Fraudulent behavior in drinking water consumption is a significant problem facing water supplying companies and agencies. This behavior results in a massive loss of income and forms the highest percentage of non-technical loss. Finding efficient measurements for detecting fraudulent activities has been an active research area in recent years. Intelligent data mining techniques can help water supplying companies to detect these fraudulent activities to reduce such losses. This research explores the use of two classification techniques (SVM and KNN) to detect suspicious fraud water customers. The main motivation of this research is to assist Yarmouk Water Company (YWC) in Irbid city of Jordan to overcome its profit loss. The SVM based approach uses customer load profile attributes to expose abnormal behavior that is known to be correlated with non-technical loss activities. The data has been collected from the historical data of the company billing system. The accuracy of the generated model hit a rate of over 74% which is better than the current manual prediction procedures taken by the YWC. To deploy the model, a decision tool has been built using the generated model. The system will help the company to predict suspicious water customers to be inspected on site.
This slides will provide viewers a complete understanding of all the different virtualization techniques.
The main reference for the presentation is taken from Mastering cloud computing By Rajkumar Buyya.
"In the current scenario, the data on the web is growing exponentially. Social media is generating a large amount of data such as reviews, comments, and customer's opinions on a daily basis. This huge amount of user generated data is worthless unless some mining operations are applied to it. As there are a number of fake reviews so opinion mining technique should incorporate Spam detection to produce a genuine opinion. Nowadays, there are a number of people using social media opinions to create their call on shopping for product or service. Opinion Spam detection is an exhausting and hard problem as there are many faux or fake reviews that have been created by organizations or by the people for various purposes. They write fake reviews to mislead readers or automated detection system by promoting or demoting target products to promote them or to degrade their reputations. The proposed technique includes Ontology, Geo location and IP address tracking, Spam words Dictionary using Naïve Bayes, Brand only review detection and tracking account used. Piyush Jain | Karan Chheda | Mihir Jain | Prachiti Lade ""Fake Product Review Monitoring System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21644.pdf
Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/21644/fake-product-review-monitoring-system/piyush-jain"
This slides will provide viewers a complete understanding of all the different virtualization techniques.
The main reference for the presentation is taken from Mastering cloud computing By Rajkumar Buyya.
"In the current scenario, the data on the web is growing exponentially. Social media is generating a large amount of data such as reviews, comments, and customer's opinions on a daily basis. This huge amount of user generated data is worthless unless some mining operations are applied to it. As there are a number of fake reviews so opinion mining technique should incorporate Spam detection to produce a genuine opinion. Nowadays, there are a number of people using social media opinions to create their call on shopping for product or service. Opinion Spam detection is an exhausting and hard problem as there are many faux or fake reviews that have been created by organizations or by the people for various purposes. They write fake reviews to mislead readers or automated detection system by promoting or demoting target products to promote them or to degrade their reputations. The proposed technique includes Ontology, Geo location and IP address tracking, Spam words Dictionary using Naïve Bayes, Brand only review detection and tracking account used. Piyush Jain | Karan Chheda | Mihir Jain | Prachiti Lade ""Fake Product Review Monitoring System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21644.pdf
Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/21644/fake-product-review-monitoring-system/piyush-jain"
A brief overview of IBM Cloud security in three slides – SaaS, IaaS and PaaS, and the others providing a snapshot of IBM's current set of SaaS, IaaS and PaaS offerings.
E. Andrew Keeney presented CyberSecurity (Emerging Threats) at The Credit Union League of Connecticut's Compliance Series: Social Media Compliance Risks on February 10, 2015.
Virtualization is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers)..
Virtualization is a proved technology that makes it possible to run multiple operating system and applications on the same server at same time.
Virtualization is the process of creating a logical(virtual) version of a server operating system, a storage device, or network services.
The technology that work behind virtualization is known as a virtual machine monitor(VM), or virtual manager which separates compute environments from the actual physical infrastructure.
