CPP REPORT (2)
CPP REPORT (2)
ON
“---------------------------------------------”
PROGRAM CO 5 I
CODE:-
COURSE NAME:- Capstone Project Planning
Course code:-
(2023-2024)
BY
---------------------------------
1
ALL INDIA SHRI SHIVAJI MEMERIAL SOCIETY’S POLYTECHNIC,
PUNE -1
VISION:
Achieve excellence in quality technical education by imparting knowledge, skills and
abilities to build a better technocrat.
MISSION:
M1: Empower the students by inculcating various technical and soft skills.
VISION:
“Enhance skills by providing value based technical education for fulfilling global needs in
the field of computer engineering.”
MISSION:
M2: To develop positive attitude, communication skills, team spirit and entrepreneurship.
M3: To develop awareness about societal and ethical responsibility for professionalism.
2
PROGRAM OUTCOMES (POs)
PO1: Basic and Discipline specific knowledge: Apply knowledge of basic mathematics, science and
engineering fundamentals and engineering specialization to solve the engineering problems.
PO2: Problem analysis: Identify and analyze well-defined engineering problems using codified standard
methods
PO3: Design/ development of solutions: Design solutions for well-defined technical problems
and assist with the design of systems components or processes to meet specified needs.
PO4: Engineering Tools, Experimentation and Testing: Apply modern engineering tools and
appropriate technique to conduct standard tests and measurements.
PO5: Engineering practices for society, sustainability and environment: Apply appropriate technology
in context of society, sustainability, environment and ethical practices.
PO6: Project Management: Use engineering management principles individually, as a team member or a
leader to manage projects and effectively communicate about well-defined engineering activities.
PO7: Life-long learning: Ability to analyze individual needs and engage in updating in the context of
technological changes.
3
CERTIFICATE
3. ……………………… 4. ………………………
Project Guide
------------------
Computer Engineering Department
4
Acknowledgements
The satisfaction & euphoria that accompany the successful completion of any task would be
incomplete without the mention of the people , who made it possible , whose constant guidance
& encouragement aided us in the completion of our project .
Its our priviledge to express voice of gratitude and respect to all those who guided us and
inspired us in the completion of this project.
We would like to thank our guide ----------- for her/his precious guidance & effectually care
which happens to be the psyche of this report.
We would also like to express our heartfelt gratitude to Mr.V.N.Kukre, HOD of Computer
Department , for his continuous encouragement & valuable guidance .
And of course , we would like to thank the management of AISSMS Polytechnic for providing us
such an opportunity to learn from these experience.
Thanks to all!!!
Signature
Roll No Name
5
Abstract
Credit card fraud detection is presently the most frequently occurring problem in the present
world which results in huge financial losses.The number of online transactions has grown in
larger quantities & online credit card transactions holds a huge share of these transactions.
Therefore, banks & financial institutions offer credit card fraud detection applications much
value & demand. Credit card fraud generally happens when the card was stolen for any of the
unauthorized purposes or even when the fraudster uses the credit card information for his use .
It is vital that credit card companies are able to identify fraudlent credit card transactions so that
customers are not charged for items that they did not purchase. Such problems can be tackled with
Data science and its importance, along with Machine learning , cannot be overstated. This project
intends to illustrate the modeling of a data set using machine learning with Credit Card Fraud
Detection. This problem includes modeling past credit card transactions with with the data of the
ones that turned out to be fraud. This model is used to recognize whether a new transaction is
fraudulent or not. Our objective here is to detect 100% of the fraudulent transactions while
minimizing the incorrect fraud classifications . In this process , we have focused on analyzing
and pre-processing data sets as well as the deployment of multiple anomaly detection algorithms
such as Local Outliner Factor and Isolation Forest algorithm on the PCA transformed Credit Card
Transaction data.
6
CONTENTS
7
Chapter 1
Introduction
Credit card fraud is a growing concern with far reaching consequences in the government,
corporate organizations, finance industry, In Today’s world high dependency on internet
technology has enjoyed increased credit card transactions but credit card fraud had also
accelerated as online and offline transaction. As credit card transactions become a widespread
mode of payment, focus has been given to recent computational methodologies to handle the
credit card fraud problem. There are many fraud detection solutions and software which prevent
frauds in businesses such as credit card, retail, e-commerce, insurance, and industries. Machine
Learning is one notable and popular methods used in solving credit fraud detection problem. It is
impossible to be sheer certain about the true intention and rightfulness behind an application or
transaction. In reality, to seek out possible evidences of fraud from the available data using
mathematical algorithms is the best effective option. Fraud detection in credit card is the truly the
process of identifying those transactions that are fraudulent into two classes of legit class and
fraud class transactions, several techniques are designed and implemented to solve to credit card
8
fraud detection such as genetic algorithm, artificial neural network frequent item set mining,
migrating birds optimization algorithm, comparative analysis of decision tree and random forest is
carried out. Credit card fraud detection is a very popular but also a difficult problem to solve.
