SlideShare a Scribd company logo
1 of 2
The topic i have selected:
Abstract:
I will be going with the subject "Fraud detection using Data
Mining" Fraud affirmation is an approach to manage shield
others from being attacked by designers or to get secure from
the cash desperado and cheats with the assistance of
progression. Information Mining (DM) blueprint systems in
recognizing firms that issue fraudulent financial statements
(FFS) and manages the obvious affirmation of parts related to
FFS. This evaluation explores the settlement of Decision Trees,
Neural Networks, and Bayesian Belief Networks in the
prominent proof of sham spending summaries. The information
vector is made out of degrees got from budgetary outlines.
Introduction:
Data uncovering is looking for secured, significant, and
possibly supportive models in huge enlightening lists. Data
Mining is connected to finding unsuspected/already dark
associations among the data.
It is a multi-disciplinary fitness that usages AI, estimations, AI,
and database advancement.
Types of data mining
Relational database
Data warehouse
Text mining data mining
Distributed database
Operational database
End-user database
Kirkos, E., Spathis, C., & Manolopoulos, Y. (2007). Data
mining techniques for the detection of fraudulent financial
statements. Expert systems with applications, 32(4), 995-1003

More Related Content

Similar to The topic i have selectedAbstractI will be going with the .docx

A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGCarrie Romero
 
Big Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and IssuesBig Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and IssuesKaran Deep Singh
 
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfKIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfDr. Radhey Shyam
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleDr. Radhey Shyam
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data miningDatamining Tools
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data miningDataminingTools Inc
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 
Data minig with Big data analysis
Data minig with Big data analysisData minig with Big data analysis
Data minig with Big data analysisPoonam Kshirsagar
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docxharrisonhoward80223
 
Datamining
DataminingDatamining
Dataminingsumit621
 
1 Introduction to-data-mining lecture
1   Introduction to-data-mining lecture1   Introduction to-data-mining lecture
1 Introduction to-data-mining lectureMahmoud Alfarra
 
A Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data MiningA Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data MiningBRNSSPublicationHubI
 
Big Data for Media Development
Big Data for Media DevelopmentBig Data for Media Development
Big Data for Media DevelopmentAnahi Iacucci
 
Machine Learning, Data Mining, and
Machine Learning, Data Mining, and Machine Learning, Data Mining, and
Machine Learning, Data Mining, and butest
 
Data miningppt378
Data miningppt378Data miningppt378
Data miningppt378nitttin
 
Overview of Data Mining
Overview of Data MiningOverview of Data Mining
Overview of Data Miningijtsrd
 
Evidence Based Healthcare Design
Evidence Based Healthcare DesignEvidence Based Healthcare Design
Evidence Based Healthcare DesignCarmen Martin
 

Similar to The topic i have selectedAbstractI will be going with the .docx (20)

A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMINING
 
Big Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and IssuesBig Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and Issues
 
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfKIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycle
 
2 Data-mining process
2   Data-mining process2   Data-mining process
2 Data-mining process
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Data minig with Big data analysis
Data minig with Big data analysisData minig with Big data analysis
Data minig with Big data analysis
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docx
 
Datamining
DataminingDatamining
Datamining
 
Data Mining
Data MiningData Mining
Data Mining
 
1 Introduction to-data-mining lecture
1   Introduction to-data-mining lecture1   Introduction to-data-mining lecture
1 Introduction to-data-mining lecture
 
A Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data MiningA Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data Mining
 
C3602021025
C3602021025C3602021025
C3602021025
 
Big Data for Media Development
Big Data for Media DevelopmentBig Data for Media Development
Big Data for Media Development
 
Machine Learning, Data Mining, and
Machine Learning, Data Mining, and Machine Learning, Data Mining, and
Machine Learning, Data Mining, and
 
Data miningppt378
Data miningppt378Data miningppt378
Data miningppt378
 
Overview of Data Mining
Overview of Data MiningOverview of Data Mining
Overview of Data Mining
 
Evidence Based Healthcare Design
Evidence Based Healthcare DesignEvidence Based Healthcare Design
Evidence Based Healthcare Design
 

More from gloriab9

The thought that the continents had coastlines that looked like they.docx
The thought that the continents had coastlines that looked like they.docxThe thought that the continents had coastlines that looked like they.docx
The thought that the continents had coastlines that looked like they.docxgloriab9
 
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docxThe Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docxgloriab9
 
The thesis statement is often (but not always) the l.docx
The thesis statement is often (but not always) the l.docxThe thesis statement is often (but not always) the l.docx
The thesis statement is often (but not always) the l.docxgloriab9
 