Cloud Computing for college presenation project.Mahesh Tibrewal
This presentation I've made on Cloud computing can be used by students for their college projects. I've tried to make this as colourful and attractive as possible without losing the relevance with the topic.
UT Meter Reading System is online mobile and web based application designed to help Power/Electric industry to streamline the process of collecting the readings of electric meters.
A brief overview of IBM Cloud security in three slides – SaaS, IaaS and PaaS, and the others providing a snapshot of IBM's current set of SaaS, IaaS and PaaS offerings.
E. Andrew Keeney presented CyberSecurity (Emerging Threats) at The Credit Union League of Connecticut's Compliance Series: Social Media Compliance Risks on February 10, 2015.
Virtualization is a technique, which allows to share single physical instance of an application or resource among multiple organizations or tenants (customers)..
Virtualization is a proved technology that makes it possible to run multiple operating system and applications on the same server at same time.
Virtualization is the process of creating a logical(virtual) version of a server operating system, a storage device, or network services.
The technology that work behind virtualization is known as a virtual machine monitor(VM), or virtual manager which separates compute environments from the actual physical infrastructure.
Cloud Computing for college presenation project.Mahesh Tibrewal
This presentation I've made on Cloud computing can be used by students for their college projects. I've tried to make this as colourful and attractive as possible without losing the relevance with the topic.
UT Meter Reading System is online mobile and web based application designed to help Power/Electric industry to streamline the process of collecting the readings of electric meters.
Online Banking Management System – Its Scope and the Technology Used.Techugo
The banking system allows banks to keep track of a few records. Therefore, a bank management software program is needed to simplify the process. For example, maintaining currency and international values is part of the job. Online Bank management systems must also act as currency distributors and serve the nation’s welfare.
Inventia technology consultants is a IT leading consulting Firm in India that provides software development, digital transformation, it staffing, and other it services to businesses of all sizes.
Electricity consumer dishonesty is a problem faced
by all power utilities. Finding efficient measurements for
detecting fraudulent electricity consumption has been an active
research area in recent years. This paper presents a new
approach towards (NTL) analysis for electric
utilities using a novel intelligence-based technique, Support
Vector Machine (SVM). The main motivation of this study is to
assist Tenaga Nasional Berhad (TNB) in Malaysia to reduce its
NTLs in the distribution sector due to electricity theft. The
proposed model preselects suspected customers to be inspected
onsite for fraud based on irregularities and abnormal
consumption behavior. This approach provides a method of data
mining and involves feature extraction from historical customer
consumption data. The SVM based approach uses customer load
profile information to expose abnormal behavior that is known to
be highly correlated with NTL activities. The result yields
classification classes that are used to shortlist potential fraud
suspects for onsite inspection, based on significant behavior that
emerges due to irregularities in consumption. Simulation results
prove the proposed method is more effective compared to the
current actions taken by TNB in order to reduce NTL activities.
This paper presents a framework to identify and detect NTL
activities in the electric utility market i.e., customers with
irregular and abnormal consumption patterns indicating
fraudulent activities. An automatic feature extraction method
for load profiles with a combination of Support Vector
Machines (SVMs) is used to identify fraud customers. This
study uses historical customer consumption data collected
from TNBD. Customer consumption patterns are extracted
using data mining and statistical techniques, which represent
customer load profiles. Based on the assumption that load
profiles contain abnormalities when a fraud event occurs,
SVM classifies load profiles of customers for detection of
fraud suspects. There are several different types of fraud that
can occur, but our research concentrates only on scenarios
where abrupt changes appear in load profiles, indicating
fraudulent activities.
Fraud detection in electric power distribution networks using an ann based kn...ijaia
Nowadays the electric utilities have to handle problems with the non-technical losses caused by frauds and
thefts committed by some of their consumers. In order to minimize this, some methodologies have been
created to perform the detection of consumers that might be fraudsters. In this context, the use of
classification techniques can improve the hit rate of the fraud detection and increase the financial income.
