Credit Card Fraud Detection System project
Credit Card Fraud Detection Using Hidden Markov Model System ASP.Net Project
PROJECT ABSTRACT:
Credit card fraud detection using hidden markov model project is 2008 project which is implemented in visual studio asp.net platform. This project is useful for researches for solving problems that are caused from credit card frauds. In this paper we propose a method which is taken from sequences of hidden markov model and proposes a system which can handle credit card fraud detection.
As the usage of internet is growing and new payment methods are increasing in offline and online. Away from web there are many places where usage of credit card had increased at the same time survey shows frauds in this field are also increasing at same rate. Many researches are working on new models for solving this problem. This project is part of that research which will take part in solving this problem.
Advantages
1. The identification of the extortion utilization of the card is discovered substantially speedier that the current framework.
2. If there should arise an occurrence of the current framework even the first card holder is additionally checked for misrepresentation discovery. Yet, in this framework no compelling reason to check the first client as we keep up a log.
3. The log which is kept up will likewise be a proof for the bank for the exchange made.
4. We can locate the most precise discovery utilizing this procedure.
5. This diminish the dreary work of a representative in the bank
APPLICATIONS:
1. Discourse acknowledgment Applications
2. Bioinformatics Applications
3. Genomics Applications
MODULES
1. New card
2. Login
3. Security data
4. Exchange
5. Confirmation
MODULE DESCRIPTION
1. New card
In this module, the client gives there data to enlist another card. The data is about their contact subtle elements. They can make their own particular login and secret key for their future utilization of the card.
2. Login
In Login Form module presents site guests with a shape with username and watchword fields. On the off chance that the client enters a legitimate username/secret key mix they will be allowed access to extra assets on site. Which extra assets they will approach can be arranged independently.
3. Security data
In Security data module it will get the data detail and its store’s in database. On the off chance that the card lost then the Security data module frame emerge. It has an arrangement of question where the client needs to answer the effectively to move to the exchange area.
It contain instructive protection and enlightening self-assurance are tended to decisively by the creation bearing people and elements a put stock in intends to client, secure, pursuit, process, and trade individual as well as private data.
4. Exchange
The technique and mechanical assembly for pre-approving exchanges incorporates giving a specialized gadget to a seller and a charge card proprietor. The Mastercard proprietor starts a Mastercard exchange by conveying to a charge card number, and putting away in that, a recognizing snippet of data that describes a particular exchange to be made by an approved client of the Mastercard at a later time.
The data is acknowledged as “organize information” in the information base just if a right individual recognizable proof code (PIC) is utilized with the correspondence. The “system information” will serve to later approve that particular exchange. The charge card proprietor or other approved client would then be able to just influence that particular exchange with the credit to card. Since the exchange is pre-approved, the seller does not have to see or transmit a PIC.
5.Verification
Check data is furnished concerning an exchange between a starting gathering and a confirmation looking for party, the check data being given by a third, checking party, in view of classified data in the ownership of the starting party. In check the procedure will looks for card number and if the card number is right the pertinent procedure will be executed. On the off chance that the number isn’t right, mail will be sent to the client saying the card no has been square and he can’t do the further exchange.
SOFTWARE REQUIREMENTS:
FRONT END: ASP.NET
Technologies: C#,
DATABASE: SQL Server,
IIS
Operating System:
Windows XP/7/8/10
HARDWARE REQUIREMENTS:
Processor: Intel
Pentium based system
Processor speed:
250 MHz to 833MHz
RAM SPEED: 1GB
TABLE OF CONTENTS
·
Title
Page
·
Declaration
·
Certification
Page
·
Dedication
·
Acknowledgements
·
Table of
Contents
·
List of
Tables
· Abstract
CHAPTER SCHEME
CHAPTER ONE: INTRODUCTION
CHAPTER TWO: OBJECTIVES
CHAPTER THREE: PRELIMINARY SYSTEM ANALYSIS
·
Preliminary Investigation
·
Present System in Use
·
Flaws In Present System
·
Need Of New System
·
Feasibility Study
·
Project
Category
CHAPTER FOUR: SOFTWARE ENGINEERING AND PARADIGM APPLIED
·
Modules
·
System / Module Chart
CHAPTER FIVE: SOFTWARE
AND HARDWARE REQUIREMENT
CHAPTER SIX: DETAIL
SYSTEM ANALYSIS
·
Data Flow Diagram
·
Number of modules and Process Logic
·
Data Structures and Tables
·
Entity- Relationship Diagram
·
System Design
·
Form Design
·
Source Code
·
Input Screen and Output Screen
CHAPTER SEVEN: TESTING AND VALIDATION CHECK
CHAPTER EIGHT:
SYSTEM SECURITY MEASURES
CHAPTER NINE:
IMPLEMENTATION, EVALUATION &
MAINTENANCE
CHAPTER TEN:
FUTURE SCOPE OF THE PROJECT
CHAPTER ELEVEN: SUGGESTION AND CONCLUSION
CHAPTER TWELE: BIBLIOGRAPHY& REFERENCES
Other Information
PROJECT
SOFWARE |
ZIP |
PROJECT REPORT PAGE |
60
-80 Pages |
CAN BE USED IN |
Marketing
(MBA) |
PROJECT COST |
1500/-
Only |
PDF SYNOPSIS COST |
250/-
Only |
PPT PROJECT COST |
300/-
Only |
PROJECT WITH SPIRAL BINDING |
1750/-
Only |
PROJECT WITH HARD BINDING |
1850/-
Only |
TOTAL
COST (SYNOPSIS, SOFTCOPY, HARDBOOK, and SOFTWARE, PPT) |
2500/-
Only |
DELIVERY TIME |
1
OR 2 Days (In
case Urgent Call: 8830288685) |
SUPPORT / QUERY |
|
CALL |
8830288685 |
|
help@projectsready.in |
[Note:
We Provide Hard Binding and Spiral Binding only Nagpur Region] |
Comments
Post a Comment
If you have any doubt let me know