Credit Card Fraud Detection project in python

Credit Card Fraud Detection Using Double Security Verification in python

 PROJECT ID: PYTHON38

 PROJECT NAME: Credit Card Fraud Detection Using Double Security Verification in python

 PROJECT CATEGORY: MCA / BCA / BCCA / MCM / POLY / ENGINEERING

PROJECT ABSTRACT:

Fraud detection in online shopping systems is the hottest topic nowadays. Fraud investigators, banking systems, and electronic payment systems such as PayPal must have an efficient and complex fraud detection system to prevent fraud activities that change rapidly. According to a CyberSource report from 2017, the present fraud loss by order channel, that is, the percentage of fraud loss in their web store was 74 percent and 49 percent in their mobile channels [1]. Based on this information, the lesson is to determine anomalies across patterns of fraud behavior that have undergone change relative to the past. A good fraud detection system should be able to identify the fraud transaction accurately and should make the detection possible in real- time transactions. Fraud detection can be divided into two groups: anomaly detection and misuse detection [2]. Anomaly detection systems bring normal transaction to be trained and use techniques to determine novel frauds. Conversely, a misuse fraud detection system uses the labeled transaction as normal or fraud transaction to be trained in the database history. So, this misuse detection system entails

SOFTWARE REQUIREMENTS:

OS                                : Windows

Python IDE                  : Python 2.7.x and above

Language                             : Python Programming

Database                             : MYSQL

HARDWARE REQUIREMENTS:

 RAM                :  4GB and Higher

Processor          :  Intel i3 and above

Hard Disk         : 500GB Minimum

Setting up Software Environment

Python is a high level, interpreted, interactive and object-oriented scripting language. Python is designed to be highly readable and has fewer syntactical constructions than other languages. Python is used in the development of this model. In this experiment, the following python libraries are used to develop the machine learning models:

• NLTK: It is a python package which works with human language data and provides an easy-to-use interface to different lexical resources like WordNet and text processing libraries. These lexical resources are used for classification, tokenization, stemming, tagging, parsing, and semantic reasoning.

• Pandas: It is a python package which acts as a data analysis tool and deals with data structures. Pandas carry out entire data analysis workflow in Python without having to switch to a more domain specific language like R.

• Tweepy: It is used in accessing the Twitter API by establishing the connection and to gather tweets from Twitter. This module is used to stream live tweets directly from Twitter in real-time.

• Numpy: NumPy is the fundamental package for computing with Python. It is used to add support to multi-dimensional arrays and matrices, with a large collection of high-level mathematical functions.

• scikit-learn: It is a simple and efficient tool for data mining and data analysis. 

• matplotlib python library which generates plots, histograms, power spectra, bar charts, etc.

In this work matplotlib.pyplot module is used to plot the metrics.

• Gensim It is used to automatically extract semantic topics from documents, as efficiently as possible. Gensim is designed to process raw, unstructured text data. The algorithms in Gensim, such as Word2Vec where it automatically discovers the semantic structure of phrase by examining statistical co-occurrence patterns within a corpus of training documents. These algorithms are unsupervised. Once these statistical patterns are found, any plain text documents can be succinctly expressed in the new, semantic representation and queried for topical similarity against other documents.

• Keras: Keras is a high-level neural networks API, written in Python and capable of running on top of TensorFlow, CNTK, or Theano. It was developed with a focus on enabling fast experimentation. Being able to go from idea to result with the least possible delay is key to doing good research a system of supervised learning and anomaly detection system a system of unsupervised learning. What is the difference between supervised learning and unsupervised learning? The answer is that supervised learning studies labeled datasets. They use labeled datasets to train and to render it accurate by changing the parameters of the learning rate. After that, they apply parameters of learning rate to the dataset, the techniques that implement supervised learning such as multilayerperceptron (MLP) to build the model based on the history of the database. This supervised learning has a disadvantage, since if new fraud transactions happen that do not match with the records of the database, then this transaction will be considered genuine. While, unsupervised learning acquires information from new transactions and finds anomalous patterns from new transaction. This unsupervised learning is more difficult than supervised learning, because we have to use appropriate techniques to detect anomalous behavior.

TABLE OF CONTENTS

·        Title Page      

·        Declaration

·        Certification Page

·        Dedication

·        Acknowledgements

·        Table of Contents

·        List of Tables

·        Abstract

CHAPTER SCHEME

CHAPTER ONE: INTRODUCTION

CHAPTER TWO: OBJECTIVES

CHAPTER THREE: PRELIMINARY SYSTEM ANALYSIS

·         Preliminary Investigation

·         Present System in Use

·         Flaws In Present System

·         Need Of New System

·         Feasibility Study

·         Project  Category

CHAPTER FOUR: SOFTWARE ENGINEERING AND PARADIGM APPLIED   

·         Modules

·         System / Module Chart

CHAPTER FIVE: SOFTWARE AND HARDWARE REQUIREMENT

CHAPTER SIX: DETAIL SYSTEM ANALYSIS

·         Data Flow Diagram

·         Number of modules and Process Logic

·         Data Structures  and Tables

·         Entity- Relationship Diagram

·         System Design

·         Form Design 

·         Source Code

·         Input Screen and Output Screen

CHAPTER SEVEN: TESTING AND VALIDATION CHECK

CHAPTER EIGHT: SYSTEM SECURITY MEASURES

CHAPTER NINE: IMPLEMENTATION, EVALUATION & MAINTENANCE

CHAPTER TEN: FUTURE SCOPE OF THE PROJECT

CHAPTER ELEVEN: SUGGESTION AND CONCLUSION

CHAPTER TWELE: BIBLIOGRAPHY& REFERENCES          

Other Information

PROJECT SOFWARE

ZIP

PROJECT REPORT PAGE

60 -80 Pages

CAN BE USED IN

Marketing (MBA)

PROJECT COST

1500/- Only

PDF SYNOPSIS COST

250/- Only

PPT PROJECT COST

300/- Only

PROJECT WITH SPIRAL BINDING

1750/- Only

PROJECT WITH HARD BINDING

1850/- Only

TOTAL COST

(SYNOPSIS, SOFTCOPY, HARDBOOK, and SOFTWARE, PPT)

2500/- Only

DELIVERY TIME

1 OR 2 Days

(In case Urgent Call: 8830288685)

SUPPORT / QUERY

www.projectsready.in

CALL

8830288685

Email

help@projectsready.in

[Note: We Provide Hard Binding and Spiral Binding only Nagpur Region]

Download

 

 

Comments

Popular posts from this blog

Online Salon & Spa Booking System

Fake Review Identification in php

Clothes Recommendation System project in php