This paper proposes the use of the knowledge-discovery in databases process based on artificial neural
networks applied to the classifying process of consumers to be inspected. An experiment performed in a
Brazilian electric power distribution company indicated an improvement of over 50% of the proposed
approach if compared to the previous methods used by that company.
Service Virtualization - Next Gen Testing Conference Singapore 2013Min Fang
Most major enterprises have invested millions of dollars on soIware performance lab infrastructure, that develop recurring maintenance effort and costs, unstable environments, and conflicts over constrained resources. To combat this drain and deliver value, companies need to find ways to optimize. Virtualizing the behavior and performance characteristics of test lab dependencies, CA LISA Service Virtualization has helped many enterprises achieving highly available labs that allow earlier performance testing with greater flexibility, at a much lower cost. Techniques discussed in this session include:
Removing capacity constraints from performance testing lab
Optimizing performance management by decomposing SLAs
Shift-Left: conducting incremental, iterative performance testing
2021 python projects list
A BI-OBJECTIVE HYPER-HEURISTIC SUPPORT VECTOR MACHINES FOR BIG DATA CYBER-SECURITY
AN ARTIFICIAL INTELLIGENCE AND CLOUD BASED COLLABORATIVE PLATFORM FOR PLANT DISEASE IDENTIFICATION, TRACKING AND FORECASTING FOR FARMERS
10.sentiment analysis of customer product reviews using machine learniVenkat Projects
10.sentiment analysis of customer product reviews using machine learning In this project author is detecting sentiments from amazon reviews by using various machine learning algorithms such as SVM, Decision Tree and Naïve Bayes. In all 3 algorithms SVM is giving better accuracy and to train this algorithms author has used AMAZON reviews dataset and this dataset is saved inside ‘Amazon_Reviews_dataset’ folder. Below screen shot show example reviews from dataset
9.data analysis for understanding the impact of covid–19 vaccinations on the ...Venkat Projects
9.data analysis for understanding the impact of covid–19 vaccinations on the society
In this paper author analysing vaccines dataset to forecast required vaccines compare to manufacturing or available vaccines and by using this forecasting manufacturers may increase and decrease their manufacturing quantity. This forecasting can impact society by taking decision on manufacturing vaccines and if in society more cases occurred then forecasting will be high and by seeing forecasting manufacturers may increase production.
Vaccines are manufacturing by multiple manufacturers such as JOHNSON AND JOHNSON, PFIZER and many more. In this forecasting will take all manufacturers and their production quantity as well as usage of vaccines and based on this Machine Learning algorithm called Decision Tree will forecast require vaccines for next 30 days
To implement this project we are using vaccines dataset to train decision tree algorithm and then this algorithm will predict require vaccines quantity for next 30 days. This dataset is saved inside ‘Dataset’ folder and below screen showing some records from dataset
6.iris recognition using machine learning techniqueVenkat Projects
In this project to recognize person from IRIS we are using CASIA IRIS dataset which contains images from 108 peoples and by using this dataset we are training CNN model and then we can use this CNN model to predict/recognize persons. To train CNN model we are extracting IRIS features by using HoughCircles algorithm which extract IRIS circle from eye images. Below screen shots showing dataset with person id and this dataset saved inside ‘CASIA1’ folder
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
1.a data mining based model for detection of fraudulent behaviour in water consumption
1. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
A DATA MINING BASED MODEL FOR
DETECTION OF FRAUDULENT BEHAVIOUR
IN WATER CONSUMPTION
ABSTRACT
Fraudulent behavior in drinking water consumption is a significant
problem facing water supplying companies and agencies. This behavior
results in a massive loss of income and forms the highest percentage of
non-technical loss. Finding efficient measurements for detecting
fraudulent activities has been an active research area in recent years.
