SlideShare a Scribd company logo
1 of 4
The International Journal Of Engineering And Science (IJES)
||Volume||2 ||Issue|| 6 ||Pages||01-04||2013||
ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805
www.theijes.com The IJES Page 1
Increasing the Efficiency of Credit Card Fraud Deduction using
Attribute Reduction
Geetha Mary A, Arun Kodnani, Harshit Singhal, Swati Kothari
School of Computing Science and Engineering, VIT University, Vellore, Tamil Nadu, India
----------------------------------------------------------ABSTRACT------------------------------------------------------------
The detection of fraudulent credit card usage is of immense importance for banks as well as the card users and
requires highly efficient techniques to increase the chance of correctly classifying each transaction as fraud or
genuine. One of the techniques used to perform this classification is decision tree. Attribute reduction is used to
increase the efficiency of the technique, which is decided based on entropy.
INDEX TERMS:- Data Mining, Decision tree, data cleaning, Attribute Reduction, Entropy
---------------------------------------------------------------------------------------------------------------------------------------
Date Of Submission: 15 May 2013 Date Of Publication: 10,June.2013
-----------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
In today’s economy, credit cards hold utmost importance in many sectors. Credit card fraud detection is
a topic which is applicable to many industries including banking and financial sectors, insurance, government
agencies, etc. Fraudulent transactions are a significant problem, one that will grow in importance as the number
of access points grow. Certainly, all transactions which deal with known illegal use are not authorised.
Nevertheless, there are transactions which appear to be valid but experienced people can tell that they are
probably misused, caused by stolen cards or fake merchants. So, the task is to avoid fraud by a credit card
transaction before it is known as illegal.
The paper deals with the problem specific to this special data mining application and tries to solve them by
doing data cleaning[3]using attribute reduction and then applying decision tree technique to achieve improved
efficiency of output.
II. METHODOLOGY
Decision trees are the methodologies to classify data into discrete ones using the tree structured
algorithms. The main purpose of the decision tree is to expose the structural information contained in the data.
Decision tree is made by tentatively selecting an attribute to place on the root node and make one branch for
each possible value of that attribute [1]. Thus, the data set at the root node split and moves into daughter nodes
producing a partial tree. Then an assessment is made of the quality of the split. This process is repeated with all
the attributes. Each attribute chosen for splitting produces a partial tree. Depending on the quality of the partial
tree, one partial tree is selected. This virtually means selecting an attribute for splitting. The process is repeated
for the data in each daughter node of the selected partial tree. If at any time, all instances at the node have the
same classification, stop developing that part of the tree.
The assessment is made depending upon the purity of the daughter nodes produced; the most widely
used measure to do this is called information entropy[1].
Entropy is a concept originated in thermodynamics but later found its way to information theory. In the
decision tree construction process, definition of entropy as a measure of disorder suits well. If the class values of
the data in a node are equally divided among possible values of the class value, it can be said, that entropy is
maximum. If the class values of the data in a node are same for all records, then entropy is minimum.
Through splitting, pure nodes have to be achieved, as far as it is possible. This corresponds to reducing the
entropy of the system. However, this may not be as simple as it sounds for there is no way to stop the training
set from containing two examples with identical sets of attributes but different classes.To overcome the problem
mentioned above, the concept of information gain is used. In addition to information entropy, information
gain[1] also takes into consideration the factor of the number and size of daughter nodes into which attribute
splits the data set.
Increasing The Efficiency Of Credit Card...
www.theijes.com The IJES Page 2
III. APPROACH
There are also cases in which an attribute claims its position as the root node of a certain partial tree
during the building of the decision tree on the basis of both information gain and entropy. There may exist such
an attribute which has same value for majority of the records. Although, it may be an appropriate candidate for
that position but since its value doesn’t vary much over the entire dataset, considering it for classification would
reduce the efficiency of the algorithm. Including these attributes results in undesirable efficiency reduction.
Thus, such unnecessary attributes are reduced first, and then the decision tree algorithm is applied. This can be
shown through the following analysis.
Architecture Diagram
(Module here represents our approach of attribute reduction)
IV. ANALYSIS USING WEKA AND ORANGE
1) Dataset description:
