TABLE OF CONTENTS ix

Size: px
Start display at page:

Download "TABLE OF CONTENTS ix"

Transcription

1 TABLE OF CONTENTS ix

2 TABLE OF CONTENTS Page Certification Declaration Acknowledgement Research Publications Table of Contents Abbreviations List of Figures List of Tables List of Keywords Abstract i ii iii v ix xiv xviii xxi xxiii xxv CHAPTERS 1 INTRODUCTION Clustering Partitioning Methods Hierarchical Agglomerative methods The Single Link Method The Complete Link Method The Group Average Method Text Based Documents Outlier analysis Support Vector Machine Multi-Clustering Collective Animal Behavior Supervised Learning Unsupervised Learning Thesis outline 24 x

3 2 LITERATURE SURVEY Introduction Credit Card Fraud Detection using Various Methods and Techniques Credit Card Fraud Detection in Unbalanced Datasets Meta Classifier System for Credit Card Fraud Detection Role of Support Vector Machine Role of Clustering and Outlier Detection Role of Collective Animal Behaviors Summary 86 3 OBJECTIVE Summary 92 4 RESEARCH FRAMEWORK Introduction Unsupervised Approach Cost Based Support Vector Machine Approach Behavior Based Support Vector Machine Approach Hybrid Approach Summary 98 5 NOVEL APPROACH TO CREDIT CARD FRAUD DETECTION MODEL Introduction Data Pre-Processing Detection Process using Clustering Detection Process using Outliers Detection in Dense Region Detection in Sparse Region Summary 110 xi

4 6 FRAUD DETECTION IN IMBALANCED DATASETS USING COST BASED LEARNING Introduction Data Pre-Processing Detection Based on the Support Vector Machine Summary BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES Introduction Data Pre-Processing Behavior Based Approach Summary HYBRID APPROACH FOR IMPROVISING CREDIT CARD FRAUD DETECTION BASED ON COLLECTIVE ANIMAL BEHAVIOR AND SVM Introduction Pre-Processing the Dataset Multi-Clustering SVM Based Approach Collective Animal Behavior Approach Summary ANALYSIS RESULTS Unsupervised Approach Cost Based Support Vector Machine Approach Behavior Based Support Vector Machine Approach Hybrid Approach 152 xii

5 11 CONCLUSION AND FUTURE RESEARCH Summary of the Research Achievements Limitations Recommendations for Further Work 160 REFERENCES 161 CITATIONS 176 xiii

6 ABBREVIATIONS xiv

7 ABBREVIATIONS ADMP ACO AISFD AIS ANN APACS ATMs BP BBN BN B2B B2C CNP CCFD CLARA CLARANs CORM CBLOF CLINK CL C2B C2C CS-SVM CROO DEMIDS DCSA e-payment EM FP - Absolute Distance between Medoid - Ant Colony Optimization - Artificial Immune System for Fraud Detection - Artificial immune systems - Artificial Neural Network - Association of Payment and Clearing Services - Automated Teller Machines - Back-Propagation - Bayesian belief networks - Bayesian Networks - Business-to Business - Business-to-Consumer - Cardholder-Not-Present - Credit Card Fraud Detection - Clustering around LARGE Applications - Clustering Large Applications based on RAndomized Search - Cluster based OutlieR Minera - Clustering Based Local Outlier Factor - Complete Link Method - Confidence Level - Consumer-to- Business - Consumer-to-Consumer - Cost Based Support Vector Machines - Capture Resilient Online One-time password scheme - Distance Based Outlier Detection for Data Streams - Dynamic Clonal Selection Algorithm - Electronic Payment - Expectation Maximization - False Positive xv

8 FDS - Fraud Detection System FN - False Negative FP - False positive FPR - False Positive Rate FPM - Fraud Pattern Mining FPOF - Frequent Pattern Outlier Factor GESD - Generalized Extreme Studentized Deviate GA - Genetic Algorithm HMM - Hidden Markov Model HMRs - Hidden Markov Random Fields JAM - Java Agents for Metalearning k-nn - k-nearest Neighbour LCF - Local Connective Factor LOF - Local Outlier Factor MAE - Mean Absolute Error NFMS - Neural Fraud Management Systems NN - Neural Networks NRI - Non Received Issue OTP - One-Time Passwords PGNN - Parallel Granular Neural Networks PSO - Particle Swarm Optimization PAM - Partitioning Around Medoid PIN - Personal Identification Number P-RCE - Restricted Coulomb Energy PCA - Principal Component Analysis QRT - Questionnaire-Responded Transaction RBFN - Radial Basis Function Network RDA - Receptor Density Algorithm RNN - Replicator Neural Networks ROC - Receiver Operating Characteristic SOM - Self-Organizing Maps xvi

9 SLINK SVM SMOTE TN TP TPR UAVs VDM WS - Single Link Method - Support Vector Machine - Synthetic minority over-sampling Technique - True Negative - True Positive - True Positive Rate - Unmanned Air Vehicles - Value Difference Metric - Wattz-Strogatz xvii

10 LIST OF FIGURES xviii

11 LIST OF FIGURES Figure Description Page 1.1 Yearly Credit Card Frauds Inconsistent Distributions between the Training Data and Real Data Conceptual Framework for Classification of Frauds Sample Cluster Cluster 3 and Cluster 4 are Considered Outliers Artificial Linear Separable Two-Dimension Binary Classification Problem SVM with Maximal Margin Hybrid Sampling Model for Fraud Detection QRT Approach for Predicting Frauds State of Hidden Markov Model Illustration of the Predictive Nature of Flocks CCFD Framework Outline of the Fraud Detection Process Sparse and Dense Region Representation Flowchart of the Fraud Detection Process Sample Input Data for SVM Workflow of the SVM Model Difference between Over Fitting Classifier and a Better Classifier Flowchart of the Fraud Detection using SVM Data Processing in Behavior Based SVM Behavior Based Fraud Detection Using SVM Flowchart For Hybrid Approach Fraud Detection Sample Data Input Data for SVM 134 xix

