TABLE OF CONTENTS ix
|
|
- Elfrieda Bishop
- 6 years ago
- Views:
Transcription
1 TABLE OF CONTENTS ix
2 TABLE OF CONTENTS Page Certification Declaration Acknowledgement Research Publications Table of Contents Abbreviations List of Figures List of Tables List of Keywords Abstract i ii iii v ix xiv xviii xxi xxiii xxv CHAPTERS 1 INTRODUCTION Clustering Partitioning Methods Hierarchical Agglomerative methods The Single Link Method The Complete Link Method The Group Average Method Text Based Documents Outlier analysis Support Vector Machine Multi-Clustering Collective Animal Behavior Supervised Learning Unsupervised Learning Thesis outline 24 x
3 2 LITERATURE SURVEY Introduction Credit Card Fraud Detection using Various Methods and Techniques Credit Card Fraud Detection in Unbalanced Datasets Meta Classifier System for Credit Card Fraud Detection Role of Support Vector Machine Role of Clustering and Outlier Detection Role of Collective Animal Behaviors Summary 86 3 OBJECTIVE Summary 92 4 RESEARCH FRAMEWORK Introduction Unsupervised Approach Cost Based Support Vector Machine Approach Behavior Based Support Vector Machine Approach Hybrid Approach Summary 98 5 NOVEL APPROACH TO CREDIT CARD FRAUD DETECTION MODEL Introduction Data Pre-Processing Detection Process using Clustering Detection Process using Outliers Detection in Dense Region Detection in Sparse Region Summary 110 xi
4 6 FRAUD DETECTION IN IMBALANCED DATASETS USING COST BASED LEARNING Introduction Data Pre-Processing Detection Based on the Support Vector Machine Summary BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES Introduction Data Pre-Processing Behavior Based Approach Summary HYBRID APPROACH FOR IMPROVISING CREDIT CARD FRAUD DETECTION BASED ON COLLECTIVE ANIMAL BEHAVIOR AND SVM Introduction Pre-Processing the Dataset Multi-Clustering SVM Based Approach Collective Animal Behavior Approach Summary ANALYSIS RESULTS Unsupervised Approach Cost Based Support Vector Machine Approach Behavior Based Support Vector Machine Approach Hybrid Approach 152 xii
5 11 CONCLUSION AND FUTURE RESEARCH Summary of the Research Achievements Limitations Recommendations for Further Work 160 REFERENCES 161 CITATIONS 176 xiii
6 ABBREVIATIONS xiv
7 ABBREVIATIONS ADMP ACO AISFD AIS ANN APACS ATMs BP BBN BN B2B B2C CNP CCFD CLARA CLARANs CORM CBLOF CLINK CL C2B C2C CS-SVM CROO DEMIDS DCSA e-payment EM FP - Absolute Distance between Medoid - Ant Colony Optimization - Artificial Immune System for Fraud Detection - Artificial immune systems - Artificial Neural Network - Association of Payment and Clearing Services - Automated Teller Machines - Back-Propagation - Bayesian belief networks - Bayesian Networks - Business-to Business - Business-to-Consumer - Cardholder-Not-Present - Credit Card Fraud Detection - Clustering around LARGE Applications - Clustering Large Applications based on RAndomized Search - Cluster based OutlieR Minera - Clustering Based Local Outlier Factor - Complete Link Method - Confidence Level - Consumer-to- Business - Consumer-to-Consumer - Cost Based Support Vector Machines - Capture Resilient Online One-time password scheme - Distance Based Outlier Detection for Data Streams - Dynamic Clonal Selection Algorithm - Electronic Payment - Expectation Maximization - False Positive xv
8 FDS - Fraud Detection System FN - False Negative FP - False positive FPR - False Positive Rate FPM - Fraud Pattern Mining FPOF - Frequent Pattern Outlier Factor GESD - Generalized Extreme Studentized Deviate GA - Genetic Algorithm HMM - Hidden Markov Model HMRs - Hidden Markov Random Fields JAM - Java Agents for Metalearning k-nn - k-nearest Neighbour LCF - Local Connective Factor LOF - Local Outlier Factor MAE - Mean Absolute Error NFMS - Neural Fraud Management Systems NN - Neural Networks NRI - Non Received Issue OTP - One-Time Passwords PGNN - Parallel Granular Neural Networks PSO - Particle Swarm Optimization PAM - Partitioning Around Medoid PIN - Personal Identification Number P-RCE - Restricted Coulomb Energy PCA - Principal Component Analysis QRT - Questionnaire-Responded Transaction RBFN - Radial Basis Function Network RDA - Receptor Density Algorithm RNN - Replicator Neural Networks ROC - Receiver Operating Characteristic SOM - Self-Organizing Maps xvi