The experimental data considered for analysis contains 1000 records, each consisting of values for
attributes such as over draft, credit usage, existing credits, no. of dependents, employment of the user and more
and finally there is a class label which classifies the transaction based on these values into two classes namely,
good and bad, indicating whether the transaction was legal or illegal.A symbolic field can contain as low as two
values(e.g. the kind of credit card) up to several hundred thousand values (as the code) [2].
Note that the dataset used is a sample dataset, as actual dataset for credit card cannot be accessed since
it is a protected property of the banks or any other concerned financial organization.
The idea proposed in this paper is valid for the entire classification algorithm but for the sake of analysis, only
J48 (i.e. BasedC4.5) is used to show the result.
ATTRIB
UTE
VA
L
MAX
(%)
ATTRIB
UTE
VA
L
MAX
(%)
over_draf
t
4 39.4 Other
_paymen
t
_plans
3 81.4
avg_cred
it_balanc
e
5 60.3 Employe
m-
-ent
5 33.9
other
parties
3 90.7 Credit_
History
5 53
personal_
status
5 54.8 Property
_
magnitud
e
4 33.2
Housing 3 71.3 Purpose 11 28
own_
telephone
2 59.6 Job 4 63
foreign_
worker
2 96.3
(Table 1)
Increasing The Efficiency Of Credit Card...
www.theijes.com The IJES Page 3
VAL: number of the distinct values of the attribute
MAX: the percentage of maximum occurrence of a value in a particular attribute
Snapshot of attribute statistics for the attribute over_draft using ORANGE:
Snapshot of attribute statistics for the attribute foreign_worker using ORANGE:
Using the attribute statistics widget in ORANGE software the maximum percentage of occurrence of a
value in an attribute is obtained. For instance, in case of over_draft the MAX% is very low, hence it should not
be removed, whereas in case of foreign_worker, the value of VAL is very low and that of MAX is very
high,hence, this attribute will decrease efficiency of output and should be removed.
2) Comparison of different classification results done on the dataset:
All the following tests were performed with the help of WEKA software:
Test1- In this test the J48 algorithm has been implemented (i.e. extension of C4.5) on the dataset without
making any changes to any of its attributes.
Test2- In this test the foreign_worker attribute has been removed (as it has the highest % in the MAX column)
and then the same algorithm has been applied to compute the result.
Test3- In this test the other_payment_plansattribute has been removed from the original dataset (note that this
test is exclusive of the previous test i.e.foreign_workerattribute has not been removed) and then the same
algorithmhas been applied to compute the result.
Test4- Similarly, in this test the other_parties attribute has been removed (without changing any other attribute)
and then the same algorithm has been applied to compute the result.
Test5- In this test the housing attribute has been removed (without changing any other attribute) and then the
same algorithm has been applied to compute the result.
Test 6- In this test the foreign_worker, other_payement_plans, other_parties and housing attribute has been
removed (without changing any other attribute) and then the same algorithm has been applied to compute the
result.
After each test is done, the decision tree algorithm is applied; the following table contains the six
outcomes of the six tests respectively.
Tests % of correctly classified
instances using J48
Algorithm
Test 1 70.5
Test 2 72
Test 3 71
Test 4 72.1
Test 5 71
Test 6 72.9
(Table 2)
Snapshot of partial decision tree after test 1 using weka:
Increasing The Efficiency Of Credit Card...
www.theijes.com The IJES Page 4
Snapshot of partial decision tree after test 6 using weka:
(Comparison of Test Case1 with all the Test Cases)
V. CONCLUSION
From the results shown in the table 2, it can be seen that the percentage of the correctly classified
instances of J48 Algorithm is increasing whenever an attribute with a very high percentage of occurrence of a
single value (i.e. high value of MAX in table 1), and with very low number of distinct values for that particular
attribute (i.e. low value for VAL in table 1) throughout the records is being removed. This means that even if the
value of MAX is considerably high, the attribute should not be removed if the value of VAL is also high. In the
last test when all the 4 attributes satisfying this criteria were deleted the percentage of the correctly classified
instances jumped to 72.9% from 70.5% (result in case of normal classification done without deleting any
attribute). This showed an increase of 2.4% whichis a very prominent increase, considering the sensitivity of its
application and its impact on saving major monetary loss.
Hence by removing these kind of attributes the efficiency of the classification can be increased.Thus resulting in
a better and efficient way to identify the fraudulent transactions amongst all the credit card transactions
specified in the dataset.
REFERENCES
[1].
[2]. K.P. Soman, ShyamDiwaka, V. Ajay, “Insight into datamining theory and practice”, prentice-hall of
india, 2006.
[3]. R. Brause, T. Langsdorf, M. Hepp, “Neural Data Mining for Credit Card Fraud Detection”, Frankfurt,
Germany.
[4]. Dipti Thakur, Shalini Bhatia, ”Distributive Data Mining approach to Credit Card Fraud detection”,
SPIT-IEEE Colloquium and International Conference, Mumbai, India