12 8.4 Hybrid Approach For Improvising Fraud Detection ROC - GESD and Q-Test ROC - SVM ROC - Behavior Based SVM PR - Behavior Based SVM ROC - Hybrid Approach PR - Hybrid Approach 154 xx

13 LIST OF TABLES xxi

14 LIST OF TABLES Table Description Page 5.1 Qcrit values Confusion Matrix Sample-100 Data Sample-500 Data Sample-1000 Data TPR and FPR for GESD and Q-Test Sample Confusion Matrix Set For SVM TPR and FPR - Behavior based SVM Sample Confusion Matrix Set With TPR and FPR Precision, Recall and F-Measure Sample values 155 xxii

15 LIST OF KEYWORDS xxiii

16 LIST OF KEYWORDS Classification Clustering Collective Animal Behavior Confusion Matrix Data Mining E-commerce Fraud Detection Hybrid Approach Machine Learning Outlier Detection Supervised Learning Support Vector Machine Unsupervised Learning xxiv

From Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques. Full book available for purchase here.

From Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques. Full book available for purchase here. From Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques. Full book available for purchase here. Contents List of Figures xv Foreword xxiii Preface xxv Acknowledgments xxix Chapter

More information

Preface to the third edition Preface to the first edition Acknowledgments

Preface to the third edition Preface to the first edition Acknowledgments Contents Foreword Preface to the third edition Preface to the first edition Acknowledgments Part I PRELIMINARIES XXI XXIII XXVII XXIX CHAPTER 1 Introduction 3 1.1 What Is Business Analytics?................

More information

Keywords acrm, RFM, Clustering, Classification, SMOTE, Metastacking

Keywords acrm, RFM, Clustering, Classification, SMOTE, Metastacking Volume 5, Issue 9, September 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative

More information

Improving Credit Card Fraud Detection using a Meta- Classification Strategy

Improving Credit Card Fraud Detection using a Meta- Classification Strategy Improving Credit Card Fraud Detection using a Meta- Classification Strategy Joseph Pun, Yuri Lawryshyn Department of Applied Chemistry and Engineering, University of Toronto Toronto ABSTRACT One of the

More information

From Profit Driven Business Analytics. Full book available for purchase here.

From Profit Driven Business Analytics. Full book available for purchase here. From Profit Driven Business Analytics. Full book available for purchase here. Contents Foreword xv Acknowledgments xvii Chapter 1 A Value-Centric Perspective Towards Analytics 1 Introduction 1 Business

More information

Machine Learning Techniques For Particle Identification

Machine Learning Techniques For Particle Identification Machine Learning Techniques For Particle Identification 06.March.2018 I Waleed Esmail, Tobias Stockmanns, Michael Kunkel, James Ritman Institut für Kernphysik (IKP), Forschungszentrum Jülich Outlines:

More information

LEED Reference Guide for Green Building Operations and Maintenance For the Operations and Maintenance of Commercial and Institutional Buildings 2009

LEED Reference Guide for Green Building Operations and Maintenance For the Operations and Maintenance of Commercial and Institutional Buildings 2009 LEED Reference Guide for Green Building Operations and Maintenance For the Operations and Maintenance of Commercial and Institutional Buildings 2009 Edition COPYRIGHT DISCLAIMER ii LEED REFERENCE GUIDE

More information

Workflow Administration of PTC Windchill 11.1

Workflow Administration of PTC Windchill 11.1 Workflow Administration of PTC Windchill 11.1 Overview Course Code Course Length TRN-5266-T 16 Hours In this course, you will learn about Windchill workflow features and how to design, configure, and test

More information

Copyr i g ht 2012, SAS Ins titut e Inc. All rights res er ve d. ENTERPRISE MINER: ANALYTICAL MODEL DEVELOPMENT

Copyr i g ht 2012, SAS Ins titut e Inc. All rights res er ve d. ENTERPRISE MINER: ANALYTICAL MODEL DEVELOPMENT ENTERPRISE MINER: ANALYTICAL MODEL DEVELOPMENT ANALYTICAL MODEL DEVELOPMENT AGENDA Enterprise Miner: Analytical Model Development The session looks at: - Supervised and Unsupervised Modelling - Classification

More information

An Unbalanced Data Classification Model Using Hybrid Sampling Technique for Fraud Detection

An Unbalanced Data Classification Model Using Hybrid Sampling Technique for Fraud Detection An Unbalanced Data Classification Model Using Hybrid Sampling Technique for Fraud Detection T. Maruthi Padmaja 1, Narendra Dhulipalla 1, P. Radha Krishna 1, Raju S. Bapi 2, and A. Laha 1 1 Institute for

More information

Prediction of Success or Failure of Software Projects based on Reusability Metrics using Support Vector Machine

Prediction of Success or Failure of Software Projects based on Reusability Metrics using Support Vector Machine Prediction of Success or Failure of Software Projects based on Reusability Metrics using Support Vector Machine R. Sathya Assistant professor, Department of Computer Science & Engineering Annamalai University

More information

Online Credit Card Fraudulent Detection Using Data Mining

Online Credit Card Fraudulent Detection Using Data Mining S.Aravindh 1, S.Venkatesan 2 and A.Kumaravel 3 1&2 Department of Computer Science and Engineering, Gojan School of Business and Technology, Chennai - 600 052, Tamil Nadu, India 23 Department of Computer