Intelligent data mining techniques can help water supplying companies
to detect these fraudulent activities to reduce such losses. This research
explores the use of two classification techniques (SVM and KNN) to
detect suspicious fraud water customers. The main motivation of this
research is to assist Yarmouk Water Company (YWC) in Irbid city of
Jordan to overcome its profit loss. The SVM based approach uses
customer load profile attributes to expose abnormal behavior that is
known to be correlated with non-technical loss activities. The data has
been collected from the historical data of the company billing system.
The accuracy of the generated model hit a rate of over 74% which is
better than the current manual prediction procedures taken by the YWC.
2. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
To deploy the model, a decision tool has been built using the generated
model. The system will help the company to predict suspicious water
customers to be inspected on site.
ARCHITECTURE
EXISTING SYSTEM
Literature has abundant research for Non-Technical Loss (NTL) in
electricity fraud detection, but rare researches have been conducted for
the water consumption sector.Water supplying companies incur
significant losses due to fraud operations in water consumption. The
customers who tamper their water meter readings to avoid or reduce
billing amount is called a fraud customer. In practice, there are two types
3. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
of water loss: the first is called technical loss (TL) which is related to
problems in the production system, the transmission of water through the
network (i.e., leakage), and the network washout. The second type is
called the non-technical loss (NTL) which is the amount of delivered
water to customers but not billed, resulting in loss of revenue.To address
these challenges, Jordan ministry of water and irrigation as in many
other countries is striving, through the adoption of a long-term plan, to
improve services provided tocitizens through restructuring and
rehabilitation of networks, reducing the non-revenue water rates,
providing new sources and maximizing the efficient use of available
sources. At the same time, the Ministry continues its efforts to regulate
the water usage and to detect the loss of supplied water.
PROPOSED SYSTEM
This paper focuses on customer’s historical data which are selected
from the YWC billing system. The main objective of this work is to use
some well-known data mining techniques named Support Vector
Machines (SVM) and K-Nearest Neighbor (KNN) to build a suitable
model to detect suspicious fraudulent customers, depending on their
historical water metered consumptions.The CRISP-DM (Cross Industry
Standard Process for Data Mining) was adopted to conduct this research.
The CRISPDM is an industry standard data mining methodology
developed by four Companies; NCR systems engineering,
4. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
DaimlerChrysler AG, SPSS Inc. and OHRA. The CRISP-DM model
consists of business understanding, data understanding, data preparation,
model building, model evaluation and model deployment.To extract the
fraud customers’ profile, a new table is created containing the client's
number, the water consumption, and a new attribute for fraud class. This
attribute is filled with a value of ‘YES’. Another table for the normal
clients is created, and the fraud class attribute is filled with the value
“NO”. The two tables are then consolidated into one table containing the
customer ID, consumption profile, and fraud class attributes. To filter
the data, some preprocessing operations were performed such as
Eliminate redundancy, Eliminate customers having zeroconsumption
through the entire period, Eliminate new clients who are not present
during the whole targeted period, and Eliminate customers having null
consumption values. Filtering the data resulted in a reduced original
dataset of the non-fraud customer to 16114 record and the fraud
customers to 647 records.
ALGORITHM
SUPPORT VECTOR MACHINE
“Support Vector Machine” (SVM) is a supervised machine
learning algorithm which can be used for both classification and
regression challenges. However, it is mostly used in classification
problems. In this algorithm, we plot each data item as a point in n-
5. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
dimensional space (where n is number of features you have) with the
value of each feature being the value of a particular coordinate. Then,
we perform classification by finding the hyper-plane that differentiate
the two classes very well (look at the below snapshot).Support Vectors
are simply the co-ordinates of individual observation. Support Vector
Machine is a frontier which best segregates the two classes (hyper-plane/
line).More formally, a support vector machine constructs a hyper plane
or set of hyper planes in a high- or infinite-dimensional space, which can
be used for classification, regression, or other tasks like outliers
detection. Intuitively, a good separation is achieved by the hyper plane
that has the largest distance to the nearest training-data point of any class
(so-called functional margin), since in general the larger the margin the
lower the generalization error of the classifier.Whereas the original
problem may be stated in a finite dimensional space, it often happens
that the sets to discriminate are not linearly separable in that space. For
this reason, it was proposed that the original finite-dimensional space be
mapped into a much higher-dimensional space, presumably making the
separation easier in that space.