9 SLINK SVM SMOTE TN TP TPR UAVs VDM WS - Single Link Method - Support Vector Machine - Synthetic minority over-sampling Technique - True Negative - True Positive - True Positive Rate - Unmanned Air Vehicles - Value Difference Metric - Wattz-Strogatz xvii
10 LIST OF FIGURES xviii
11 LIST OF FIGURES Figure Description Page 1.1 Yearly Credit Card Frauds Inconsistent Distributions between the Training Data and Real Data Conceptual Framework for Classification of Frauds Sample Cluster Cluster 3 and Cluster 4 are Considered Outliers Artificial Linear Separable Two-Dimension Binary Classification Problem SVM with Maximal Margin Hybrid Sampling Model for Fraud Detection QRT Approach for Predicting Frauds State of Hidden Markov Model Illustration of the Predictive Nature of Flocks CCFD Framework Outline of the Fraud Detection Process Sparse and Dense Region Representation Flowchart of the Fraud Detection Process Sample Input Data for SVM Workflow of the SVM Model Difference between Over Fitting Classifier and a Better Classifier Flowchart of the Fraud Detection using SVM Data Processing in Behavior Based SVM Behavior Based Fraud Detection Using SVM Flowchart For Hybrid Approach Fraud Detection Sample Data Input Data for SVM 134 xix
12 8.4 Hybrid Approach For Improvising Fraud Detection ROC - GESD and Q-Test ROC - SVM ROC - Behavior Based SVM PR - Behavior Based SVM ROC - Hybrid Approach PR - Hybrid Approach 154 xx
13 LIST OF TABLES xxi
14 LIST OF TABLES Table Description Page 5.1 Qcrit values Confusion Matrix Sample-100 Data Sample-500 Data Sample-1000 Data TPR and FPR for GESD and Q-Test Sample Confusion Matrix Set For SVM TPR and FPR - Behavior based SVM Sample Confusion Matrix Set With TPR and FPR Precision, Recall and F-Measure Sample values 155 xxii
15 LIST OF KEYWORDS xxiii
16 LIST OF KEYWORDS Classification Clustering Collective Animal Behavior Confusion Matrix Data Mining E-commerce Fraud Detection Hybrid Approach Machine Learning Outlier Detection Supervised Learning Support Vector Machine Unsupervised Learning xxiv
From Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques. Full book available for purchase here.
From Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques. Full book available for purchase here. Contents List of Figures xv Foreword xxiii Preface xxv Acknowledgments xxix Chapter
More informationPreface to the third edition Preface to the first edition Acknowledgments
Contents Foreword Preface to the third edition Preface to the first edition Acknowledgments Part I PRELIMINARIES XXI XXIII XXVII XXIX CHAPTER 1 Introduction 3 1.1 What Is Business Analytics?................
More informationKeywords acrm, RFM, Clustering, Classification, SMOTE, Metastacking
Volume 5, Issue 9, September 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative
More informationImproving Credit Card Fraud Detection using a Meta- Classification Strategy
Improving Credit Card Fraud Detection using a Meta- Classification Strategy Joseph Pun, Yuri Lawryshyn Department of Applied Chemistry and Engineering, University of Toronto Toronto ABSTRACT One of the
More informationFrom Profit Driven Business Analytics. Full book available for purchase here.
From Profit Driven Business Analytics. Full book available for purchase here. Contents Foreword xv Acknowledgments xvii Chapter 1 A Value-Centric Perspective Towards Analytics 1 Introduction 1 Business
More informationMachine Learning Techniques For Particle Identification
Machine Learning Techniques For Particle Identification 06.March.2018 I Waleed Esmail, Tobias Stockmanns, Michael Kunkel, James Ritman Institut für Kernphysik (IKP), Forschungszentrum Jülich Outlines:
More informationLEED Reference Guide for Green Building Operations and Maintenance For the Operations and Maintenance of Commercial and Institutional Buildings 2009
LEED Reference Guide for Green Building Operations and Maintenance For the Operations and Maintenance of Commercial and Institutional Buildings 2009 Edition COPYRIGHT DISCLAIMER ii LEED REFERENCE GUIDE
More informationWorkflow Administration of PTC Windchill 11.1
Workflow Administration of PTC Windchill 11.1 Overview Course Code Course Length TRN-5266-T 16 Hours In this course, you will learn about Windchill workflow features and how to design, configure, and test
More informationCopyr i g ht 2012, SAS Ins titut e Inc. All rights res er ve d. ENTERPRISE MINER: ANALYTICAL MODEL DEVELOPMENT