More information

Data Mining Applications with R

Data Mining Applications with R Data Mining Applications with R Yanchang Zhao Senior Data Miner, RDataMining.com, Australia Associate Professor, Yonghua Cen Nanjing University of Science and Technology, China AMSTERDAM BOSTON HEIDELBERG

More information

An Investigation into the Use of Negation in Inductive Rule Learning for Text Classification

An Investigation into the Use of Negation in Inductive Rule Learning for Text Classification An Investigation into the Use of Negation in Inductive Rule Learning for Text Classification Thesis submitted in accordance with the requirements of the University of Liverpool for the degree of Doctor

More information

Please purchase PDF Split-Merge on to remove this watermark. Contents

Please purchase PDF Split-Merge on   to remove this watermark. Contents Contents CONTENTS PAGE NO. ACKNOWLEDGEMENTS LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS ABSTRACT i iii iv vi x CHAPTERS 1 INTRODUCTION 1 1.1 INTRODUCTION 1 1.2 OBJECTIVES OF THE THESIS 2 1.3 MACHINE

More information

Effective CRM Using. Predictive Analytics. Antonios Chorianopoulos

Effective CRM Using. Predictive Analytics. Antonios Chorianopoulos Effective CRM Using Predictive Analytics Antonios Chorianopoulos WlLEY Contents Preface Acknowledgments xiii xv 1 An overview of data mining: The applications, the methodology, the algorithms, and the

More information

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS viii TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS iii xv xx xxiii 1 INTRODUCTION 1 1.1 GENERAL 1 1.2 NEED FOR THE PRESENT STUDY 4 1.3 OBJECTIVES

More information

Fraud Detection for MCC Manipulation

Fraud Detection for MCC Manipulation 2016 International Conference on Informatics, Management Engineering and Industrial Application (IMEIA 2016) ISBN: 978-1-60595-345-8 Fraud Detection for MCC Manipulation Hong-feng CHAI 1, Xin LIU 2, Yan-jun

More information

Predictive Analytics Using Support Vector Machine

Predictive Analytics Using Support Vector Machine International Journal for Modern Trends in Science and Technology Volume: 03, Special Issue No: 02, March 2017 ISSN: 2455-3778 http://www.ijmtst.com Predictive Analytics Using Support Vector Machine Ch.Sai

More information

GSAW 2018 Machine Learning

GSAW 2018 Machine Learning GSAW 2018 Machine Learning Space Ground System Working Group Move the Algorithms; Not the Data! Dan Brennan Sr. Director Mission Solutions daniel.p.brennan@oracle.com Feb, 2018 Copyright 2018, Oracle and/or

More information

A Survey on Application of Data Mining Techniques; It s Proficiency In Fraud Detection of Credit Card

A Survey on Application of Data Mining Techniques; It s Proficiency In Fraud Detection of Credit Card A Survey on Application of Data Mining Techniques; It s Proficiency In Fraud Detection of Credit Card Aliza Zafar* and Mehreen Sirshar Department of Software Engineering, Fatima Jinnah Women University,

More information

How to build and deploy machine learning projects

How to build and deploy machine learning projects How to build and deploy machine learning projects Litan Ilany, Advanced Analytics litan.ilany@intel.com Agenda Introduction Machine Learning: Exploration vs Solution CRISP-DM Flow considerations Other

More information

Cross-market Behavior Modeling

Cross-market Behavior Modeling Faculty of Engineering and InformationTechnology University of Technology, Sydney Cross-market Behavior Modeling A thesis submitted in partial fulfillment of the requirements for the degree of Doctor of

More information

Written as per the revised syllabus prescribed by the Maharashtra State Board of Secondary and Higher Secondary Education, Pune.

Written as per the revised syllabus prescribed by the Maharashtra State Board of Secondary and Higher Secondary Education, Pune. Written as per the revised syllabus prescribed by the Maharashtra State Board of Secondary and Higher Secondary Education, Pune. Precise Biology I STD. XII Sci. Salient Features Concise coverage of syllabus

More information

Video Traffic Classification

Video Traffic Classification Video Traffic Classification A Machine Learning approach with Packet Based Features using Support Vector Machine Videotrafikklassificering En Maskininlärningslösning med Paketbasereade Features och Supportvektormaskin

More information

Managing PTC Creo Parametric Data with PTC Windchill PDMLink 11.0

Managing PTC Creo Parametric Data with PTC Windchill PDMLink 11.0 Managing PTC Creo Parametric Data with PTC Windchill PDMLink 11.0 Overview Course Code Course Length TRN-4770-T 8 Hours In this Process-based course, you will learn about the Windchill PDMLink Creo Parametric

More information

Informal note by the co chairs

Informal note by the co chairs Draft elements for SBSTA agenda item 11 (c) Draft decision on the work programme under the framework for non market approaches referred to in Article 6, paragraph 8, of the Paris Agreement Informal note

More information

The PTC Windchill PDMLink 11.1 MCAD Data Management Process for PTC Creo Parametric

The PTC Windchill PDMLink 11.1 MCAD Data Management Process for PTC Creo Parametric The PTC Windchill PDMLink 11.1 MCAD Data Management Process for PTC Creo Parametric Overview Course Code Course Length TRN-5230-T 8 Hours In this Process-based course, you will learn about the Windchill

More information

SEISMIC ATTRIBUTES SELECTION AND POROSITY PREDICTION USING MODIFIED ARTIFICIAL IMMUNE NETWORK ALGORITHM

SEISMIC ATTRIBUTES SELECTION AND POROSITY PREDICTION USING MODIFIED ARTIFICIAL IMMUNE NETWORK ALGORITHM Journal of Engineering Science and Technology Vol. 13, No. 3 (2018) 755-765 School of Engineering, Taylor s University SEISMIC ATTRIBUTES SELECTION AND POROSITY PREDICTION USING MODIFIED ARTIFICIAL IMMUNE