More Related Content

What's hot

Survey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selectionSurvey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selectioneSAT Journals
 
C LUSTERING B ASED A TTRIBUTE S UBSET S ELECTION U SING F AST A LGORITHm
C LUSTERING  B ASED  A TTRIBUTE  S UBSET  S ELECTION  U SING  F AST  A LGORITHmC LUSTERING  B ASED  A TTRIBUTE  S UBSET  S ELECTION  U SING  F AST  A LGORITHm
C LUSTERING B ASED A TTRIBUTE S UBSET S ELECTION U SING F AST A LGORITHmIJCI JOURNAL
 
Control chart pattern recognition using k mica clustering and neural networks
Control chart pattern recognition using k mica clustering and neural networksControl chart pattern recognition using k mica clustering and neural networks
Control chart pattern recognition using k mica clustering and neural networksISA Interchange
 
IRJET- Evidence Chain for Missing Data Imputation: Survey
IRJET- Evidence Chain for Missing Data Imputation: SurveyIRJET- Evidence Chain for Missing Data Imputation: Survey
IRJET- Evidence Chain for Missing Data Imputation: SurveyIRJET Journal
 
An integrated mechanism for feature selection
An integrated mechanism for feature selectionAn integrated mechanism for feature selection
An integrated mechanism for feature selectionsai kumar
 
Machine_Learning_Trushita
Machine_Learning_TrushitaMachine_Learning_Trushita
Machine_Learning_TrushitaTrushita Redij
 
Data mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant AnalysisData mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant AnalysisIOSR Journals
 
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINEA NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINEaciijournal
 
Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...
Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...
Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...ijsrd.com
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Sagar Deogirkar
 
Improved correlation analysis and visualization of industrial alarm data
Improved correlation analysis and visualization of industrial alarm dataImproved correlation analysis and visualization of industrial alarm data
Improved correlation analysis and visualization of industrial alarm dataISA Interchange
 
CCC-Bicluster Analysis for Time Series Gene Expression Data
CCC-Bicluster Analysis for Time Series Gene Expression DataCCC-Bicluster Analysis for Time Series Gene Expression Data
CCC-Bicluster Analysis for Time Series Gene Expression DataIRJET Journal
 
Preprocessing and Classification in WEKA Using Different Classifiers
Preprocessing and Classification in WEKA Using Different ClassifiersPreprocessing and Classification in WEKA Using Different Classifiers
Preprocessing and Classification in WEKA Using Different ClassifiersIJERA Editor
 
IRJET- The Machine Learning: The method of Artificial Intelligence
IRJET- The Machine Learning: The method of Artificial IntelligenceIRJET- The Machine Learning: The method of Artificial Intelligence
IRJET- The Machine Learning: The method of Artificial IntelligenceIRJET Journal
 
Survey on Feature Selection and Dimensionality Reduction Techniques
Survey on Feature Selection and Dimensionality Reduction TechniquesSurvey on Feature Selection and Dimensionality Reduction Techniques
Survey on Feature Selection and Dimensionality Reduction TechniquesIRJET Journal
 

What's hot (19)

