Machine Learning based clustering algorithms and graph analysis as approach for improving anti-fraud model in credit institutions

Development and implementation of new technologies in banking services. The ability to improve the existing anti-fraud model used in real banking practice. Clusters and their impact on the assessment of the existing anti-fraud model. Data Chart Analysis.

Подобные документы

  • Electroencephalography and Magnetoencephalography provide insight into neuronal processes in the brain in a real-time scale. This renders these modalities particularly interesting for online analysis methods to visualize brain activity in real-time.

    статья, добавлен 23.06.2016

  • The phenomenon of virtual reality, as a tool of achieving interactive behavior in architecture and built environment. Various possibilities for improving the quality of environment and space, both real and existing only within alternative perception.

    статья, добавлен 30.07.2018

  • Consideration of new forms of binary representations of Boolean functions. Analysis of single algebraic and non-inverting classic models of the Reed-Muller. Using technology "EDM - Extended Data Mining". Characteristics of main data mining algorithms.

    статья, добавлен 14.07.2016

  • Methods, tools and applications of Data Mining. Basic concepts of data warehouses and the place of Data Mining in their architecture. The process of data analysis using this technology, its stages. Analytical software market, product data capabilities.

    статья, добавлен 30.10.2020

  • Enigma cipher machine. Cryptographic ally strong sequences. Shift register-based stream ciphers. Hellman’s time-memory trade-off. Birthday attacks on hash functions. Secondary phase refinement. Implementation attacks. Sigaba rotor in reverse orientation

    учебное пособие, добавлен 08.03.2014

  • The concept and structure of telecommunications, their latest achievements and prospects. Trends in the field of telecommunications, networking model, the interaction of the client and the server. The types of operating systems, external utilities.

    учебное пособие, добавлен 11.10.2014

  • Digital signatures: background and definitions. Cryptographic hardness assumptions and constructions based on general assumptions, signature schemes based on the (strong) RSA assumption. The random oracle model and full-domain hash (related) schemes.

    книга, добавлен 08.03.2014

  • Analysis of simple principal component as a tool for dimension reduction can fail badly. Local approximations of principal component as among the most promising. Localized versions of component and principal curves and local partitioning algorithms.

    учебное пособие, добавлен 08.02.2013

  • The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.

    статья, добавлен 25.06.2024

  • Assessing the acceptability of the developed Integrated Development Environment (ICP). C-SOLVIS as a web-based application designed to facilitate the process of teaching and learning the basics of programming in higher education institutions in Malaysia.

    статья, добавлен 11.07.2023

  • Analysis of information technology monitoring and correction of the functional state of students in the process learning created based on developed models, complex criteria classification of constituent states models, algorithms normalized estimates.

    статья, добавлен 23.06.2016

  • Distance learning using spreadsheets. The introduction of Excel-documents in electronic educational resources. Access to information resources of various types using the "cloud" services. Design and implementation of the "ExcelReader" software module.

    статья, добавлен 05.04.2019

  • Характеристика основных компонентов системы Интернет-банкинг для частных клиентов. Разработка требований к обеспечению безопасности и графическому интерфейсу. Особенность реализации ядер виджетов. Расчет стоимости и анализ эффективности проекта.

    дипломная работа, добавлен 30.04.2019

  • Acquaintance with the idea that "a fool's money doesn't last long." General characteristics of ways of parting a person with money using credit cards, analysis of features. Consideration of the most difficult moral associations with the concept of duty.

    статья, добавлен 15.03.2021

  • Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.

    статья, добавлен 27.05.2021

  • Research and analysis of ways to solve the problem of reducing the expressions obtained in solving the naval system. Structure of Stokes equations. Development and analysis of an equivalent reduction algorithm based on the theory of chain fractions.

    статья, добавлен 22.12.2016

  • The basic ways of education informatization are examined; the requirements for educational ICT and presented. The basic information technologies used in the teaching process are summarized: interactive; computer-based learning; telecommunication means.

    статья, добавлен 04.10.2022

  • Description of the mathematical model of technological processes of variational inequalities. Search for the maximum of the Hamiltonian function of the state space functions. Development of a method for numerical realization of mathematical models.

    статья, добавлен 22.12.2016

  • The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.

    статья, добавлен 22.12.2016

  • The possibility using systems operational analysis in the organization and management of research and innovation projects in enterprises and Universities. The organizing principle of the multidimensional cube. Data Mining using mathematical apparatus.

    статья, добавлен 06.05.2018

  • The article is intended to analyse the development of the institute of personal data protection in the world identify ways to adapt the national legislation of Ukraine to the current personal data protection standards of the EU. To carry out the research.

    статья, добавлен 19.09.2024

  • Computer security approach. Message authentication codes. Bilinear maps from elliptic curve pairings. Cryptographic hash functions. Method of session key generation. Secure authenticated encryption schemes. An efficient protocol in extended model.

    книга, добавлен 08.03.2014

  • Применение информационных технологий в бизнесе. Оценка возможностей нейронных сетей и искусственного интеллекта. Способы обработки и анализа данных больших объемов. Методы представления сведений в цифровой форме. Современная трактовка машинного обучения.

    статья, добавлен 09.08.2022

  • Study of issues of maximizing small root bounds by linearization and applications of subjects of small secret exponents in RSA. Secure network coding over the integers, and the CCA proxy re-encryption without bilinear maps in the standard model.

    материалы конференции, добавлен 08.03.2014

  • The description of the mechanisms of learning and assessment of the quality of the classifier of the developed system of the automated processing of large amounts of information. The classifier based on the LibSVM library and the support vector machine.

    статья, добавлен 25.12.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.