More information

ScienceDirect. An Efficient CRM-Data Mining Framework for the Prediction of Customer Behaviour

ScienceDirect. An Efficient CRM-Data Mining Framework for the Prediction of Customer Behaviour Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 725 731 International Conference on Information and Communication Technologies (ICICT 2014) An Efficient CRM-Data

More information

Request for Proposal Corrigendum 02. Selection of Service Provider for User Acceptance Test (UAT) & Automation Testing

Request for Proposal Corrigendum 02. Selection of Service Provider for User Acceptance Test (UAT) & Automation Testing Request for Proposal Corrigendum 02 Dated: 07 th November, 2015 Selection of Service Provider for User Acceptance Test (UAT) & Automation Testing RFP Tender Number: 05-2015/16 Dated: 15 th October, 2015

More information

THE GENERAL ASSEMBLY OF PENNSYLVANIA SENATE BILL

THE GENERAL ASSEMBLY OF PENNSYLVANIA SENATE BILL PRINTER'S NO. 1 THE GENERAL ASSEMBLY OF PENNSYLVANIA SENATE BILL No. 10 Session of 01 INTRODUCED BY TEPLITZ, BLAKE, HUGHES, SCHWANK, COSTA, BOSCOLA, SMITH, FARNESE, TARTAGLIONE AND RAFFERTY, JANUARY 1,

More information

Bioinformatics. Microarrays: designing chips, clustering methods. Fran Lewitter, Ph.D. Head, Biocomputing Whitehead Institute

Bioinformatics. Microarrays: designing chips, clustering methods. Fran Lewitter, Ph.D. Head, Biocomputing Whitehead Institute Bioinformatics Microarrays: designing chips, clustering methods Fran Lewitter, Ph.D. Head, Biocomputing Whitehead Institute Course Syllabus Jan 7 Jan 14 Jan 21 Jan 28 Feb 4 Feb 11 Feb 18 Feb 25 Sequence

More information

Forecasting Electricity Consumption with Neural Networks and Support Vector Regression

Forecasting Electricity Consumption with Neural Networks and Support Vector Regression Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 58 ( 2012 ) 1576 1585 8 th International Strategic Management Conference Forecasting Electricity Consumption with Neural

More information

INDEPENDENT ELECTRICAL CONTRACTORS SAFETY PROGRAM AWARENESS & RETENTION KIT

INDEPENDENT ELECTRICAL CONTRACTORS SAFETY PROGRAM AWARENESS & RETENTION KIT INDEPENDENT ELECTRICAL CONTRACTORS SAFETY Deadline to complete is July 15, 2018 Contact Information Company Name: Address: City/State/Zip: Phone: Fax: E-mail: Chapter Name: Date Completed: Preparer s Name:

More information

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0047 ISSN (Online): 2279-0055 International

More information

Business Administration of PTC Windchill 11.0

Business Administration of PTC Windchill 11.0 Business Administration of PTC Windchill 11.0 Overview Course Code Course Length TRN-4810-T 16 Hours In this course, you will gain an understanding of basic Windchill business administration tasks. You

More information

A Study of Financial Distress Prediction based on Discernibility Matrix and ANN Xin-Zhong BAO 1,a,*, Xiu-Zhuan MENG 1, Hong-Yu FU 1

A Study of Financial Distress Prediction based on Discernibility Matrix and ANN Xin-Zhong BAO 1,a,*, Xiu-Zhuan MENG 1, Hong-Yu FU 1 International Conference on Management Science and Management Innovation (MSMI 2014) A Study of Financial Distress Prediction based on Discernibility Matrix and ANN Xin-Zhong BAO 1,a,*, Xiu-Zhuan MENG

More information

Professor Dr. Gholamreza Nakhaeizadeh. Professor Dr. Gholamreza Nakhaeizadeh

Professor Dr. Gholamreza Nakhaeizadeh. Professor Dr. Gholamreza Nakhaeizadeh Statistic Methods in in Mining Business Understanding Understanding Preparation Deployment Modelling Evaluation Mining Process (( Part 3) 3) Professor Dr. Gholamreza Nakhaeizadeh Professor Dr. Gholamreza

More information

NetSuite Financial User Sample Test: April 2018

NetSuite Financial User Sample Test: April 2018 1 NetSuite Financial User Sample Test 2018 2 Contents About this Sample Test... 3 I. Recognize what a subsidiary is, types of subsidiaries, and how they are used.... 4 II. Identify the general functionality

More information

Data Mining and Applications in Genomics

Data Mining and Applications in Genomics Data Mining and Applications in Genomics Lecture Notes in Electrical Engineering Volume 25 For other titles published in this series, go to www.springer.com/series/7818 Sio-Iong Ao Data Mining and Applications

More information

2015 The MathWorks, Inc. 1

2015 The MathWorks, Inc. 1 2015 The MathWorks, Inc. 1 MATLAB 을이용한머신러닝 ( 기본 ) Senior Application Engineer 엄준상과장 2015 The MathWorks, Inc. 2 Machine Learning is Everywhere Solution is too complex for hand written rules or equations

More information

Big Data. Methodological issues in using Big Data for Official Statistics

Big Data. Methodological issues in using Big Data for Official Statistics Giulio Barcaroli Istat (barcarol@istat.it) Big Data Effective Processing and Analysis of Very Large and Unstructured data for Official Statistics. Methodological issues in using Big Data for Official Statistics

More information

Preface... iii Introduction... xvii Chapter 1: Introduction to Management Information System... 1