Survey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selectionSurvey on semi supervised classification methods and feature selection
Survey on semi supervised classification methods and feature selection
 
C LUSTERING B ASED A TTRIBUTE S UBSET S ELECTION U SING F AST A LGORITHm
C LUSTERING  B ASED  A TTRIBUTE  S UBSET  S ELECTION  U SING  F AST  A LGORITHmC LUSTERING  B ASED  A TTRIBUTE  S UBSET  S ELECTION  U SING  F AST  A LGORITHm
C LUSTERING B ASED A TTRIBUTE S UBSET S ELECTION U SING F AST A LGORITHm
 
Control chart pattern recognition using k mica clustering and neural networks
Control chart pattern recognition using k mica clustering and neural networksControl chart pattern recognition using k mica clustering and neural networks
Control chart pattern recognition using k mica clustering and neural networks
 
IRJET- Evidence Chain for Missing Data Imputation: Survey
IRJET- Evidence Chain for Missing Data Imputation: SurveyIRJET- Evidence Chain for Missing Data Imputation: Survey
IRJET- Evidence Chain for Missing Data Imputation: Survey
 
An integrated mechanism for feature selection
An integrated mechanism for feature selectionAn integrated mechanism for feature selection
An integrated mechanism for feature selection
 
Machine_Learning_Trushita
Machine_Learning_TrushitaMachine_Learning_Trushita
Machine_Learning_Trushita
 
Data mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant AnalysisData mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant Analysis
 
XL-MINER:Partition
XL-MINER:PartitionXL-MINER:Partition
XL-MINER:Partition
 
XL-MINER:Prediction
XL-MINER:PredictionXL-MINER:Prediction
XL-MINER:Prediction
 
XL Miner: Classification
XL Miner: ClassificationXL Miner: Classification
XL Miner: Classification
 
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINEA NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
 
Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...
Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...
Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
 
Improved correlation analysis and visualization of industrial alarm data
Improved correlation analysis and visualization of industrial alarm dataImproved correlation analysis and visualization of industrial alarm data
Improved correlation analysis and visualization of industrial alarm data
 
CCC-Bicluster Analysis for Time Series Gene Expression Data
CCC-Bicluster Analysis for Time Series Gene Expression DataCCC-Bicluster Analysis for Time Series Gene Expression Data
CCC-Bicluster Analysis for Time Series Gene Expression Data
 
XL-MINER: Data Exploration
XL-MINER: Data ExplorationXL-MINER: Data Exploration
XL-MINER: Data Exploration
 
Preprocessing and Classification in WEKA Using Different Classifiers
Preprocessing and Classification in WEKA Using Different ClassifiersPreprocessing and Classification in WEKA Using Different Classifiers
Preprocessing and Classification in WEKA Using Different Classifiers
 
IRJET- The Machine Learning: The method of Artificial Intelligence
IRJET- The Machine Learning: The method of Artificial IntelligenceIRJET- The Machine Learning: The method of Artificial Intelligence
IRJET- The Machine Learning: The method of Artificial Intelligence
 
Survey on Feature Selection and Dimensionality Reduction Techniques
Survey on Feature Selection and Dimensionality Reduction TechniquesSurvey on Feature Selection and Dimensionality Reduction Techniques
Survey on Feature Selection and Dimensionality Reduction Techniques
 

Viewers also liked

K0371063068
K0371063068K0371063068
K0371063068theijes
 
D0362023027
D0362023027D0362023027
D0362023027theijes
 
C026010018
C026010018C026010018
C026010018theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
D0373024030
D0373024030D0373024030
D0373024030theijes
 
Shellfish shell as a Bio-filler: Preparation, characterization and its effec...
	Shellfish shell as a Bio-filler: Preparation, characterization and its effec...	Shellfish shell as a Bio-filler: Preparation, characterization and its effec...
Shellfish shell as a Bio-filler: Preparation, characterization and its effec...theijes
 
Sources of Financing Shopping Centers in Lagos Metropolis
	Sources of Financing Shopping Centers in Lagos Metropolis	Sources of Financing Shopping Centers in Lagos Metropolis
Sources of Financing Shopping Centers in Lagos Metropolistheijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
B0350309011
B0350309011B0350309011
B0350309011theijes
 