ENTERPRISE MINER: ANALYTICAL MODEL DEVELOPMENT ANALYTICAL MODEL DEVELOPMENT AGENDA Enterprise Miner: Analytical Model Development The session looks at: - Supervised and Unsupervised Modelling - Classification
More informationAn Unbalanced Data Classification Model Using Hybrid Sampling Technique for Fraud Detection
An Unbalanced Data Classification Model Using Hybrid Sampling Technique for Fraud Detection T. Maruthi Padmaja 1, Narendra Dhulipalla 1, P. Radha Krishna 1, Raju S. Bapi 2, and A. Laha 1 1 Institute for
More informationPrediction of Success or Failure of Software Projects based on Reusability Metrics using Support Vector Machine
Prediction of Success or Failure of Software Projects based on Reusability Metrics using Support Vector Machine R. Sathya Assistant professor, Department of Computer Science & Engineering Annamalai University
More informationOnline Credit Card Fraudulent Detection Using Data Mining
S.Aravindh 1, S.Venkatesan 2 and A.Kumaravel 3 1&2 Department of Computer Science and Engineering, Gojan School of Business and Technology, Chennai - 600 052, Tamil Nadu, India 23 Department of Computer
More informationData Mining Applications with R
Data Mining Applications with R Yanchang Zhao Senior Data Miner, RDataMining.com, Australia Associate Professor, Yonghua Cen Nanjing University of Science and Technology, China AMSTERDAM BOSTON HEIDELBERG
More informationAn Investigation into the Use of Negation in Inductive Rule Learning for Text Classification
An Investigation into the Use of Negation in Inductive Rule Learning for Text Classification Thesis submitted in accordance with the requirements of the University of Liverpool for the degree of Doctor
More informationPlease purchase PDF Split-Merge on to remove this watermark. Contents
Contents CONTENTS PAGE NO. ACKNOWLEDGEMENTS LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS ABSTRACT i iii iv vi x CHAPTERS 1 INTRODUCTION 1 1.1 INTRODUCTION 1 1.2 OBJECTIVES OF THE THESIS 2 1.3 MACHINE
More informationEffective CRM Using. Predictive Analytics. Antonios Chorianopoulos
Effective CRM Using Predictive Analytics Antonios Chorianopoulos WlLEY Contents Preface Acknowledgments xiii xv 1 An overview of data mining: The applications, the methodology, the algorithms, and the
More informationTABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS
viii TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS iii xv xx xxiii 1 INTRODUCTION 1 1.1 GENERAL 1 1.2 NEED FOR THE PRESENT STUDY 4 1.3 OBJECTIVES
More informationFraud Detection for MCC Manipulation
2016 International Conference on Informatics, Management Engineering and Industrial Application (IMEIA 2016) ISBN: 978-1-60595-345-8 Fraud Detection for MCC Manipulation Hong-feng CHAI 1, Xin LIU 2, Yan-jun
More informationPredictive Analytics Using Support Vector Machine
International Journal for Modern Trends in Science and Technology Volume: 03, Special Issue No: 02, March 2017 ISSN: 2455-3778 http://www.ijmtst.com Predictive Analytics Using Support Vector Machine Ch.Sai
More informationGSAW 2018 Machine Learning
GSAW 2018 Machine Learning Space Ground System Working Group Move the Algorithms; Not the Data! Dan Brennan Sr. Director Mission Solutions daniel.p.brennan@oracle.com Feb, 2018 Copyright 2018, Oracle and/or
More informationA Survey on Application of Data Mining Techniques; It s Proficiency In Fraud Detection of Credit Card
A Survey on Application of Data Mining Techniques; It s Proficiency In Fraud Detection of Credit Card Aliza Zafar* and Mehreen Sirshar Department of Software Engineering, Fatima Jinnah Women University,
More informationHow to build and deploy machine learning projects
How to build and deploy machine learning projects Litan Ilany, Advanced Analytics litan.ilany@intel.com Agenda Introduction Machine Learning: Exploration vs Solution CRISP-DM Flow considerations Other
More informationCross-market Behavior Modeling
Faculty of Engineering and InformationTechnology University of Technology, Sydney Cross-market Behavior Modeling A thesis submitted in partial fulfillment of the requirements for the degree of Doctor of
More informationWritten as per the revised syllabus prescribed by the Maharashtra State Board of Secondary and Higher Secondary Education, Pune.