Preface... iii Introduction... xvii Chapter 1: Introduction to Management Information System... 1 Table of Contents Preface... iii Introduction... xvii Chapter 1: Introduction to Management Information System... 1 1.1 Introduction... 2 1.2 Concept of Information System (IS)... 2 1.2.1 Computer Literacy

More information

Deep Fraud. Doing research with financial data

Deep Fraud. Doing research with financial data Deep Fraud Doing research with financial data Chapter 1: Problem Statement Each time a new card payment arrives to our mainframe, provide a risk score (from 0 to 99) Apply this score together with some

More information

Text Categorization. Hongning Wang

Text Categorization. Hongning Wang Text Categorization Hongning Wang CS@UVa Today s lecture Bayes decision theory Supervised text categorization General steps for text categorization Feature selection methods Evaluation metrics CS@UVa CS

More information

Text Categorization. Hongning Wang

Text Categorization. Hongning Wang Text Categorization Hongning Wang CS@UVa Today s lecture Bayes decision theory Supervised text categorization General steps for text categorization Feature selection methods Evaluation metrics CS@UVa CS

More information

A Protein Secondary Structure Prediction Method Based on BP Neural Network Ru-xi YIN, Li-zhen LIU*, Wei SONG, Xin-lei ZHAO and Chao DU

A Protein Secondary Structure Prediction Method Based on BP Neural Network Ru-xi YIN, Li-zhen LIU*, Wei SONG, Xin-lei ZHAO and Chao DU 2017 2nd International Conference on Artificial Intelligence: Techniques and Applications (AITA 2017 ISBN: 978-1-60595-491-2 A Protein Secondary Structure Prediction Method Based on BP Neural Network Ru-xi

More information

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS viii TABLE OF CONTENTS ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS v xviii xix xxii 1. INTRODUCTION 1 1.1 MOTIVATION OF THE RESEARCH 1 1.2 OVERVIEW OF PROPOSED WORK 3 1.3

More information

Predictive Analytics Cheat Sheet

Predictive Analytics Cheat Sheet Predictive Analytics The use of advanced technology to help legal teams separate datasets by relevancy or issue in order to prioritize documents for expedited review. Often referred to as Technology Assisted

More information

Bioinformatics for Biologists

Bioinformatics for Biologists Bioinformatics for Biologists Functional Genomics: Microarray Data Analysis Fran Lewitter, Ph.D. Head, Biocomputing Whitehead Institute Outline Introduction Working with microarray data Normalization Analysis

More information

AUTOMATED INTERPRETABLE COMPUTATIONAL BIOLOGY IN THE CLINIC: A FRAMEWORK TO PREDICT DISEASE SEVERITY AND STRATIFY PATIENTS FROM CLINICAL DATA

AUTOMATED INTERPRETABLE COMPUTATIONAL BIOLOGY IN THE CLINIC: A FRAMEWORK TO PREDICT DISEASE SEVERITY AND STRATIFY PATIENTS FROM CLINICAL DATA Interdisciplinary Description of Complex Systems 15(3), 199-208, 2017 AUTOMATED INTERPRETABLE COMPUTATIONAL BIOLOGY IN THE CLINIC: A FRAMEWORK TO PREDICT DISEASE SEVERITY AND STRATIFY PATIENTS FROM CLINICAL

More information

Data Analytics for Semiconductor Manufacturing The MathWorks, Inc. 1

Data Analytics for Semiconductor Manufacturing The MathWorks, Inc. 1 Data Analytics for Semiconductor Manufacturing 2016 The MathWorks, Inc. 1 Competitive Advantage What do we mean by Data Analytics? Analytics uses data to drive decision making, rather than gut feel or

More information

PREDICTION OF PIPE PERFORMANCE WITH MACHINE LEARNING USING R

PREDICTION OF PIPE PERFORMANCE WITH MACHINE LEARNING USING R PREDICTION OF PIPE PERFORMANCE WITH MACHINE LEARNING USING R Name: XXXXXX Student Number: XXXXXXX 2016-11-29 1. Instruction As one of the most important infrastructures in cities, water mains buried underground

More information

Intelligence and. Vivek Kaie

Intelligence and. Vivek Kaie Enterprise Performance Intelligence and Decision Patterns Vivek Kaie /0\ CRC Press \CtJ Taylor & Francis Croup V- 'S Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an

More information

Prediction of Binding Sites in the Mouse Genome Using Support Vector Machines

Prediction of Binding Sites in the Mouse Genome Using Support Vector Machines Prediction of Binding Sites in the Mouse Genome Using Support Vector Machines Yi Sun 1, Mark Robinson 2, Rod Adams 1, Alistair Rust 3, and Neil Davey 1 1 Science and technology research school, University

More information

[Kaur*, 5(3): March,2016] ISSN: (I2OR), Publication Impact Factor: 3.785

[Kaur*, 5(3): March,2016] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY HYBRID APPROACH OF BOOSTED TREE FOR CHURN PREDICTION IN MATLAB Navneet Kaur *, Naseeb Singh * M.Tech Student, Department of IT,

More information

UNOFFICIAL TRANSLATION (COMPLETE OFFICIAL CHINESE GUIDELINES BELOW) Translated from Chinese by Kevin Li

UNOFFICIAL TRANSLATION (COMPLETE OFFICIAL CHINESE GUIDELINES BELOW) Translated from Chinese by Kevin Li UNOFFICIAL TRANSLATION (COMPLETE OFFICIAL CHINESE GUIDELINES BELOW) Translated from Chinese by Kevin Li China Banking Association s Corporate Social Responsibility Guidelines (Excerpt) Chapter III Social

More information

Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy at the University of Technology, Sydney. 29 January, 1996.

Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy at the University of Technology, Sydney. 29 January, 1996. COUNTERTRADE AND THE INTERNATIONALISATION OF THE AUSTRALIAN FIRM RICHARD FLETCHER, B.A., M.A.(Sydney), M.Com.(NSW). Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy at

More information

IMPACTS OF EPA S CARBON PROPOSAL ON UTAH

IMPACTS OF EPA S CARBON PROPOSAL ON UTAH IMPACTS OF EPA S CARBON PROPOSAL ON UTAH BACKGROUND In 2013, coal provided 81% of Utah s electricity, with natural gas providing 15%, and renewables and other sources providing the remaining 4%. i Utah

More information

Predicting Protein Contact Map By Bagging Decision Trees

Predicting Protein Contact Map By Bagging Decision Trees Bucknell University Bucknell Digital Commons Honors Theses Student Theses 2015 Predicting Protein Contact Map By Bagging Decision Trees Chuqiao Ren cr025@bucknell.edu Follow this and additional works at:

More information

Classification of DNA Sequences Using Convolutional Neural Network Approach

Classification of DNA Sequences Using Convolutional Neural Network Approach UTM Computing Proceedings Innovations in Computing Technology and Applications Volume 2 Year: 2017 ISBN: 978-967-0194-95-0 1 Classification of DNA Sequences Using Convolutional Neural Network Approach

More information

COPYRIGHTED MATERIAL. Contents

COPYRIGHTED MATERIAL. Contents Contents Preface xxiii Introduction xxv Part I Defining and Using Project Management Process Groups 1 Chapter 1 What Is a Project? 5 Defining a Project 6 Sequence of Activities 6 Unique Activities 6 Complex

More information

advanced analysis of gene expression microarray data aidong zhang World Scientific State University of New York at Buffalo, USA

advanced analysis of gene expression microarray data aidong zhang World Scientific State University of New York at Buffalo, USA advanced analysis of gene expression microarray data aidong zhang State University of New York at Buffalo, USA World Scientific NEW JERSEY LONDON SINGAPORE BEIJING SHANGHAI HONG KONG TAIPEI CHENNAI Contents

More information

Software Metrics. Practical Approach. A Rigorous and. Norman Fenton. James Bieman THIRD EDITION. CRC Press CHAPMAN & HALIVCRC INNOVATIONS IN

Software Metrics. Practical Approach. A Rigorous and. Norman Fenton. James Bieman THIRD EDITION. CRC Press CHAPMAN & HALIVCRC INNOVATIONS IN CHAPMAN & HALIVCRC INNOVATIONS IN SOFTWARE ENGINEERING AND SOFTWARE DEVELOPMENT Software Metrics A Rigorous and Practical Approach THIRD EDITION Norman Fenton Queen Mary University of London. UK James

More information

AN INVESTIGATION INTO THE RISKS OF OUTSOURCING OF KNOWLEDGE RICH, SUPPLY CRITICAL ELEMENTS WITHIN SUPPLY NETWORKS: A SRI LANKAN CONTEXT

AN INVESTIGATION INTO THE RISKS OF OUTSOURCING OF KNOWLEDGE RICH, SUPPLY CRITICAL ELEMENTS WITHIN SUPPLY NETWORKS: A SRI LANKAN CONTEXT AN INVESTIGATION INTO THE RISKS OF OUTSOURCING OF KNOWLEDGE RICH, SUPPLY CRITICAL ELEMENTS WITHIN SUPPLY NETWORKS: A SRI LANKAN CONTEXT Lindamullage Don Charls Shirekha Layangani (128010 M) Thesis submitted

More information

Unlocking the Power of Big Data Analytics for Application Security and Security Operation

Unlocking the Power of Big Data Analytics for Application Security and Security Operation Unlocking the Power of Big Data Analytics for Application Security and Security Operation Virginia Lee, Senior Security Architect CISSP, CISA, CEH 1 September 2018 What is Machine Learning? Learning from

More information

Application of Intelligent Methods for Improving the Performance of COCOMO in Software Projects

Application of Intelligent Methods for Improving the Performance of COCOMO in Software Projects Application of Intelligent Methods for Improving the Performance of COCOMO in Software Projects Mahboobeh Dorosti,. Vahid Khatibi Bardsiri Department of Computer Engineering, Kerman Branch, Islamic Azad

More information

BIOINF/BENG/BIMM/CHEM/CSE 184: Computational Molecular Biology. Lecture 2: Microarray analysis

BIOINF/BENG/BIMM/CHEM/CSE 184: Computational Molecular Biology. Lecture 2: Microarray analysis BIOINF/BENG/BIMM/CHEM/CSE 184: Computational Molecular Biology Lecture 2: Microarray analysis Genome wide measurement of gene transcription using DNA microarray Bruce Alberts, et al., Molecular Biology

More information

(Revised Programme Published as on )

(Revised Programme Published as on ) Master of Personal Management (MPM) (Choice Based Credit Grading System Pattern 80/20 Oct- 2015) Programme Summer March/April-2017 The shall be held on the days, dates and time mentioned below at all Centers

More information

Study on the Application of Data Mining in Bioinformatics. Mingyang Yuan

Study on the Application of Data Mining in Bioinformatics. Mingyang Yuan International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2016) Study on the Application of Mining in Bioinformatics Mingyang Yuan School of Science and Liberal Arts, New

More information

Decision Support Systems

Decision Support Systems Decision Support Systems 50 (2011) 602 613 Contents lists available at ScienceDirect Decision Support Systems journal homepage: www.elsevier.com/locate/dss Data mining for credit card fraud: A comparative

More information

Conclusions and Future Work

Conclusions and Future Work Chapter 9 Conclusions and Future Work Having done the exhaustive study of recommender systems belonging to various domains, stock market prediction systems, social resource recommender, tag recommender