C0255027032
C0255027032C0255027032
C0255027032theijes
 
Evaluation of Rubber Seed Oil as Foundry Sand-Core Binder in Castings
Evaluation of Rubber Seed Oil as Foundry Sand-Core Binder in CastingsEvaluation of Rubber Seed Oil as Foundry Sand-Core Binder in Castings
Evaluation of Rubber Seed Oil as Foundry Sand-Core Binder in Castingstheijes
 
E03504025036
E03504025036E03504025036
E03504025036theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 

Viewers also liked (18)

K0371063068
K0371063068K0371063068
K0371063068
 
D0362023027
D0362023027D0362023027
D0362023027
 
C026010018
C026010018C026010018
C026010018
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
D0373024030
D0373024030D0373024030
D0373024030
 
Shellfish shell as a Bio-filler: Preparation, characterization and its effec...
	Shellfish shell as a Bio-filler: Preparation, characterization and its effec...	Shellfish shell as a Bio-filler: Preparation, characterization and its effec...
Shellfish shell as a Bio-filler: Preparation, characterization and its effec...
 
Sources of Financing Shopping Centers in Lagos Metropolis
	Sources of Financing Shopping Centers in Lagos Metropolis	Sources of Financing Shopping Centers in Lagos Metropolis
Sources of Financing Shopping Centers in Lagos Metropolis
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
B0350309011
B0350309011B0350309011
B0350309011
 
C0255027032
C0255027032C0255027032
C0255027032
 
Evaluation of Rubber Seed Oil as Foundry Sand-Core Binder in Castings
Evaluation of Rubber Seed Oil as Foundry Sand-Core Binder in CastingsEvaluation of Rubber Seed Oil as Foundry Sand-Core Binder in Castings
Evaluation of Rubber Seed Oil as Foundry Sand-Core Binder in Castings
 
E03504025036
E03504025036E03504025036
E03504025036
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 

Similar to A02610104

IRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET Journal
 
AIRLINE FARE PRICE PREDICTION
AIRLINE FARE PRICE PREDICTIONAIRLINE FARE PRICE PREDICTION
AIRLINE FARE PRICE PREDICTIONIRJET Journal
 
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET Journal
 
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET Journal
 
Open06
Open06Open06
Open06butest
 
IRJET- Sentimental Analysis for Online Reviews using Machine Learning Algorithms
IRJET- Sentimental Analysis for Online Reviews using Machine Learning AlgorithmsIRJET- Sentimental Analysis for Online Reviews using Machine Learning Algorithms
IRJET- Sentimental Analysis for Online Reviews using Machine Learning AlgorithmsIRJET Journal
 
A Firefly based improved clustering algorithm
A Firefly based improved clustering algorithmA Firefly based improved clustering algorithm
A Firefly based improved clustering algorithmIRJET Journal
 
IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...IRJET Journal
 
Smart Health Guide App
Smart Health Guide AppSmart Health Guide App
Smart Health Guide AppIRJET Journal
 
IRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET Journal
 
Clustering of Big Data Using Different Data-Mining Techniques
Clustering of Big Data Using Different Data-Mining TechniquesClustering of Big Data Using Different Data-Mining Techniques
Clustering of Big Data Using Different Data-Mining TechniquesIRJET Journal
 
Paper-Allstate-Claim-Severity
Paper-Allstate-Claim-SeverityPaper-Allstate-Claim-Severity
Paper-Allstate-Claim-SeverityGon-soo Moon
 
IRJET-Scaling Distributed Associative Classifier using Big Data
IRJET-Scaling Distributed Associative Classifier using Big DataIRJET-Scaling Distributed Associative Classifier using Big Data
IRJET-Scaling Distributed Associative Classifier using Big DataIRJET Journal
 
Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...
Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...
Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...IRJET Journal
 
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETSURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETEditor IJMTER
 
