intelligent algorithm oriented on financial
strategy for SMEs. The paper follows the research guidelines of ‘Frascati’ manual about knowledge gain
by innovative algorithms. Specifically has been applied a Support Vector Machine (SVM) algorithms
predicting financial score of Small and Medium Enterprises –SMEs-. For the output results has been
executed a Rapid Miner workflow. The used approach represents a methodology to follow in order to
improve a research project about financial technologies
INTELLIGENT ALGORYTHM FOR IMMEDIATE FINANCIAL STRATEGY FOR SMESijscai
This document summarizes an intelligent algorithm developed to predict financial risk for small and medium enterprises (SMEs). The algorithm uses a support vector machine (SVM) model trained on SME financial data to predict the risk of credit default. A RapidMiner workflow was created to automatically load data, train the SVM model, optimize model parameters, apply the model to predict risks, and analyze results. The SVM model analyzed financial attributes of SMEs and predicted risks with 95.64% accuracy based on the confusion matrix and ROC curve results. The workflow provides a methodology for using machine learning to analyze SME financial data and predict risks to help inform immediate financial strategies.
IRJET- Credit Card Fraud Detection : A Comparison using Random Forest, SVM an...IRJET Journal
This document compares three machine learning algorithms - Random Forest, Support Vector Machine (SVM), and Artificial Neural Network (ANN) - for the task of credit card fraud detection. It finds that Random Forest has higher accuracy than SVM but lower accuracy than ANN. The key aspects covered are:
1) Each algorithm is trained on historical transaction data to learn normal vs. fraudulent patterns.
2) Random Forest, SVM, and ANN are described in terms of their basic approaches, advantages, disadvantages and code for training a model.
3) Testing finds that ANN has the highest accuracy for credit card fraud detection, so it would be the best algorithm to use from those studied.
Diabetes Disease Prediction Using Machine Learning AlgorithmsIRJET Journal
This document discusses using machine learning algorithms to predict diabetes. Specifically, it used the Random Forest Classifier algorithm on the Pima Indian Diabetes Dataset and achieved a prediction accuracy of 90.3%. It provides background on diabetes, machine learning, and supervised learning. Random Forest is a supervised learning algorithm that was trained on the dataset and tested to predict diabetes in new cases. The findings may help health professionals and researchers involved in diabetes prediction and research.
In Banking Loan Approval Prediction Using Machine LearningIRJET Journal
This document discusses using machine learning algorithms to predict loan approvals. It analyzes loan data using decision trees, logistic regression, and random forest algorithms. The random forest algorithm achieved the highest accuracy rate of 88.53% compared to 85% for decision trees and 83.04% for logistic regression. Therefore, the random forest algorithm is concluded to be best for loan approval prediction. Future work could involve applying these algorithms to other loan data sets and exploring additional machine learning methods.
IRJET - Automated Attendance System using Facial RecognitionIRJET Journal
This document describes an automated attendance system using facial recognition. The system uses the Haar-cascade algorithm with three classifiers (skin, mouth, eyes) implemented in Python's OpenCV library. It also uses PCA to maintain accuracy in facial detection. The system marks employee attendance in real-time by capturing images of employees entering and exiting through gates, without requiring employees to sign papers, use RFID cards, or biometrics. This makes the system more efficient than conventional methods. It provides accurate attendance records to help with performance monitoring and payroll processing.
IRJET - Customer Churn Analysis in Telecom IndustryIRJET Journal
This document discusses using machine learning techniques like logistic regression to analyze customer data and predict customer churn in the telecom industry. It proposes a system to build a churn prediction model using logistic regression on historical customer data to identify high-risk customers. The system would have options to view results, perform training and testing on new data, and analyze performance. It would also include a recommender system to recommend suitable plans for identified churn customers based on their usage patterns. The results show the model can predict churn with 80% accuracy and identify similar customers who may also churn.
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCEIRJET Journal
This document discusses using machine learning techniques to predict ransomware attacks. It begins by providing background on ransomware, data science, and machine learning. It then describes building a model using various machine learning algorithms like logistic regression, random forest, H-LICKS, and voting classifier on preprocessed ransomware data. The random forest algorithm achieved the highest accuracy of 90.5%. The model can classify six types of ransomware attacks with 97% accuracy, which is 3x faster than other models. This accurate and fast ransomware prediction model could help organizations detect and prevent attacks. Overall, applying advanced machine learning represents progress in combating the growing threat of ransomware.
