SlideShare a Scribd company logo
The topic i have selected:
Abstract:
I will be going with the subject "Fraud detection using Data
Mining" Fraud affirmation is an approach to manage shield
others from being attacked by designers or to get secure from
the cash desperado and cheats with the assistance of
progression. Information Mining (DM) blueprint systems in
recognizing firms that issue fraudulent financial statements
(FFS) and manages the obvious affirmation of parts related to
FFS. This evaluation explores the settlement of Decision Trees,
Neural Networks, and Bayesian Belief Networks in the
prominent proof of sham spending summaries. The information
vector is made out of degrees got from budgetary outlines.
Introduction:
Data uncovering is looking for secured, significant, and
possibly supportive models in huge enlightening lists. Data
Mining is connected to finding unsuspected/already dark
associations among the data.
It is a multi-disciplinary fitness that usages AI, estimations, AI,
and database advancement.
Types of data mining
Relational database
Data warehouse
Text mining data mining
Distributed database
Operational database
End-user database
Kirkos, E., Spathis, C., & Manolopoulos, Y. (2007). Data
mining techniques for the detection of fraudulent financial
statements. Expert systems with applications, 32(4), 995-1003

More Related Content

Similar to The topic i have selectedAbstractI will be going with the .docx

A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMINING
Carrie Romero
 
Big Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and IssuesBig Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and Issues
Karan Deep Singh
 
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfKIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
Dr. Radhey Shyam
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycle
Dr. Radhey Shyam
 
2 Data-mining process
2   Data-mining process2   Data-mining process
2 Data-mining process
Mahmoud Alfarra
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
Datamining Tools
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
DataminingTools Inc
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
Shakas Technologies
 
Data minig with Big data analysis
Data minig with Big data analysisData minig with Big data analysis
Data minig with Big data analysis
Poonam Kshirsagar
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docx
harrisonhoward80223
 
Datamining
DataminingDatamining
Dataminingsumit621
 
Data Mining
Data MiningData Mining
1 Introduction to-data-mining lecture
1   Introduction to-data-mining lecture1   Introduction to-data-mining lecture
1 Introduction to-data-mining lecture
Mahmoud Alfarra
 
A Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data MiningA Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data Mining
BRNSSPublicationHubI
 
C3602021025
C3602021025C3602021025
C3602021025
ijceronline
 
Big Data for Media Development
Big Data for Media DevelopmentBig Data for Media Development
Big Data for Media DevelopmentAnahi Iacucci
 
Machine Learning, Data Mining, and
Machine Learning, Data Mining, and Machine Learning, Data Mining, and
Machine Learning, Data Mining, and butest
 
Data miningppt378
Data miningppt378Data miningppt378
Data miningppt378nitttin
 
Overview of Data Mining
Overview of Data MiningOverview of Data Mining
Overview of Data Mining
ijtsrd
 
Evidence Based Healthcare Design
Evidence Based Healthcare DesignEvidence Based Healthcare Design
Evidence Based Healthcare Design
Carmen Martin
 

Similar to The topic i have selectedAbstractI will be going with the .docx (20)

A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMINING
 
Big Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and IssuesBig Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and Issues
 
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfKIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycle
 
2 Data-mining process
2   Data-mining process2   Data-mining process
2 Data-mining process
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Data minig with Big data analysis
Data minig with Big data analysisData minig with Big data analysis
Data minig with Big data analysis
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docx
 
Datamining
DataminingDatamining
Datamining
 
Data Mining
Data MiningData Mining
Data Mining
 
1 Introduction to-data-mining lecture
1   Introduction to-data-mining lecture1   Introduction to-data-mining lecture
1 Introduction to-data-mining lecture
 
A Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data MiningA Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data Mining
 
C3602021025
C3602021025C3602021025
C3602021025
 
Big Data for Media Development
Big Data for Media DevelopmentBig Data for Media Development
Big Data for Media Development
 
Machine Learning, Data Mining, and
Machine Learning, Data Mining, and Machine Learning, Data Mining, and
Machine Learning, Data Mining, and
 
Data miningppt378
Data miningppt378Data miningppt378
Data miningppt378
 
Overview of Data Mining
Overview of Data MiningOverview of Data Mining
Overview of Data Mining
 
Evidence Based Healthcare Design
Evidence Based Healthcare DesignEvidence Based Healthcare Design
Evidence Based Healthcare Design
 

More from gloriab9

The thought that the continents had coastlines that looked like they.docx
The thought that the continents had coastlines that looked like they.docxThe thought that the continents had coastlines that looked like they.docx
The thought that the continents had coastlines that looked like they.docx
gloriab9
 
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docxThe Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
gloriab9
 
The thesis statement is often (but not always) the l.docx
The thesis statement is often (but not always) the l.docxThe thesis statement is often (but not always) the l.docx
The thesis statement is often (but not always) the l.docx
gloriab9
 