Water Quality Index Calculation of River Ganga using Decision Tree Algorithm
Water Quality Index Calculation of River Ganga using Decision Tree AlgorithmWater Quality Index Calculation of River Ganga using Decision Tree Algorithm
Water Quality Index Calculation of River Ganga using Decision Tree AlgorithmIRJET Journal
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET Journal
 
The pertinent single-attribute-based classifier for small datasets classific...
The pertinent single-attribute-based classifier  for small datasets classific...The pertinent single-attribute-based classifier  for small datasets classific...
The pertinent single-attribute-based classifier for small datasets classific...IJECEIAES
 
Observations
ObservationsObservations
Observationsbutest
 
Review of Algorithms for Crime Analysis & Prediction
Review of Algorithms for Crime Analysis & PredictionReview of Algorithms for Crime Analysis & Prediction
Review of Algorithms for Crime Analysis & PredictionIRJET Journal
 

Similar to A02610104 (20)

IRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data Mining
 
AIRLINE FARE PRICE PREDICTION
AIRLINE FARE PRICE PREDICTIONAIRLINE FARE PRICE PREDICTION
AIRLINE FARE PRICE PREDICTION
 
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms Comparison
 
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms Comparison
 
Open06
Open06Open06
Open06
 
IRJET- Sentimental Analysis for Online Reviews using Machine Learning Algorithms
IRJET- Sentimental Analysis for Online Reviews using Machine Learning AlgorithmsIRJET- Sentimental Analysis for Online Reviews using Machine Learning Algorithms
IRJET- Sentimental Analysis for Online Reviews using Machine Learning Algorithms
 
A Firefly based improved clustering algorithm
A Firefly based improved clustering algorithmA Firefly based improved clustering algorithm
A Firefly based improved clustering algorithm
 
IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...
 
Smart Health Guide App
Smart Health Guide AppSmart Health Guide App
Smart Health Guide App
 
IRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep Learning
 
Clustering of Big Data Using Different Data-Mining Techniques
Clustering of Big Data Using Different Data-Mining TechniquesClustering of Big Data Using Different Data-Mining Techniques
Clustering of Big Data Using Different Data-Mining Techniques
 
Paper-Allstate-Claim-Severity
Paper-Allstate-Claim-SeverityPaper-Allstate-Claim-Severity
Paper-Allstate-Claim-Severity
 
IRJET-Scaling Distributed Associative Classifier using Big Data
IRJET-Scaling Distributed Associative Classifier using Big DataIRJET-Scaling Distributed Associative Classifier using Big Data
IRJET-Scaling Distributed Associative Classifier using Big Data
 
Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...
Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...
Hybrid Model using Unsupervised Filtering Based on Ant Colony Optimization an...
 
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETSURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
 
Water Quality Index Calculation of River Ganga using Decision Tree Algorithm
Water Quality Index Calculation of River Ganga using Decision Tree AlgorithmWater Quality Index Calculation of River Ganga using Decision Tree Algorithm
Water Quality Index Calculation of River Ganga using Decision Tree Algorithm
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
 
The pertinent single-attribute-based classifier for small datasets classific...
The pertinent single-attribute-based classifier  for small datasets classific...The pertinent single-attribute-based classifier  for small datasets classific...
The pertinent single-attribute-based classifier for small datasets classific...
 
Observations
ObservationsObservations
Observations
 
Review of Algorithms for Crime Analysis & Prediction
Review of Algorithms for Crime Analysis & PredictionReview of Algorithms for Crime Analysis & Prediction
Review of Algorithms for Crime Analysis & Prediction
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