The Theory of the Leisure Class summary (1page 250~300words)you .docx
The Theory of the Leisure Class summary (1page 250~300words)you .docxThe Theory of the Leisure Class summary (1page 250~300words)you .docx
The Theory of the Leisure Class summary (1page 250~300words)you .docxgloriab9
 
The theory is  Parent Child Interaction Model( Barnard)Describe .docx
The theory is  Parent Child Interaction Model( Barnard)Describe .docxThe theory is  Parent Child Interaction Model( Barnard)Describe .docx
The theory is  Parent Child Interaction Model( Barnard)Describe .docxgloriab9
 
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docxThe Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docxgloriab9
 
The textbook’s authors presented three different characterizatio.docx
The textbook’s authors presented three different characterizatio.docxThe textbook’s authors presented three different characterizatio.docx
The textbook’s authors presented three different characterizatio.docxgloriab9
 
The textbook introduced you to types of physical security barriers, .docx
The textbook introduced you to types of physical security barriers, .docxThe textbook introduced you to types of physical security barriers, .docx
The textbook introduced you to types of physical security barriers, .docxgloriab9
 
The textbook highlights four distinct styles of parenting   authori.docx
The textbook highlights four distinct styles of parenting   authori.docxThe textbook highlights four distinct styles of parenting   authori.docx
The textbook highlights four distinct styles of parenting   authori.docxgloriab9
 
The textbook highlights four distinct styles of parenting authorita.docx
The textbook highlights four distinct styles of parenting authorita.docxThe textbook highlights four distinct styles of parenting authorita.docx
The textbook highlights four distinct styles of parenting authorita.docxgloriab9
 
The textbook highlights four distinct styles of parenting autho.docx
The textbook highlights four distinct styles of parenting autho.docxThe textbook highlights four distinct styles of parenting autho.docx
The textbook highlights four distinct styles of parenting autho.docxgloriab9
 
The textbook content for Understanding Operating Systems is organize.docx
The textbook content for Understanding Operating Systems is organize.docxThe textbook content for Understanding Operating Systems is organize.docx
The textbook content for Understanding Operating Systems is organize.docxgloriab9
 
The term public administration is traditionally defined as a gov.docx
The term public administration is traditionally defined as a gov.docxThe term public administration is traditionally defined as a gov.docx
The term public administration is traditionally defined as a gov.docxgloriab9
 
The terrorist attacks on September 11, 2001 forever changed U.S..docx
The terrorist attacks on September 11, 2001 forever changed U.S..docxThe terrorist attacks on September 11, 2001 forever changed U.S..docx
The terrorist attacks on September 11, 2001 forever changed U.S..docxgloriab9
 
The term used to denote the beliefs that people have about political.docx
The term used to denote the beliefs that people have about political.docxThe term used to denote the beliefs that people have about political.docx
The term used to denote the beliefs that people have about political.docxgloriab9
 
The TermsMany terms mean different things in our common language a.docx
The TermsMany terms mean different things in our common language a.docxThe TermsMany terms mean different things in our common language a.docx
The TermsMany terms mean different things in our common language a.docxgloriab9
 
The term 21st century skills suggests that there is a new set of.docx
The term 21st century skills suggests that there is a new set of.docxThe term 21st century skills suggests that there is a new set of.docx
The term 21st century skills suggests that there is a new set of.docxgloriab9
 
The term network economy” is used to emphasize the features of the .docx
The term network economy” is used to emphasize the features of the .docxThe term network economy” is used to emphasize the features of the .docx
The term network economy” is used to emphasize the features of the .docxgloriab9
 
The term narcissist gets overused. I define it as not having empathy.docx
The term narcissist gets overused. I define it as not having empathy.docxThe term narcissist gets overused. I define it as not having empathy.docx
The term narcissist gets overused. I define it as not having empathy.docxgloriab9
 
The term paper it should be of professional quality and be in th.docx
The term paper it should be of professional quality and be in th.docxThe term paper it should be of professional quality and be in th.docx
The term paper it should be of professional quality and be in th.docxgloriab9
 

More from gloriab9 (20)

The thought that the continents had coastlines that looked like they.docx
The thought that the continents had coastlines that looked like they.docxThe thought that the continents had coastlines that looked like they.docx
The thought that the continents had coastlines that looked like they.docx
 
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docxThe Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
 
The thesis statement is often (but not always) the l.docx
The thesis statement is often (but not always) the l.docxThe thesis statement is often (but not always) the l.docx
The thesis statement is often (but not always) the l.docx
 
The Theory of the Leisure Class summary (1page 250~300words)you .docx
The Theory of the Leisure Class summary (1page 250~300words)you .docxThe Theory of the Leisure Class summary (1page 250~300words)you .docx
The Theory of the Leisure Class summary (1page 250~300words)you .docx
 