Written as per the revised syllabus prescribed by the Maharashtra State Board of Secondary and Higher Secondary Education, Pune. Precise Biology I STD. XII Sci. Salient Features Concise coverage of syllabus
More informationVideo Traffic Classification
Video Traffic Classification A Machine Learning approach with Packet Based Features using Support Vector Machine Videotrafikklassificering En Maskininlärningslösning med Paketbasereade Features och Supportvektormaskin
More informationManaging PTC Creo Parametric Data with PTC Windchill PDMLink 11.0
Managing PTC Creo Parametric Data with PTC Windchill PDMLink 11.0 Overview Course Code Course Length TRN-4770-T 8 Hours In this Process-based course, you will learn about the Windchill PDMLink Creo Parametric
More informationInformal note by the co chairs
Draft elements for SBSTA agenda item 11 (c) Draft decision on the work programme under the framework for non market approaches referred to in Article 6, paragraph 8, of the Paris Agreement Informal note
More informationThe PTC Windchill PDMLink 11.1 MCAD Data Management Process for PTC Creo Parametric
The PTC Windchill PDMLink 11.1 MCAD Data Management Process for PTC Creo Parametric Overview Course Code Course Length TRN-5230-T 8 Hours In this Process-based course, you will learn about the Windchill
More informationSEISMIC ATTRIBUTES SELECTION AND POROSITY PREDICTION USING MODIFIED ARTIFICIAL IMMUNE NETWORK ALGORITHM
Journal of Engineering Science and Technology Vol. 13, No. 3 (2018) 755-765 School of Engineering, Taylor s University SEISMIC ATTRIBUTES SELECTION AND POROSITY PREDICTION USING MODIFIED ARTIFICIAL IMMUNE
More informationScienceDirect. An Efficient CRM-Data Mining Framework for the Prediction of Customer Behaviour
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 725 731 International Conference on Information and Communication Technologies (ICICT 2014) An Efficient CRM-Data
More informationRequest for Proposal Corrigendum 02. Selection of Service Provider for User Acceptance Test (UAT) & Automation Testing
Request for Proposal Corrigendum 02 Dated: 07 th November, 2015 Selection of Service Provider for User Acceptance Test (UAT) & Automation Testing RFP Tender Number: 05-2015/16 Dated: 15 th October, 2015
More informationTHE GENERAL ASSEMBLY OF PENNSYLVANIA SENATE BILL
PRINTER'S NO. 1 THE GENERAL ASSEMBLY OF PENNSYLVANIA SENATE BILL No. 10 Session of 01 INTRODUCED BY TEPLITZ, BLAKE, HUGHES, SCHWANK, COSTA, BOSCOLA, SMITH, FARNESE, TARTAGLIONE AND RAFFERTY, JANUARY 1,
More informationBioinformatics. Microarrays: designing chips, clustering methods. Fran Lewitter, Ph.D. Head, Biocomputing Whitehead Institute
Bioinformatics Microarrays: designing chips, clustering methods Fran Lewitter, Ph.D. Head, Biocomputing Whitehead Institute Course Syllabus Jan 7 Jan 14 Jan 21 Jan 28 Feb 4 Feb 11 Feb 18 Feb 25 Sequence
More informationForecasting Electricity Consumption with Neural Networks and Support Vector Regression
Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 58 ( 2012 ) 1576 1585 8 th International Strategic Management Conference Forecasting Electricity Consumption with Neural
More informationINDEPENDENT ELECTRICAL CONTRACTORS SAFETY PROGRAM AWARENESS & RETENTION KIT
INDEPENDENT ELECTRICAL CONTRACTORS SAFETY Deadline to complete is July 15, 2018 Contact Information Company Name: Address: City/State/Zip: Phone: Fax: E-mail: Chapter Name: Date Completed: Preparer s Name:
More informationInternational Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0047 ISSN (Online): 2279-0055 International
More informationBusiness Administration of PTC Windchill 11.0
Business Administration of PTC Windchill 11.0 Overview Course Code Course Length TRN-4810-T 16 Hours In this course, you will gain an understanding of basic Windchill business administration tasks. You
More informationA Study of Financial Distress Prediction based on Discernibility Matrix and ANN Xin-Zhong BAO 1,a,*, Xiu-Zhuan MENG 1, Hong-Yu FU 1
International Conference on Management Science and Management Innovation (MSMI 2014) A Study of Financial Distress Prediction based on Discernibility Matrix and ANN Xin-Zhong BAO 1,a,*, Xiu-Zhuan MENG
More informationProfessor Dr. Gholamreza Nakhaeizadeh. Professor Dr. Gholamreza Nakhaeizadeh
Statistic Methods in in Mining Business Understanding Understanding Preparation Deployment Modelling Evaluation Mining Process (( Part 3) 3) Professor Dr. Gholamreza Nakhaeizadeh Professor Dr. Gholamreza
More informationNetSuite Financial User Sample Test: April 2018
1 NetSuite Financial User Sample Test 2018 2 Contents About this Sample Test... 3 I. Recognize what a subsidiary is, types of subsidiaries, and how they are used.... 4 II. Identify the general functionality
More informationData Mining and Applications in Genomics
Data Mining and Applications in Genomics Lecture Notes in Electrical Engineering Volume 25 For other titles published in this series, go to www.springer.com/series/7818 Sio-Iong Ao Data Mining and Applications