The Theory of the Leisure Class summary (1page 250~300words)you .docx
The Theory of the Leisure Class summary (1page 250~300words)you .docxThe Theory of the Leisure Class summary (1page 250~300words)you .docx
The Theory of the Leisure Class summary (1page 250~300words)you .docx
gloriab9
 
The theory is  Parent Child Interaction Model( Barnard)Describe .docx
The theory is  Parent Child Interaction Model( Barnard)Describe .docxThe theory is  Parent Child Interaction Model( Barnard)Describe .docx
The theory is  Parent Child Interaction Model( Barnard)Describe .docx
gloriab9
 
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docxThe Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
gloriab9
 
The textbook’s authors presented three different characterizatio.docx
The textbook’s authors presented three different characterizatio.docxThe textbook’s authors presented three different characterizatio.docx
The textbook’s authors presented three different characterizatio.docx
gloriab9
 
The textbook introduced you to types of physical security barriers, .docx
The textbook introduced you to types of physical security barriers, .docxThe textbook introduced you to types of physical security barriers, .docx
The textbook introduced you to types of physical security barriers, .docx
gloriab9
 
The textbook highlights four distinct styles of parenting   authori.docx
The textbook highlights four distinct styles of parenting   authori.docxThe textbook highlights four distinct styles of parenting   authori.docx
The textbook highlights four distinct styles of parenting   authori.docx
gloriab9
 
The textbook highlights four distinct styles of parenting authorita.docx
The textbook highlights four distinct styles of parenting authorita.docxThe textbook highlights four distinct styles of parenting authorita.docx
The textbook highlights four distinct styles of parenting authorita.docx
gloriab9
 
The textbook highlights four distinct styles of parenting autho.docx
The textbook highlights four distinct styles of parenting autho.docxThe textbook highlights four distinct styles of parenting autho.docx
The textbook highlights four distinct styles of parenting autho.docx
gloriab9
 
The textbook content for Understanding Operating Systems is organize.docx
The textbook content for Understanding Operating Systems is organize.docxThe textbook content for Understanding Operating Systems is organize.docx
The textbook content for Understanding Operating Systems is organize.docx
gloriab9
 
The term public administration is traditionally defined as a gov.docx
The term public administration is traditionally defined as a gov.docxThe term public administration is traditionally defined as a gov.docx
The term public administration is traditionally defined as a gov.docx
gloriab9
 
The terrorist attacks on September 11, 2001 forever changed U.S..docx
The terrorist attacks on September 11, 2001 forever changed U.S..docxThe terrorist attacks on September 11, 2001 forever changed U.S..docx
The terrorist attacks on September 11, 2001 forever changed U.S..docx
gloriab9
 
The term used to denote the beliefs that people have about political.docx
The term used to denote the beliefs that people have about political.docxThe term used to denote the beliefs that people have about political.docx
The term used to denote the beliefs that people have about political.docx
gloriab9
 
The TermsMany terms mean different things in our common language a.docx
The TermsMany terms mean different things in our common language a.docxThe TermsMany terms mean different things in our common language a.docx
The TermsMany terms mean different things in our common language a.docx
gloriab9
 
The term 21st century skills suggests that there is a new set of.docx
The term 21st century skills suggests that there is a new set of.docxThe term 21st century skills suggests that there is a new set of.docx
The term 21st century skills suggests that there is a new set of.docx
gloriab9
 
The term network economy” is used to emphasize the features of the .docx
The term network economy” is used to emphasize the features of the .docxThe term network economy” is used to emphasize the features of the .docx
The term network economy” is used to emphasize the features of the .docx
gloriab9
 
The term narcissist gets overused. I define it as not having empathy.docx
The term narcissist gets overused. I define it as not having empathy.docxThe term narcissist gets overused. I define it as not having empathy.docx
The term narcissist gets overused. I define it as not having empathy.docx
gloriab9
 
The term paper it should be of professional quality and be in th.docx
The term paper it should be of professional quality and be in th.docxThe term paper it should be of professional quality and be in th.docx
The term paper it should be of professional quality and be in th.docx
gloriab9
 

More from gloriab9 (20)

The thought that the continents had coastlines that looked like they.docx
The thought that the continents had coastlines that looked like they.docxThe thought that the continents had coastlines that looked like they.docx
The thought that the continents had coastlines that looked like they.docx
 
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docxThe Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
 
The thesis statement is often (but not always) the l.docx
The thesis statement is often (but not always) the l.docxThe thesis statement is often (but not always) the l.docx
The thesis statement is often (but not always) the l.docx
 
The Theory of the Leisure Class summary (1page 250~300words)you .docx
The Theory of the Leisure Class summary (1page 250~300words)you .docxThe Theory of the Leisure Class summary (1page 250~300words)you .docx
The Theory of the Leisure Class summary (1page 250~300words)you .docx
 
