Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Credit Card Fraud Detection

PROJECT SYNOPSIS
OF MAJOR PROJECT

BACHELOR OF TECHNOLOGY
Information technology

SUBMITTED BY
Upender
16014045

GURU JAMBHESHWAR UNIVERSITY


OF SCIENCE AND TECHNOLOGY
HISAR(HARYANA)
DECLARATION

I thus announce that the venture report named "The Green City" put
together by Upender (Roll no:160140) to Guru Jambheshwar University
of Science and Technology ,Hisar in incomplete satisfaction of the
necessity for the honor of the degree B.TECH in COMPUTER
SCIENCE DEPARTMENT is a record bonified venture work completed
by me under the Guidance of Mr.Sunil Nandal .

I further proclaim that the work detailed in this undertaking has not been
submitted , either to a limited extent or full for the honor of some other
degree or Diploma in this foundation or some other establishment or
college.

DATE:

Spot:
ACKNOWLEDGEMENT

I have taken efforts in this project. However ,it would not have been
possible without the kind support and help of many individuals and
organization .I would like to extend my sincere thanks to all of them.
I am highly indebted to Mr.Sunil Nandal for their guidance and constant
Supervision as well as for providing necessary information regarding the
project & also for their support in completing the project.
I would like to express my grace towards my parents for
promoting me which help me in completion of this project.
My thanks and application also go to my colleague in developing the
project and people who have willingly helped me out with their abilities.
CONTENTS

S.No. TOPIC PAGE NO.

1. Abstract

2. Introduction

3. Objective

4. Requirement
Specification

5. Methodology

6. Use Case Diagram

7 References
Abstract

Credit card misrepresentation occasions happen as often as


possible and afterward bring about colossal money related
misfortunes. The quantity of online exchanges has developed in
huge amounts and online Mastercard exchanges holds an
immense portion of these exchanges. In this way, banks and
budgetary establishments offer Visa extortion recognition
applications much worth and request. False exchanges can
happen in different manners and can be placed into various
classifications.

This paper centers around four fundamental extortion events in


certifiable exchanges. Every misrepresentation is tended to
utilizing a progression of AI models and the best strategy is
chosen by means of an assessment. This assessment gives an
exhaustive manual for choosing an ideal calculation as for the
kind of the cheats and we show the assessment with a fitting
presentation measure. Another significant key zone that we
address in our venture is constant charge card misrepresentation
recognition.

For this, we take the utilization of prescient examination done by


the actualized AI models and an API module to choose if a
specific exchange is certifiable or false. We additionally evaluate
a novel procedure that successfully addresses the slanted
appropriation of information. The information utilized in our
investigations originate from a money related organization as
indicated by a secret revelation understanding.
Introduction

➢ Python: Python is an interpreted, high-level, general-purpose


programming language.
• Python is dynamically typed and garbage-collected.
• Python supports multiple programming paradigms, including
procedural, object-oriented, and functional programming.
• Python is designed to be highly readable.

Machine learning
• Machine learning is a subset of artificial intelligence.
• Ml is the scientific study of algorithms and statistical models.
• ML is closely related to computational statistics.

Data
The information which is being utilized in this examination is
dissected in two primary manners: as all out information and
as numerical information. The dataset initially accompanies
straight out information. The crude information can be set up
by information cleaning and other fundamental
preprocessing procedures. To start with, absolute
information can be changed into numerical information and
afterward fitting systems are applied to do the assessment.
Besides, downright information is utilized in the AI strategies
to locate the ideal calculation.

This paper comprises of choosing ideal calculations for the


four extortion designs through a broad correlation of AI
procedures by means of a viable execution measure for the
location of deceitful Mastercard exchanges.
OBJECTIVE

In prior examinations, numerous methodologies have been


proposed to carry answers for identify extortion from directed
methodologies, solo ways to deal with half and half ones; which
makes it an absolute necessity to become familiar with the
advancements related in charge card fakes recognition and to
have an away from of the sorts of Mastercard misrepresentation.

As time advanced misrepresentation designs developed


presenting new types of extortion making it a sharp region of
enthusiasm for specialists. The rest of this area portrays single AI
calculations, AI models and misrepresentation location
frameworks that were utilized in extortion identification. The
issues that went over the survey have broke down for the later
utilization of executing a proficient AI model.
Software Requirement Specification
• A Software Requirements Specification (SRS) is a document that
captures complete description about how the system is expected to
perform.

Requirements:
• Processor : INTEL CORE i5
• RAM : 8.00 GB
• SYSTEM TYPE : 64-bit Operating System, x64-based processor

Software Specifications:
• Operating System : Windows 10 Pro
• Interface : Jupyter Notebook
• Language : Python, Machine Learning
Methodology
➢ Data description
The dataset was made joining two information sources; the
extortion exchanges log document and all exchanges log
record. The misrepresentation exchanges log document
holds all the online Mastercard extortion events while all
exchanges log record holds all exchanges put away by the
comparing bank inside a predetermined timeframe. Because
of the secret revelation understanding made between the
bank and the creators of the paper, a portion of the delicate
qualities, for example, card number were hashed. While
assessing the joined dataset, the state of the information
was highly slanted because of the imbalanced quantities of
authentic exchanges and fake events.

➢ Data Preparation
Gathered crude information were first partitioned into 4
informational collections as indicated by its
misrepresentation design. This procedure was finished with
the data picked up by the bank. The four datasets are,

1. 1.Transactions with Unsafe Dealer Class Code (MCC).

2. Transactions bigger than $100.

3. Transactions with unsafe ISO Reaction code.

4.Transactions with obscure web addresses

In information planning the information are cleaned,


changed, coordinated and decreased
➢ Resampling Techniques
The two information sources were described by a profoundly
imbalanced dissemination of models among the classes. Fake
exchanges contained an a lot more modest number of models
than the certified exchanges. To defeat this, we led under-
inspecting and over-testing by lessening the larger part events
and by raising the minority events separately.

➢ Modelling and testing


Our investigation examinations four distinctive misrepresentation
designs. Many quantities of strategies were utilized in the
information investigation. Four AI calculations were organized in
our examination with the assistance of the writing. They are
Bolster Vector Machine, Credulous Bayes, K-Closest Neighbor
and Logistic Relapse.

➢ Fraud Detection System


Continuous identification of Visa misrepresentation can be expressed
as one of the primary commitments of this undertaking. The
continuous extortion identification framework comprises of three
fundamental units; Programming interface .
Use Case Diagram:-
REFERENCES

• www.w3schools.com
• www.youtube.com

You might also like