More information2015 The MathWorks, Inc. 1
2015 The MathWorks, Inc. 1 MATLAB 을이용한머신러닝 ( 기본 ) Senior Application Engineer 엄준상과장 2015 The MathWorks, Inc. 2 Machine Learning is Everywhere Solution is too complex for hand written rules or equations
More informationBig Data. Methodological issues in using Big Data for Official Statistics
Giulio Barcaroli Istat (barcarol@istat.it) Big Data Effective Processing and Analysis of Very Large and Unstructured data for Official Statistics. Methodological issues in using Big Data for Official Statistics
More informationPreface... iii Introduction... xvii Chapter 1: Introduction to Management Information System... 1
Table of Contents Preface... iii Introduction... xvii Chapter 1: Introduction to Management Information System... 1 1.1 Introduction... 2 1.2 Concept of Information System (IS)... 2 1.2.1 Computer Literacy
More informationDeep Fraud. Doing research with financial data
Deep Fraud Doing research with financial data Chapter 1: Problem Statement Each time a new card payment arrives to our mainframe, provide a risk score (from 0 to 99) Apply this score together with some
More informationText Categorization. Hongning Wang
Text Categorization Hongning Wang CS@UVa Today s lecture Bayes decision theory Supervised text categorization General steps for text categorization Feature selection methods Evaluation metrics CS@UVa CS
More informationText Categorization. Hongning Wang
Text Categorization Hongning Wang CS@UVa Today s lecture Bayes decision theory Supervised text categorization General steps for text categorization Feature selection methods Evaluation metrics CS@UVa CS
More informationA Protein Secondary Structure Prediction Method Based on BP Neural Network Ru-xi YIN, Li-zhen LIU*, Wei SONG, Xin-lei ZHAO and Chao DU
2017 2nd International Conference on Artificial Intelligence: Techniques and Applications (AITA 2017 ISBN: 978-1-60595-491-2 A Protein Secondary Structure Prediction Method Based on BP Neural Network Ru-xi
More informationTABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS
viii TABLE OF CONTENTS ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS v xviii xix xxii 1. INTRODUCTION 1 1.1 MOTIVATION OF THE RESEARCH 1 1.2 OVERVIEW OF PROPOSED WORK 3 1.3
More informationPredictive Analytics Cheat Sheet
Predictive Analytics The use of advanced technology to help legal teams separate datasets by relevancy or issue in order to prioritize documents for expedited review. Often referred to as Technology Assisted
More informationBioinformatics for Biologists
Bioinformatics for Biologists Functional Genomics: Microarray Data Analysis Fran Lewitter, Ph.D. Head, Biocomputing Whitehead Institute Outline Introduction Working with microarray data Normalization Analysis
More informationAUTOMATED INTERPRETABLE COMPUTATIONAL BIOLOGY IN THE CLINIC: A FRAMEWORK TO PREDICT DISEASE SEVERITY AND STRATIFY PATIENTS FROM CLINICAL DATA
Interdisciplinary Description of Complex Systems 15(3), 199-208, 2017 AUTOMATED INTERPRETABLE COMPUTATIONAL BIOLOGY IN THE CLINIC: A FRAMEWORK TO PREDICT DISEASE SEVERITY AND STRATIFY PATIENTS FROM CLINICAL
More informationData Analytics for Semiconductor Manufacturing The MathWorks, Inc. 1
Data Analytics for Semiconductor Manufacturing 2016 The MathWorks, Inc. 1 Competitive Advantage What do we mean by Data Analytics? Analytics uses data to drive decision making, rather than gut feel or
More informationPREDICTION OF PIPE PERFORMANCE WITH MACHINE LEARNING USING R
PREDICTION OF PIPE PERFORMANCE WITH MACHINE LEARNING USING R Name: XXXXXX Student Number: XXXXXXX 2016-11-29 1. Instruction As one of the most important infrastructures in cities, water mains buried underground
More informationIntelligence and. Vivek Kaie
Enterprise Performance Intelligence and Decision Patterns Vivek Kaie /0\ CRC Press \CtJ Taylor & Francis Croup V- 'S Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an
More informationPrediction of Binding Sites in the Mouse Genome Using Support Vector Machines
Prediction of Binding Sites in the Mouse Genome Using Support Vector Machines Yi Sun 1, Mark Robinson 2, Rod Adams 1, Alistair Rust 3, and Neil Davey 1 1 Science and technology research school, University
More information[Kaur*, 5(3): March,2016] ISSN: (I2OR), Publication Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY HYBRID APPROACH OF BOOSTED TREE FOR CHURN PREDICTION IN MATLAB Navneet Kaur *, Naseeb Singh * M.Tech Student, Department of IT,
More informationUNOFFICIAL TRANSLATION (COMPLETE OFFICIAL CHINESE GUIDELINES BELOW) Translated from Chinese by Kevin Li
UNOFFICIAL TRANSLATION (COMPLETE OFFICIAL CHINESE GUIDELINES BELOW) Translated from Chinese by Kevin Li China Banking Association s Corporate Social Responsibility Guidelines (Excerpt) Chapter III Social
More informationSubmitted in fulfilment of the requirements for the degree of Doctor of Philosophy at the University of Technology, Sydney. 29 January, 1996.