The theory is  Parent Child Interaction Model( Barnard)Describe .docx
The theory is  Parent Child Interaction Model( Barnard)Describe .docxThe theory is  Parent Child Interaction Model( Barnard)Describe .docx
The theory is  Parent Child Interaction Model( Barnard)Describe .docx
 
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docxThe Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
 
The textbook’s authors presented three different characterizatio.docx
The textbook’s authors presented three different characterizatio.docxThe textbook’s authors presented three different characterizatio.docx
The textbook’s authors presented three different characterizatio.docx
 
The textbook introduced you to types of physical security barriers, .docx
The textbook introduced you to types of physical security barriers, .docxThe textbook introduced you to types of physical security barriers, .docx
The textbook introduced you to types of physical security barriers, .docx
 
The textbook highlights four distinct styles of parenting   authori.docx
The textbook highlights four distinct styles of parenting   authori.docxThe textbook highlights four distinct styles of parenting   authori.docx
The textbook highlights four distinct styles of parenting   authori.docx
 
The textbook highlights four distinct styles of parenting authorita.docx
The textbook highlights four distinct styles of parenting authorita.docxThe textbook highlights four distinct styles of parenting authorita.docx
The textbook highlights four distinct styles of parenting authorita.docx
 
The textbook highlights four distinct styles of parenting autho.docx
The textbook highlights four distinct styles of parenting autho.docxThe textbook highlights four distinct styles of parenting autho.docx
The textbook highlights four distinct styles of parenting autho.docx
 
The textbook content for Understanding Operating Systems is organize.docx
The textbook content for Understanding Operating Systems is organize.docxThe textbook content for Understanding Operating Systems is organize.docx
The textbook content for Understanding Operating Systems is organize.docx
 
The term public administration is traditionally defined as a gov.docx
The term public administration is traditionally defined as a gov.docxThe term public administration is traditionally defined as a gov.docx
The term public administration is traditionally defined as a gov.docx
 
The terrorist attacks on September 11, 2001 forever changed U.S..docx
The terrorist attacks on September 11, 2001 forever changed U.S..docxThe terrorist attacks on September 11, 2001 forever changed U.S..docx
The terrorist attacks on September 11, 2001 forever changed U.S..docx
 
The term used to denote the beliefs that people have about political.docx
The term used to denote the beliefs that people have about political.docxThe term used to denote the beliefs that people have about political.docx
The term used to denote the beliefs that people have about political.docx
 
The TermsMany terms mean different things in our common language a.docx
The TermsMany terms mean different things in our common language a.docxThe TermsMany terms mean different things in our common language a.docx
The TermsMany terms mean different things in our common language a.docx
 
The term 21st century skills suggests that there is a new set of.docx
The term 21st century skills suggests that there is a new set of.docxThe term 21st century skills suggests that there is a new set of.docx
The term 21st century skills suggests that there is a new set of.docx
 
The term network economy” is used to emphasize the features of the .docx
The term network economy” is used to emphasize the features of the .docxThe term network economy” is used to emphasize the features of the .docx
The term network economy” is used to emphasize the features of the .docx
 
The term narcissist gets overused. I define it as not having empathy.docx
The term narcissist gets overused. I define it as not having empathy.docxThe term narcissist gets overused. I define it as not having empathy.docx
The term narcissist gets overused. I define it as not having empathy.docx
 
The term paper it should be of professional quality and be in th.docx
The term paper it should be of professional quality and be in th.docxThe term paper it should be of professional quality and be in th.docx
The term paper it should be of professional quality and be in th.docx
 

Recently uploaded

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 

Recently uploaded (20)

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 

The topic i have selectedAbstractI will be going with the .docx

  • 1. The topic i have selected: Abstract: I will be going with the subject "Fraud detection using Data Mining" Fraud affirmation is an approach to manage shield others from being attacked by designers or to get secure from the cash desperado and cheats with the assistance of progression. Information Mining (DM) blueprint systems in recognizing firms that issue fraudulent financial statements (FFS) and manages the obvious affirmation of parts related to FFS. This evaluation explores the settlement of Decision Trees, Neural Networks, and Bayesian Belief Networks in the prominent proof of sham spending summaries. The information vector is made out of degrees got from budgetary outlines. Introduction: Data uncovering is looking for secured, significant, and possibly supportive models in huge enlightening lists. Data Mining is connected to finding unsuspected/already dark associations among the data. It is a multi-disciplinary fitness that usages AI, estimations, AI, and database advancement. Types of data mining Relational database Data warehouse Text mining data mining Distributed database
  • 2. Operational database End-user database Kirkos, E., Spathis, C., & Manolopoulos, Y. (2007). Data mining techniques for the detection of fraudulent financial statements. Expert systems with applications, 32(4), 995-1003