More information

RFP FOR SUPPLY, INTEGRATION, OPERATIONALISATION & MAINTENANCE OF CASH ACCEPTOR CUM ATM (CAA)

RFP FOR SUPPLY, INTEGRATION, OPERATIONALISATION & MAINTENANCE OF CASH ACCEPTOR CUM ATM (CAA) Corrigendum Notice Annexure-I This is with reference to the RFP FOR SUPPLY, INTEGRATION, OPERATIONALISATION & MAINTENANCE OF CASH ACCEPTOR CUM ATM (CAA). In this regard, all the prospective bidders are

More information

Metaheuristics. Approximate. Metaheuristics used for. Math programming LP, IP, NLP, DP. Heuristics

Metaheuristics. Approximate. Metaheuristics used for. Math programming LP, IP, NLP, DP. Heuristics Metaheuristics Meta Greek word for upper level methods Heuristics Greek word heuriskein art of discovering new strategies to solve problems. Exact and Approximate methods Exact Math programming LP, IP,

More information

Epigenetics and DNase-Seq

Epigenetics and DNase-Seq Epigenetics and DNase-Seq BMI/CS 776 www.biostat.wisc.edu/bmi776/ Spring 2018 Anthony Gitter gitter@biostat.wisc.edu These slides, excluding third-party material, are licensed under CC BY-NC 4.0 by Anthony

More information

ABSTRACT: KEYWORDS: Anomaly detection, Hidden Markov Model, Online Transactions, Data Mining, Clustering,Probability,Security.

ABSTRACT: KEYWORDS: Anomaly detection, Hidden Markov Model, Online Transactions, Data Mining, Clustering,Probability,Security. International Journal of Computational Engineering Research Vol, 03 Issue, 7 Anomaly Detection Using Hidden Markov Model 1, Sonali N.Jadhav, 2, Kiran Bhandari 1 M.E Scholar, 1,2,Assitant Professor, Thakur

More information

Anomaly Detection Using Hidden

Anomaly Detection Using Hidden 8th INTERNATIONAL FORUM ON STRATEGIC TECHNOLOGY VOL:2 YEAR 2013 Anomaly Detection Approach Using Hidden Markov Model 1, Sonali N.Jadhav, 2, Kiran Bhandari 1 M.E Scholar, 1,2,Assitant Professor, Thakur

More information

Contract workers and labour standards: Experiences from India

Contract workers and labour standards: Experiences from India Contract workers and labour standards: Experiences from India What is contract labour? Definition as per law A workman is deemed to be employed as Contract Labour when he is hired in connection with the

More information

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS vii TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS iii xi xv xviii 1 INTRODUCTION 1 1.1 BACKGROUND OF RESEARCH 1 1.2 MOTIVATION FOR

More information

2005/2006 Study of Consumer Payment Preferences. Table of Contents

2005/2006 Study of Consumer Payment Preferences. Table of Contents Table of Contents Chapter 1: Executive Summary...1 Overview...1 Objectives and Methodology...2 Key Findings...4 In-Store Payments...5 Internet Payments...8 Bill Payments...10 Cash...13 Debit Cards...15

More information

SENIOR COMMUNICATIONS OPERATOR, 1467

SENIOR COMMUNICATIONS OPERATOR, 1467 2-22-91 SENIOR COMMUNICATIONS OPERATOR, 1467 Summary of Duties: A Senior Communications Operator assigns, reviews, and evaluates the work of Communications Operators who operate private branch exchange

More information

Improving Computational Predictions of Cis- Regulatory Binding Sites

Improving Computational Predictions of Cis- Regulatory Binding Sites Improving Computational Predictions of Cis- Regulatory Binding Sites Mark Robinson, Yi Sun, Rene Te Boekhorst, Paul Kaye, Rod Adams, Neil Davey, and Alistair G. Rust Pacific Symposium on Biocomputing :39-402(2006)

More information

Article II Definitions Section 200 Interpretation II Definitions II-1

Article II Definitions Section 200 Interpretation II Definitions II-1 CHAPTER 27 ZONING TABLE OF CONTENTS Page Article I Introductory Provisions Section 100 Short Title I-1 101 Purpose I-1 102 Interpretation I-1 103 Scope I-1 104 Conflict I-2 105 Validity I-2 106 Repealer

More information

Monitoring PTC Windchill 11.0 Performance Using the PTC System Monitor

Monitoring PTC Windchill 11.0 Performance Using the PTC System Monitor Monitoring PTC Windchill 11.0 Performance Using the PTC System Monitor Overview Course Code Course Length TRN-4832-T 8 Hours In this course, you will learn how to use PTC System Monitor to manage and troubleshoot

More information

Oracle Spreadsheet Add-In for Predictive Analytics for Life Sciences Problems

Oracle Spreadsheet Add-In for Predictive Analytics for Life Sciences Problems Oracle Life Sciences eseminar Oracle Spreadsheet Add-In for Predictive Analytics for Life Sciences Problems http://conference.oracle.com Meeting Place: US Toll Free: 1-888-967-2253 US Only: 1-650-607-2253

More information

OPTIMIZED BALANCED SCORECARD INTEGRATED MODEL FOR EVALUATION OF ORGANIZATIONS PERFORMANCE

OPTIMIZED BALANCED SCORECARD INTEGRATED MODEL FOR EVALUATION OF ORGANIZATIONS PERFORMANCE OPTIMIZED BALANCED SCORECARD INTEGRATED MODEL FOR EVALUATION OF ORGANIZATIONS PERFORMANCE by Hagag Maher Abd El-Hameed Abou El-Hasan B.Sc. Industrial Engineering A Thesis Submitted to the Faculty of Engineering