COUNTERTRADE AND THE INTERNATIONALISATION OF THE AUSTRALIAN FIRM RICHARD FLETCHER, B.A., M.A.(Sydney), M.Com.(NSW). Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy at
More informationIMPACTS OF EPA S CARBON PROPOSAL ON UTAH
IMPACTS OF EPA S CARBON PROPOSAL ON UTAH BACKGROUND In 2013, coal provided 81% of Utah s electricity, with natural gas providing 15%, and renewables and other sources providing the remaining 4%. i Utah
More informationPredicting Protein Contact Map By Bagging Decision Trees
Bucknell University Bucknell Digital Commons Honors Theses Student Theses 2015 Predicting Protein Contact Map By Bagging Decision Trees Chuqiao Ren cr025@bucknell.edu Follow this and additional works at:
More informationClassification of DNA Sequences Using Convolutional Neural Network Approach
UTM Computing Proceedings Innovations in Computing Technology and Applications Volume 2 Year: 2017 ISBN: 978-967-0194-95-0 1 Classification of DNA Sequences Using Convolutional Neural Network Approach
More informationCOPYRIGHTED MATERIAL. Contents
Contents Preface xxiii Introduction xxv Part I Defining and Using Project Management Process Groups 1 Chapter 1 What Is a Project? 5 Defining a Project 6 Sequence of Activities 6 Unique Activities 6 Complex
More informationadvanced analysis of gene expression microarray data aidong zhang World Scientific State University of New York at Buffalo, USA
advanced analysis of gene expression microarray data aidong zhang State University of New York at Buffalo, USA World Scientific NEW JERSEY LONDON SINGAPORE BEIJING SHANGHAI HONG KONG TAIPEI CHENNAI Contents
More informationSoftware Metrics. Practical Approach. A Rigorous and. Norman Fenton. James Bieman THIRD EDITION. CRC Press CHAPMAN & HALIVCRC INNOVATIONS IN
CHAPMAN & HALIVCRC INNOVATIONS IN SOFTWARE ENGINEERING AND SOFTWARE DEVELOPMENT Software Metrics A Rigorous and Practical Approach THIRD EDITION Norman Fenton Queen Mary University of London. UK James
More informationAN INVESTIGATION INTO THE RISKS OF OUTSOURCING OF KNOWLEDGE RICH, SUPPLY CRITICAL ELEMENTS WITHIN SUPPLY NETWORKS: A SRI LANKAN CONTEXT
AN INVESTIGATION INTO THE RISKS OF OUTSOURCING OF KNOWLEDGE RICH, SUPPLY CRITICAL ELEMENTS WITHIN SUPPLY NETWORKS: A SRI LANKAN CONTEXT Lindamullage Don Charls Shirekha Layangani (128010 M) Thesis submitted
More informationUnlocking the Power of Big Data Analytics for Application Security and Security Operation
Unlocking the Power of Big Data Analytics for Application Security and Security Operation Virginia Lee, Senior Security Architect CISSP, CISA, CEH 1 September 2018 What is Machine Learning? Learning from
More informationApplication of Intelligent Methods for Improving the Performance of COCOMO in Software Projects
Application of Intelligent Methods for Improving the Performance of COCOMO in Software Projects Mahboobeh Dorosti,. Vahid Khatibi Bardsiri Department of Computer Engineering, Kerman Branch, Islamic Azad
More informationBIOINF/BENG/BIMM/CHEM/CSE 184: Computational Molecular Biology. Lecture 2: Microarray analysis
BIOINF/BENG/BIMM/CHEM/CSE 184: Computational Molecular Biology Lecture 2: Microarray analysis Genome wide measurement of gene transcription using DNA microarray Bruce Alberts, et al., Molecular Biology
More information(Revised Programme Published as on )
Master of Personal Management (MPM) (Choice Based Credit Grading System Pattern 80/20 Oct- 2015) Programme Summer March/April-2017 The shall be held on the days, dates and time mentioned below at all Centers
More informationStudy on the Application of Data Mining in Bioinformatics. Mingyang Yuan
International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2016) Study on the Application of Mining in Bioinformatics Mingyang Yuan School of Science and Liberal Arts, New
More informationDecision Support Systems
Decision Support Systems 50 (2011) 602 613 Contents lists available at ScienceDirect Decision Support Systems journal homepage: www.elsevier.com/locate/dss Data mining for credit card fraud: A comparative
More informationConclusions and Future Work