Firstly, due to issue of having only a limited amount of data, credit card makes it challenging to
match a pattern for dataset. Secondly, there can be many entries in dataset with truncations of
fraudsters which also will fit a pattern of legitimate behavior. Also the problem has many
constraints. Firstly, data sets are not easily accessible for public and the results of researches are
often hidden and censored, making the results inaccessible and due to this it is challenging to
benchmarking for the models built. Datasets in previous researches with real data in the literature
is nowhere mentioned. Secondly, the improvement of methods is more difficult by the fact that
the security concern imposes a limitation to exchange of ideas and methods in fraud detection,
and especially in credit card fraud detection. Lastly, the data sets are continuously evolving and
changing making the profiles of normal and fraudulent behaviors always different that is the legit
transaction in the past may be a fraud in present or vice versa. This paper evaluates two advanced
machine learning, Decision tree and random forests and then a collative comparison is made to
evaluate that which model performed best. Credit card transaction datasets are rarely available,
highly imbalanced and skewed. Optimal feature (variables) selection for the models, suitable
metric is most important part of mining to evaluate performance of techniques on skewed credit
card fraud data. A number of challenges are associated with credit card detection, namely
fraudulent behavior profile is dynamic, that is fraudulent transactions tend to look like legitimate
ones, Credit card fraud detection performance is greatly affected by type of sampling approach
used, selection of variables and detection technique used.
9
Chapter 2
Literature Survey
10
The number of legal truncation was determined to be greater than or equal to 0.65, ie its accuracy
was 65% using the Bayesian network. The importance of this document is to compare the models
based on artificial intelligence together with a general description of the developed system and to
establish the accuracy of each model together with the recommendation to create the best model.
In Nutan and Suman on review on credit card fraud detection they have supported the theory of
what is credit card fraud, types of fraud like telecommunication, bankruptcy fraud etc. and how to
detect it, in addition to it they have explained numerous algorithms and methods on how to detect
fraud using Glass Algorithm, Bayesian, networks, Hidden Markova model, Decision Tree and 4
more. They have explained in detail about each algorithm and how this algorithm works along
with mathematical explanation. Types of machine learning along with classifications has been
studied. Pros and cons of each method is listed
11
Chapter 3
Scope of project
To build credit card fraud detection system using machine learning algorithms. The major aim of
this project is to perform a comprehensive review of different fraud detection methods and some
innovative machine learning technique.
12
2. 29-September-2021 To 06-October-2021 Topic selection
3. 07- October -2021 To 23- October -2021 Base paper selection.
4. 25- October -2021 To 30- October -2021 Existing System.
Software Specifications :
3. Software Python
Hardware
Specifications :
3 RAM 4 GB
13
5 Key Board Standard Windows Keyboard
Conclusion:-
Credit card fraud detection is a fascinating domain. From this survey, we analyze that machine
learning is the best compared to forecasting and classification. Machine learning techniques are
mainly preferred in fraud detection, due to their high accuracy and detection rate. Even so,
researchers find it difficult to achieve greater accuracy and detection speed. In addition,
organizations are interested in finding ways to reduce costs and increase profits; you can find and
select the method of previous studies.
14
Chapter 4
Bibliography
REFERENCES
[1] Jain R., Gour B., Dubey S., A hybrid approach for credit card fraud detection using rough set
and decision tree technique, International Journal of Computer Applications 139(10) (2016).
[2] Dermala N., Agrawal A.N., Credit card fraud detection using SVM and Reduction of false
alarms, International Journal of Innovations in Engineering and Technology (IJIET) 7(2) (2016).
[3] Phua C., Lee V., Smith, Gayler K.R., A comprehensive survey of data mining-based fraud
detection research. arXiv preprint arXiv:1009.6119 (2010).
[4] Bahnsen A.C., Stojanovic A., Aouada D., Ottersten B., Cost sensitive credit card fraud
detection using Bayes minimum risk. 12th International Conference on Machine Learning and
Applications (ICMLA) (2013), 333-338.
[5] Carneiro E.M., Dias L.A.V., Da Cunha A.M., Mialaret L.F.S., Cluster analysis and artificial
neural networks: A case study in credit card fraud detection, 12th International Conference on
Information Technology-New Generations (2015), 122-126.
[6] Hafiz K.T., Aghili S., Zavarsky P., The use of predictive analytics technology to detect credit
card fraud in Canada, 11th Iberian Conference on Information Systems and Technologies (CISTI)
(2016), 1-6.
[7] Sonepat H.C.E., Bansal M., Survey Paper on Credit Card Fraud Detection, International
Journal of Advanced Research in Computer Engineering & Technology 3(3)
(2014).VarrePerantalu K., BhargavKiran, Credit card Fraud Detection using Predictive Modeling
(2014).
[8] Stolfo S., Fan D.W., Lee W., Prodromidis A., Chan P., Credit card fraud detection using meta-
learning: Issues and initial results, AAAI-97 Workshop on Fraud Detection and Risk Management
(1997).
15
[9] Maes S., Tuyls K., Vanschoenwinkel B., Manderick, B., Credit card fraud detection using
Bayesian and neural networks, International Journal of Pure and Applied Mathematics Special
Issue 836Proceedings of the 1st international naiso congress on neuro fuzzy technologies (2002),
261-270.
[10] Chan P.K., Stolfo S.J., Toward Scalable Learning with Non- Uniform Class and Cost
Distributions: A Case Study in Credit Card Fraud Detection, In KDD (1998), 164-168.
Appendix – B
A] Discipline knowledge
B] Engineering Tools
C] The engineer and society
D] Ethics
C22058.a: Write the problem/task specification in existing system related to the occupation.
C22058.b: Select, Collect and use required information/knowledge to solve the problem/complete the task.
C22058.c: Logically choose relevant possible solution.
C22058.d: Consider the ethical issues related to project.
C22058.e: Assess the impact of the project on society.
C22058.f: Prepare project proposal with action plan and time duration scientifically before beginning of
project
C22058.f: Communicate effectively and confidently as a member and leader of team.
16
2 Industrial Survey and Literature Review
3 Punctuality and overall contribution
4 Project Diary
5 Report writing including documentation 10
6 Presentation 05
Total 25
17