MODULES
1. CUSTOMER DATA
The customers those who are willing to get water through
agencies are registered with system. The only ways for user to
6. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
consume water by customers are through this registration. Customer
request for admin for water and to generate bills.
2. VERIFY FEEDBACK
Bills are generated after checking the limit by on field
executives after check the limit. The quantity that they consumed
must be equal to noted details by admin. The fraud details can be
check through this process. The bills were uploaded after this and
find the fraudulent among the customers.
3. ACTION AGAINST FRAUDLENT
The fraud customers who illegally consumes more water than
they used or may be requires can be found by admin and bills also
verified by them. Fraud details are set to block by the user and let
them not provide any more water to them again and the details
handover to cops to punish them with legally.
4. GRAPH ANALYSIS
The graphs are handy to understand the data and based on this
analysis admin can find the fraud customers. The business gradually
improves as per their understand of where exactly problem arises and
7. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
to find the place improve and lack. This will gives the clear picture
about the current and past picture from the dataset.
FUTUREWORK
The conducted experiments showed that a good performance of
Support Vector Machines (SVM) and K-Nearest Neighbors (KNN) had
been achieved with overall accuracy around 70% for both. In Future
accuracy of the same can be improved with the help of improved
techniques. The model hit rate is 60%-70% which is apparently better
than random manual inspections held by YWC teams with hit rate
around 1% in identifying fraud customers. This model introduces an
intelligent tool that can be used by YWC to detect fraud customers and
reduce their profit losses. The suggested model helps saving time and
effort of employees of Yarmouk water by identifying billing errors and
corrupted meters. With the use of the proposed model, the water utilities
can increase cost recovery by reducing administrative Non-Technical
Losses (NTL’s) and increasing the productivity of inspection staff by
onsite inspections of suspicious fraud customers.
8. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
REQUIREMENT ANALYSIS
The project involved analyzing the design of few applications so as
to make the application more users friendly. To do so, it was really
important to keep the navigations from one screen to the other well
ordered and at the same time reducing the amount of typing the user
needs to do. In order to make the application more accessible, the
browser version had to be chosen so that it is compatible with most of
the Browsers.
REQUIREMENT SPECIFICATION
Functional Requirements
Graphical User interface with the User.
Software Requirements
For developing the application the following are the Software
Requirements:
1. Python
2. Django
3. Mysql
4. Wampserver
9. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
Operating Systems supported
1. Windows 7
2. Windows XP
3. Windows 8
Technologies and Languages used to Develop
1. Python
Debugger and Emulator
Any Browser (Particularly Chrome)
Hardware Requirements
For developing the application the following are the Hardware
Requirements:
Processor: Pentium IV or higher
RAM: 256 MB
Space on Hard Disk: minimum 512MB
CONCLUSION
10. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
In this research, we applied the data mining classification
techniques for the purpose of detecting customers’ with fraud behaviour
in water consumption. We used SVM and KNN classifiers to build
classification models for detecting suspicious fraud customers. The
models were built using the customers’ historical metered consumption
data; the Cross Industry Standard Process for Data Mining (CRISP-
DM). The data used in this research study the data was collected from
Yarmouk Water Company (YWC) for Qasabat Irbid ROU customers,
the data covers five years customers’ water consumptions with 1.5
million customer historical records for 90 thousand customers. This
phase took a considerable effort and time to pre-process and format the
data to fit the SVM and KNN data mining classifiers.