A02610104

  • 1. The International Journal Of Engineering And Science (IJES) ||Volume||2 ||Issue|| 6 ||Pages||01-04||2013|| ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805 www.theijes.com The IJES Page 1 Increasing the Efficiency of Credit Card Fraud Deduction using Attribute Reduction Geetha Mary A, Arun Kodnani, Harshit Singhal, Swati Kothari School of Computing Science and Engineering, VIT University, Vellore, Tamil Nadu, India ----------------------------------------------------------ABSTRACT------------------------------------------------------------ The detection of fraudulent credit card usage is of immense importance for banks as well as the card users and requires highly efficient techniques to increase the chance of correctly classifying each transaction as fraud or genuine. One of the techniques used to perform this classification is decision tree. Attribute reduction is used to increase the efficiency of the technique, which is decided based on entropy. INDEX TERMS:- Data Mining, Decision tree, data cleaning, Attribute Reduction, Entropy --------------------------------------------------------------------------------------------------------------------------------------- Date Of Submission: 15 May 2013 Date Of Publication: 10,June.2013 ----------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION In today’s economy, credit cards hold utmost importance in many sectors. Credit card fraud detection is a topic which is applicable to many industries including banking and financial sectors, insurance, government agencies, etc. Fraudulent transactions are a significant problem, one that will grow in importance as the number of access points grow. Certainly, all transactions which deal with known illegal use are not authorised. Nevertheless, there are transactions which appear to be valid but experienced people can tell that they are probably misused, caused by stolen cards or fake merchants. So, the task is to avoid fraud by a credit card transaction before it is known as illegal. The paper deals with the problem specific to this special data mining application and tries to solve them by doing data cleaning[3]using attribute reduction and then applying decision tree technique to achieve improved efficiency of output. II. METHODOLOGY Decision trees are the methodologies to classify data into discrete ones using the tree structured algorithms. The main purpose of the decision tree is to expose the structural information contained in the data. Decision tree is made by tentatively selecting an attribute to place on the root node and make one branch for each possible value of that attribute [1]. Thus, the data set at the root node split and moves into daughter nodes producing a partial tree. Then an assessment is made of the quality of the split. This process is repeated with all the attributes. Each attribute chosen for splitting produces a partial tree. Depending on the quality of the partial tree, one partial tree is selected. This virtually means selecting an attribute for splitting. The process is repeated for the data in each daughter node of the selected partial tree. If at any time, all instances at the node have the same classification, stop developing that part of the tree. The assessment is made depending upon the purity of the daughter nodes produced; the most widely used measure to do this is called information entropy[1]. Entropy is a concept originated in thermodynamics but later found its way to information theory. In the decision tree construction process, definition of entropy as a measure of disorder suits well. If the class values of the data in a node are equally divided among possible values of the class value, it can be said, that entropy is maximum. If the class values of the data in a node are same for all records, then entropy is minimum. Through splitting, pure nodes have to be achieved, as far as it is possible. This corresponds to reducing the entropy of the system. However, this may not be as simple as it sounds for there is no way to stop the training set from containing two examples with identical sets of attributes but different classes.To overcome the problem mentioned above, the concept of information gain is used. In addition to information entropy, information gain[1] also takes into consideration the factor of the number and size of daughter nodes into which attribute splits the data set.
  • 2. Increasing The Efficiency Of Credit Card... www.theijes.com The IJES Page 2 III. APPROACH There are also cases in which an attribute claims its position as the root node of a certain partial tree during the building of the decision tree on the basis of both information gain and entropy. There may exist such an attribute which has same value for majority of the records. Although, it may be an appropriate candidate for that position but since its value doesn’t vary much over the entire dataset, considering it for classification would reduce the efficiency of the algorithm. Including these attributes results in undesirable efficiency reduction. Thus, such unnecessary attributes are reduced first, and then the decision tree algorithm is applied. This can be shown through the following analysis. Architecture Diagram (Module here represents our approach of attribute reduction) IV. ANALYSIS USING WEKA AND ORANGE 1) Dataset description: The experimental data considered for analysis