Chapter 9 Conclusions and Future Work Having done the exhaustive study of recommender systems belonging to various domains, stock market prediction systems, social resource recommender, tag recommender
More informationRFP FOR SUPPLY, INTEGRATION, OPERATIONALISATION & MAINTENANCE OF CASH ACCEPTOR CUM ATM (CAA)
Corrigendum Notice Annexure-I This is with reference to the RFP FOR SUPPLY, INTEGRATION, OPERATIONALISATION & MAINTENANCE OF CASH ACCEPTOR CUM ATM (CAA). In this regard, all the prospective bidders are
More informationMetaheuristics. Approximate. Metaheuristics used for. Math programming LP, IP, NLP, DP. Heuristics
Metaheuristics Meta Greek word for upper level methods Heuristics Greek word heuriskein art of discovering new strategies to solve problems. Exact and Approximate methods Exact Math programming LP, IP,
More informationEpigenetics and DNase-Seq
Epigenetics and DNase-Seq BMI/CS 776 www.biostat.wisc.edu/bmi776/ Spring 2018 Anthony Gitter gitter@biostat.wisc.edu These slides, excluding third-party material, are licensed under CC BY-NC 4.0 by Anthony
More informationABSTRACT: KEYWORDS: Anomaly detection, Hidden Markov Model, Online Transactions, Data Mining, Clustering,Probability,Security.
International Journal of Computational Engineering Research Vol, 03 Issue, 7 Anomaly Detection Using Hidden Markov Model 1, Sonali N.Jadhav, 2, Kiran Bhandari 1 M.E Scholar, 1,2,Assitant Professor, Thakur
More informationAnomaly Detection Using Hidden
8th INTERNATIONAL FORUM ON STRATEGIC TECHNOLOGY VOL:2 YEAR 2013 Anomaly Detection Approach Using Hidden Markov Model 1, Sonali N.Jadhav, 2, Kiran Bhandari 1 M.E Scholar, 1,2,Assitant Professor, Thakur
More informationContract workers and labour standards: Experiences from India
Contract workers and labour standards: Experiences from India What is contract labour? Definition as per law A workman is deemed to be employed as Contract Labour when he is hired in connection with the
More informationTABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS
vii TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS iii xi xv xviii 1 INTRODUCTION 1 1.1 BACKGROUND OF RESEARCH 1 1.2 MOTIVATION FOR
More information2005/2006 Study of Consumer Payment Preferences. Table of Contents
Table of Contents Chapter 1: Executive Summary...1 Overview...1 Objectives and Methodology...2 Key Findings...4 In-Store Payments...5 Internet Payments...8 Bill Payments...10 Cash...13 Debit Cards...15
More informationSENIOR COMMUNICATIONS OPERATOR, 1467
2-22-91 SENIOR COMMUNICATIONS OPERATOR, 1467 Summary of Duties: A Senior Communications Operator assigns, reviews, and evaluates the work of Communications Operators who operate private branch exchange
More informationImproving Computational Predictions of Cis- Regulatory Binding Sites
Improving Computational Predictions of Cis- Regulatory Binding Sites Mark Robinson, Yi Sun, Rene Te Boekhorst, Paul Kaye, Rod Adams, Neil Davey, and Alistair G. Rust Pacific Symposium on Biocomputing :39-402(2006)
More informationArticle II Definitions Section 200 Interpretation II Definitions II-1
CHAPTER 27 ZONING TABLE OF CONTENTS Page Article I Introductory Provisions Section 100 Short Title I-1 101 Purpose I-1 102 Interpretation I-1 103 Scope I-1 104 Conflict I-2 105 Validity I-2 106 Repealer
More informationMonitoring PTC Windchill 11.0 Performance Using the PTC System Monitor
Monitoring PTC Windchill 11.0 Performance Using the PTC System Monitor Overview Course Code Course Length TRN-4832-T 8 Hours In this course, you will learn how to use PTC System Monitor to manage and troubleshoot
More informationOracle Spreadsheet Add-In for Predictive Analytics for Life Sciences Problems
Oracle Life Sciences eseminar Oracle Spreadsheet Add-In for Predictive Analytics for Life Sciences Problems http://conference.oracle.com Meeting Place: US Toll Free: 1-888-967-2253 US Only: 1-650-607-2253
More informationOPTIMIZED BALANCED SCORECARD INTEGRATED MODEL FOR EVALUATION OF ORGANIZATIONS PERFORMANCE
OPTIMIZED BALANCED SCORECARD INTEGRATED MODEL FOR EVALUATION OF ORGANIZATIONS PERFORMANCE by Hagag Maher Abd El-Hameed Abou El-Hasan B.Sc. Industrial Engineering A Thesis Submitted to the Faculty of Engineering