The theory is  Parent Child Interaction Model( Barnard)Describe .docx
The theory is  Parent Child Interaction Model( Barnard)Describe .docxThe theory is  Parent Child Interaction Model( Barnard)Describe .docx
The theory is  Parent Child Interaction Model( Barnard)Describe .docx
 
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docxThe Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
 
The textbook’s authors presented three different characterizatio.docx
The textbook’s authors presented three different characterizatio.docxThe textbook’s authors presented three different characterizatio.docx
The textbook’s authors presented three different characterizatio.docx
 
The textbook introduced you to types of physical security barriers, .docx
The textbook introduced you to types of physical security barriers, .docxThe textbook introduced you to types of physical security barriers, .docx
The textbook introduced you to types of physical security barriers, .docx
 
The textbook highlights four distinct styles of parenting   authori.docx
The textbook highlights four distinct styles of parenting   authori.docxThe textbook highlights four distinct styles of parenting   authori.docx
The textbook highlights four distinct styles of parenting   authori.docx
 
The textbook highlights four distinct styles of parenting authorita.docx
The textbook highlights four distinct styles of parenting authorita.docxThe textbook highlights four distinct styles of parenting authorita.docx
The textbook highlights four distinct styles of parenting authorita.docx
 
The textbook highlights four distinct styles of parenting autho.docx
The textbook highlights four distinct styles of parenting autho.docxThe textbook highlights four distinct styles of parenting autho.docx
The textbook highlights four distinct styles of parenting autho.docx
 
The textbook content for Understanding Operating Systems is organize.docx
The textbook content for Understanding Operating Systems is organize.docxThe textbook content for Understanding Operating Systems is organize.docx
The textbook content for Understanding Operating Systems is organize.docx
 
The term public administration is traditionally defined as a gov.docx
The term public administration is traditionally defined as a gov.docxThe term public administration is traditionally defined as a gov.docx
The term public administration is traditionally defined as a gov.docx
 
The terrorist attacks on September 11, 2001 forever changed U.S..docx
The terrorist attacks on September 11, 2001 forever changed U.S..docxThe terrorist attacks on September 11, 2001 forever changed U.S..docx
The terrorist attacks on September 11, 2001 forever changed U.S..docx
 
The term used to denote the beliefs that people have about political.docx
The term used to denote the beliefs that people have about political.docxThe term used to denote the beliefs that people have about political.docx
The term used to denote the beliefs that people have about political.docx
 
The TermsMany terms mean different things in our common language a.docx
The TermsMany terms mean different things in our common language a.docxThe TermsMany terms mean different things in our common language a.docx
The TermsMany terms mean different things in our common language a.docx
 
The term 21st century skills suggests that there is a new set of.docx
The term 21st century skills suggests that there is a new set of.docxThe term 21st century skills suggests that there is a new set of.docx
The term 21st century skills suggests that there is a new set of.docx
 
The term network economy” is used to emphasize the features of the .docx
The term network economy” is used to emphasize the features of the .docxThe term network economy” is used to emphasize the features of the .docx
The term network economy” is used to emphasize the features of the .docx
 
The term narcissist gets overused. I define it as not having empathy.docx
The term narcissist gets overused. I define it as not having empathy.docxThe term narcissist gets overused. I define it as not having empathy.docx
The term narcissist gets overused. I define it as not having empathy.docx
 
The term paper it should be of professional quality and be in th.docx
The term paper it should be of professional quality and be in th.docxThe term paper it should be of professional quality and be in th.docx
The term paper it should be of professional quality and be in th.docx
 

Recently uploaded

SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Recently uploaded (20)

SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

The topic i have selectedAbstractI will be going with the .docx

  • 1. The topic i have selected: Abstract: I will be going with the subject "Fraud detection using Data Mining" Fraud affirmation is an approach to manage shield others from being attacked by designers or to get secure from the cash desperado and cheats with the assistance of progression. Information Mining (DM) blueprint systems in recognizing firms that issue fraudulent financial statements (FFS) and manages the obvious affirmation of parts related to FFS. This evaluation explores the settlement of Decision Trees, Neural Networks, and Bayesian Belief Networks in the prominent proof of sham spending summaries. The information vector is made out of degrees got from budgetary outlines. Introduction: Data uncovering is looking for secured, significant, and possibly supportive models in huge enlightening lists. Data Mining is connected to finding unsuspected/already dark associations among the data. It is a multi-disciplinary fitness that usages AI, estimations, AI, and database advancement. Types of data mining Relational database Data warehouse Text mining data mining Distributed database
  • 2. Operational database End-user database Kirkos, E., Spathis, C., & Manolopoulos, Y. (2007). Data mining techniques for the detection of fraudulent financial statements. Expert systems with applications, 32(4), 995-1003