contains 1000 records, each consisting of values for attributes such as over draft, credit usage, existing credits, no. of dependents, employment of the user and more and finally there is a class label which classifies the transaction based on these values into two classes namely, good and bad, indicating whether the transaction was legal or illegal.A symbolic field can contain as low as two values(e.g. the kind of credit card) up to several hundred thousand values (as the code) [2]. Note that the dataset used is a sample dataset, as actual dataset for credit card cannot be accessed since it is a protected property of the banks or any other concerned financial organization. The idea proposed in this paper is valid for the entire classification algorithm but for the sake of analysis, only J48 (i.e. BasedC4.5) is used to show the result. ATTRIB UTE VA L MAX (%) ATTRIB UTE VA L MAX (%) over_draf t 4 39.4 Other _paymen t _plans 3 81.4 avg_cred it_balanc e 5 60.3 Employe m- -ent 5 33.9 other parties 3 90.7 Credit_ History 5 53 personal_ status 5 54.8 Property _ magnitud e 4 33.2 Housing 3 71.3 Purpose 11 28 own_ telephone 2 59.6 Job 4 63 foreign_ worker 2 96.3 (Table 1)
  • 3. Increasing The Efficiency Of Credit Card... www.theijes.com The IJES Page 3 VAL: number of the distinct values of the attribute MAX: the percentage of maximum occurrence of a value in a particular attribute Snapshot of attribute statistics for the attribute over_draft using ORANGE: Snapshot of attribute statistics for the attribute foreign_worker using ORANGE: Using the attribute statistics widget in ORANGE software the maximum percentage of occurrence of a value in an attribute is obtained. For instance, in case of over_draft the MAX% is very low, hence it should not be removed, whereas in case of foreign_worker, the value of VAL is very low and that of MAX is very high,hence, this attribute will decrease efficiency of output and should be removed. 2) Comparison of different classification results done on the dataset: All the following tests were performed with the help of WEKA software: Test1- In this test the J48 algorithm has been implemented (i.e. extension of C4.5) on the dataset without making any changes to any of its attributes. Test2- In this test the foreign_worker attribute has been removed (as it has the highest % in the MAX column) and then the same algorithm has been applied to compute the result. Test3- In this test the other_payment_plansattribute has been removed from the original dataset (note that this test is exclusive of the previous test i.e.foreign_workerattribute has not been removed) and then the same algorithmhas been applied to compute the result. Test4- Similarly, in this test the other_parties attribute has been removed (without changing any other attribute) and then the same algorithm has been applied to compute the result. Test5- In this test the housing attribute has been removed (without changing any other attribute) and then the same algorithm has been applied to compute the result. Test 6- In this test the foreign_worker, other_payement_plans, other_parties and housing attribute has been removed (without changing any other attribute) and then the same algorithm has been applied to compute the result. After each test is done, the decision tree algorithm is applied; the following table contains the six outcomes of the six tests respectively. Tests % of correctly classified instances using J48 Algorithm Test 1 70.5 Test 2 72 Test 3 71 Test 4 72.1 Test 5 71 Test 6 72.9 (Table 2) Snapshot of partial decision tree after test 1 using weka:
  • 4. Increasing The Efficiency Of Credit Card... www.theijes.com The IJES Page 4 Snapshot of partial decision tree after test 6 using weka: (Comparison of Test Case1 with all the Test Cases) V. CONCLUSION From the results shown in the table 2, it can be seen that the percentage of the correctly classified instances of J48 Algorithm is increasing whenever an attribute with a very high percentage of occurrence of a single value (i.e. high value of MAX in table 1), and with very low number of distinct values for that particular attribute (i.e. low value for VAL in table 1) throughout the records is being removed. This means that even if the value of MAX is considerably high, the attribute should not be removed if the value of VAL is also high. In the last test when all the 4 attributes satisfying this criteria were deleted the percentage of the correctly classified instances jumped to 72.9% from 70.5% (result in case of normal classification done without deleting any attribute). This showed an increase of 2.4% whichis a very prominent increase, considering the sensitivity of its application and its impact on saving major monetary loss. Hence by removing these kind of attributes the efficiency of the classification can be increased.Thus resulting in a better and efficient way to identify the fraudulent transactions amongst all the credit card transactions specified in the dataset. REFERENCES [1]. [2]. K.P. Soman, ShyamDiwaka, V. Ajay, “Insight into datamining theory and practice”, prentice-hall of india, 2006. [3]. R. Brause, T. Langsdorf, M. Hepp, “Neural Data Mining for Credit Card Fraud Detection”, Frankfurt, Germany. [4]. Dipti Thakur, Shalini Bhatia, ”Distributive Data Mining approach to Credit Card Fraud detection”, SPIT-IEEE Colloquium and International Conference, Mumbai, India