More informationAn Implementation of genetic algorithm based feature selection approach over medical datasets
An Implementation of genetic algorithm based feature selection approach over medical s Dr. A. Shaik Abdul Khadir #1, K. Mohamed Amanullah #2 #1 Research Department of Computer Science, KhadirMohideen College,
More informationGOVERNMENT ANALYTICS LEADERSHIP FORUM SAS Canada & The Institute of Public Administration of Canada. April 26 The Shaw Centre
GOVERNMENT ANALYTICS LEADERSHIP FORUM SAS Canada & The Institute of Public Administration of Canada April 26 The Shaw Centre Ottawa Artificial Intelligence Algorithms Automation Deep Learning Machine Learning
More informationOPTIMAL SELECTION OF PROCESS PARAMETERS OF ULTRASONIC MACHINING (USM) SYSTEM
OPTIMAL SELECTION OF PROCESS PARAMETERS OF ULTRASONIC MACHINING (USM) SYSTEM BY H. L A L C H H U A N V E L A B.E. (Mech), MNNIT, Allahabad (Formerly M.N.R.E.C., Allahabad), 1987; M.Tech. (Mech), IT-BHU,
More informationI N D E X. Preface Acknowledgement Index List of Tables List of Figures List of Maps List of Abbreviations Used
Preface Acknowledgement Index List of Tables List of Figures List of Maps List of Abbreviations Used I N D E X Contents Page No I III V XIII XXI XXV XXVI Chapter I: Introduction & Methodology 1-104 1.1
More informationPredictive Accuracy: A Misleading Performance Measure for Highly Imbalanced Data
Paper 942-2017 Predictive Accuracy: A Misleading Performance Measure for Highly Imbalanced Data Josephine S Akosa, Oklahoma State University ABSTRACT The most commonly reported model evaluation metric
More informationIn silico prediction of novel therapeutic targets using gene disease association data
In silico prediction of novel therapeutic targets using gene disease association data, PhD, Associate GSK Fellow Scientific Leader, Computational Biology and Stats, Target Sciences GSK Big Data in Medicine
More informationTITLE 252. DEPARTMENT OF ENVIRONMENTAL QUALITY CHAPTER 690. WATER QUALITY STANDARDS IMPLEMENTATION SUBCHAPTER 1. INTRODUCTION
TITLE 252. DEPARTMENT OF ENVIRONMENTAL QUALITY CHAPTER 690. WATER QUALITY STANDARDS IMPLEMENTATION SUBCHAPTER 1. INTRODUCTION 252:690-1-4. Incorporation of EPA regulations by reference The following federal
More informationSample Outline of ICD-10 Three-Day Curriculum for Health Plans
Sample Outline of ICD-10 Three-Day Curriculum for Health Plans I. Introduction 1. Implementation Curriculum Chapters II. Chapter 1 ICD-10 Awareness 2. ICD-10 Strategic Steering Committee 3. ICD-10 Understanding
More informationEvaluation next steps Lift and Costs
Evaluation next steps Lift and Costs Outline Lift and Gains charts *ROC Cost-sensitive learning Evaluation for numeric predictions 2 Application Example: Direct Marketing Paradigm Find most likely prospects
More informationBioinformatics for Biologists
Bioinformatics for Biologists Microarray Data Analysis. Lecture 1. Fran Lewitter, Ph.D. Director Bioinformatics and Research Computing Whitehead Institute Outline Introduction Working with microarray data
More informationINT L TRADE LAW BASIC GATT PILLARS I. Prof David K. Linnan USC LAW # 665 Unit Four
INT L TRADE LAW BASIC GATT PILLARS I Prof David K. Linnan USC LAW # 665 Unit Four GATT PILLARS FOUR PILLARS Idea of four pillars within GATT/WTO system: 1. Most Favored Nations 2. National Treatment 3.
More information7 Scheduling with Positional Effects Scheduling Independent Jobs Under Job-Dependent Positional Effect Scheduling Independent
Contents Part I Models and Methods of Classical Scheduling 1 Models and Concepts of Classical Scheduling... 3 1.1 Classical Scheduling Models......................... 4 1.1.1 Machine Environment........................
More informationResearch on Personal Credit Assessment Based. Neural Network-Logistic Regression Combination
Open Journal of Business and Management, 2017, 5, 244-252 http://www.scirp.org/journal/ojbm ISSN Online: 2329-3292 ISSN Print: 2329-3284 Research on Personal Credit Assessment Based on Neural Network-Logistic
More information