A Comparative Study on Credit Card Fraud DetectionIRJET Journal
This document summarizes a study that compares the performance of multiple classification algorithms for detecting credit card fraud. The study uses a dataset of over 284,000 credit card transactions from European consumers. Various sampling techniques are applied to address the skewed nature of the data. Classification algorithms like random forest, logistic regression, and k-NN are evaluated based on metrics like accuracy, sensitivity, specificity, and precision. The results suggest that k-NN performs best in detecting credit card fraud from this imbalanced transaction dataset. The document also briefly reviews several other related studies on credit card fraud detection techniques.
The document describes an E-Gatepass system that was developed to simplify the process of issuing gate passes and reduce paperwork. The system uses a Model-View-Controller architecture and SQL Server database. It allows administrators to monitor users, faculty to approve student gatepass applications, and displays approved applications to guards. The system aims to automate the existing manual gatepass process. It was developed using Java, Spring Tool Suite and can be accessed on Windows devices by various user types like students, faculty and guards.
IRJET- Improvising Reliability of Autonomous Car using Risk DetectionIRJET Journal
This document describes a system to improve the reliability of autonomous vehicles by detecting risks associated with driver fatigue, distraction, or medical emergencies. The system uses a microcontroller and various modules like a camera to monitor the driver for conditions like fatigue. If detected, the system switches the vehicle from manual to autonomous mode and alerts caretakers. It implements algorithms using OpenCV and Dlib to analyze camera frames and detect drowsiness based on eye aspect ratio. Messages are sent to caretakers using the Twilio API. The system was able to successfully detect drowsiness and switch the vehicle to autonomous mode as well as send alerts.
The document discusses detecting automobile insurance claim fraud using machine learning techniques. It proposes using the ADASYN sampling technique to balance the dataset and then using a Random Forest classifier to classify insurance claims as fraudulent or genuine.
The literature review summarizes previous works that used techniques like SMOTE and Random Forest, and found Random Forest performed best. It also discusses papers that tested other classifiers like SVM and found ADASYN worked better than SMOTE for balancing data.
The proposed system would collect past claim data, balance it using ADASYN, split the data for training and testing a Random Forest model. The trained model could then classify new claims as fraudulent or not. This approach aims to more accurately detect fraud compared to traditional
The document discusses using data mining techniques to analyze crime data and predict crime trends. It describes collecting crime reports from various sources to create a database. Machine learning algorithms would then be applied to the crime data to discover patterns and relationships between different crimes. This analysis could help police identify crime hotspots and determine if a crime was committed in a known location. The proposed system aims to forecast crimes and trends based on past crime data, date and location to help prevent crimes. It discusses implementing the system using Python and testing it with sample input data.
Similar to ATM fraud detection system using machine learning algorithms (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Covid Management System Project Report.pdfKamal Acharya
CoVID-19 sprang up in Wuhan China in November 2019 and was declared a pandemic by the in January 2020 World Health Organization (WHO). Like the Spanish flu of 1918 that claimed millions of lives, the COVID-19 has caused the demise of thousands with China, Italy, Spain, USA and India having the highest statistics on infection and mortality rates. Regardless of existing sophisticated technologies and medical science, the spread has continued to surge high. With this COVID-19 Management System, organizations can respond virtually to the COVID-19 pandemic and protect, educate and care for citizens in the community in a quick and effective manner. This comprehensive solution not only helps in containing the virus but also proactively empowers both citizens and care providers to minimize the spread of the virus through targeted strategies and education.
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfBalvir Singh
Sri Guru Hargobind Ji (19 June 1595 - 3 March 1644) is revered as the Sixth Nanak.
• On 25 May 1606 Guru Arjan nominated his son Sri Hargobind Ji as his successor. Shortly
afterwards, Guru Arjan was arrested, tortured and killed by order of the Mogul Emperor
Jahangir.
• Guru Hargobind's succession ceremony took place on 24 June 1606. He was barely
eleven years old when he became 6th Guru.
• As ordered by Guru Arjan Dev Ji, he put on two swords, one indicated his spiritual
authority (PIRI) and the other, his temporal authority (MIRI). He thus for the first time
initiated military tradition in the Sikh faith to resist religious persecution, protect
people’s freedom and independence to practice religion by choice. He transformed
Sikhs to be Saints and Soldier.
• He had a long tenure as Guru, lasting 37 years, 9 months and 3 days
Data Communication and Computer Networks Management System Project Report.pdfKamal Acharya
Networking is a telecommunications network that allows computers to exchange data. In
computer networks, networked computing devices pass data to each other along data
connections. Data is transferred in the form of packets. The connections between nodes are
established using either cable media or wireless media.
We have designed & manufacture the Lubi Valves LBF series type of Butterfly Valves for General Utility Water applications as well as for HVAC applications.