الفهرس | Only 14 pages are availabe for public view |
Abstract The term “fraud”, it always concerned about credit card fraud in our minds. And after the significant increase in the transactions of credit card, the fraud of credit card increased extremely in last years. So the fraud detection should include surveillance of the spending attitude for the person/customer to the determination, avoidance, and detection of unwanted behavior. Because the credit card is the most payment predominant way for the online and regular purchasing, the credit card fraud raises highly. The Fraud detection is not only concerned with capturing of the fraudulent practices, but also, discover it as fast as they can, because the fraud costs millions of dollar business loss and it is rising over time, and that affects greatly the worldwide economy. This Thesis introduce 15 different techniques of how data mining techniques can be successfully combined to obtain a high fraud coverage with a high or low false rate, the Advantage and The Disadvantages of every technique, and The Data Sets used in the researches by researchers Also Comparisons Of These Techniques & The Different Data Sets Used In These Systems, Of One Main Objective to decrees the rate of insufficient Leading to A Hybrid System By Using IOT how it can be detected using computational intelligent techniques and Internet of Things (IOT). Moreover, presenting recent results and challenges. By Using Other Techniques of IOT, the process depends on the AI technique that contains the component determination process, which dependent on the filter strategy, the clustering method, and the classification process All these methods and techniques are used to recognize fake cases before it occurs or during the handling of any online exchange that meets any misrepresentation decide that defined by the bank’s risk department in the database. In This design, it concentrated on Map Reduce, one of the fundamental empowering approaches for satisfying expanded Misrepresentation frameworks needs by utilizing high equal preparation, information storage, investigation, and web-based handling on countless items. |