More information

An Implementation of genetic algorithm based feature selection approach over medical datasets

An Implementation of genetic algorithm based feature selection approach over medical datasets An Implementation of genetic algorithm based feature selection approach over medical s Dr. A. Shaik Abdul Khadir #1, K. Mohamed Amanullah #2 #1 Research Department of Computer Science, KhadirMohideen College,

More information

GOVERNMENT ANALYTICS LEADERSHIP FORUM SAS Canada & The Institute of Public Administration of Canada. April 26 The Shaw Centre

GOVERNMENT ANALYTICS LEADERSHIP FORUM SAS Canada & The Institute of Public Administration of Canada. April 26 The Shaw Centre GOVERNMENT ANALYTICS LEADERSHIP FORUM SAS Canada & The Institute of Public Administration of Canada April 26 The Shaw Centre Ottawa Artificial Intelligence Algorithms Automation Deep Learning Machine Learning

More information

OPTIMAL SELECTION OF PROCESS PARAMETERS OF ULTRASONIC MACHINING (USM) SYSTEM

OPTIMAL SELECTION OF PROCESS PARAMETERS OF ULTRASONIC MACHINING (USM) SYSTEM OPTIMAL SELECTION OF PROCESS PARAMETERS OF ULTRASONIC MACHINING (USM) SYSTEM BY H. L A L C H H U A N V E L A B.E. (Mech), MNNIT, Allahabad (Formerly M.N.R.E.C., Allahabad), 1987; M.Tech. (Mech), IT-BHU,

More information

I N D E X. Preface Acknowledgement Index List of Tables List of Figures List of Maps List of Abbreviations Used

I N D E X. Preface Acknowledgement Index List of Tables List of Figures List of Maps List of Abbreviations Used Preface Acknowledgement Index List of Tables List of Figures List of Maps List of Abbreviations Used I N D E X Contents Page No I III V XIII XXI XXV XXVI Chapter I: Introduction & Methodology 1-104 1.1

More information

Predictive Accuracy: A Misleading Performance Measure for Highly Imbalanced Data

Predictive Accuracy: A Misleading Performance Measure for Highly Imbalanced Data Paper 942-2017 Predictive Accuracy: A Misleading Performance Measure for Highly Imbalanced Data Josephine S Akosa, Oklahoma State University ABSTRACT The most commonly reported model evaluation metric

More information

In silico prediction of novel therapeutic targets using gene disease association data

In silico prediction of novel therapeutic targets using gene disease association data In silico prediction of novel therapeutic targets using gene disease association data, PhD, Associate GSK Fellow Scientific Leader, Computational Biology and Stats, Target Sciences GSK Big Data in Medicine

More information

TITLE 252. DEPARTMENT OF ENVIRONMENTAL QUALITY CHAPTER 690. WATER QUALITY STANDARDS IMPLEMENTATION SUBCHAPTER 1. INTRODUCTION

TITLE 252. DEPARTMENT OF ENVIRONMENTAL QUALITY CHAPTER 690. WATER QUALITY STANDARDS IMPLEMENTATION SUBCHAPTER 1. INTRODUCTION TITLE 252. DEPARTMENT OF ENVIRONMENTAL QUALITY CHAPTER 690. WATER QUALITY STANDARDS IMPLEMENTATION SUBCHAPTER 1. INTRODUCTION 252:690-1-4. Incorporation of EPA regulations by reference The following federal

More information

Sample Outline of ICD-10 Three-Day Curriculum for Health Plans

Sample Outline of ICD-10 Three-Day Curriculum for Health Plans Sample Outline of ICD-10 Three-Day Curriculum for Health Plans I. Introduction 1. Implementation Curriculum Chapters II. Chapter 1 ICD-10 Awareness 2. ICD-10 Strategic Steering Committee 3. ICD-10 Understanding

More information

Evaluation next steps Lift and Costs

Evaluation next steps Lift and Costs Evaluation next steps Lift and Costs Outline Lift and Gains charts *ROC Cost-sensitive learning Evaluation for numeric predictions 2 Application Example: Direct Marketing Paradigm Find most likely prospects

More information

Bioinformatics for Biologists

Bioinformatics for Biologists Bioinformatics for Biologists Microarray Data Analysis. Lecture 1. Fran Lewitter, Ph.D. Director Bioinformatics and Research Computing Whitehead Institute Outline Introduction Working with microarray data

More information

INT L TRADE LAW BASIC GATT PILLARS I. Prof David K. Linnan USC LAW # 665 Unit Four

INT L TRADE LAW BASIC GATT PILLARS I. Prof David K. Linnan USC LAW # 665 Unit Four INT L TRADE LAW BASIC GATT PILLARS I Prof David K. Linnan USC LAW # 665 Unit Four GATT PILLARS FOUR PILLARS Idea of four pillars within GATT/WTO system: 1. Most Favored Nations 2. National Treatment 3.

More information

7 Scheduling with Positional Effects Scheduling Independent Jobs Under Job-Dependent Positional Effect Scheduling Independent

7 Scheduling with Positional Effects Scheduling Independent Jobs Under Job-Dependent Positional Effect Scheduling Independent Contents Part I Models and Methods of Classical Scheduling 1 Models and Concepts of Classical Scheduling... 3 1.1 Classical Scheduling Models......................... 4 1.1.1 Machine Environment........................

More information

Research on Personal Credit Assessment Based. Neural Network-Logistic Regression Combination

Research on Personal Credit Assessment Based. Neural Network-Logistic Regression Combination Open Journal of Business and Management, 2017, 5, 244-252 http://www.scirp.org/journal/ojbm ISSN Online: 2329-3292 ISSN Print: 2329-3284 Research on Personal Credit Assessment Based on Neural Network-Logistic

More information