scholarly journals Fraud Detection in Mobile Payment System using Machine Learning: A Comprehensive Survey

Author(s):  
Bhakti G. Gawas
Author(s):  
Emmanuel Awuni Kolog ◽  
Acheampong Owusu ◽  
Samuel Nii Odoi Devine ◽  
Edward Entee

Globalizing businesses from developing countries require a thoughtful strategy and adoption of state-of-the-art technologies to meet up with the rapidly changing society. Mobile money payment service is a growing service that provides opportunities for both the formal and informal sectors in Ghana. Despite its importance, fraudsters have capitalized on the vulnerabilities of users to defraud them. In this chapter, the authors have reviewed existing data mining techniques for exploring the detection of mobile payment fraud. With this technique, a hybrid-based machine learning framework for mobile money fraud detection is proposed. With the use of the machine learning technique, an avalanche of fraud-related cases is leveraged, as a corpus, for fraud detection. The implementation of the framework hinges on the formulation of policies and regulations that will guide the adoption and enforcement by Telcos and governmental agencies with oversight responsibilities in the telecommunication space. The authors, therefore, envision the implementation of the proposed framework by practitioners.


2020 ◽  
Vol 24 (104) ◽  
pp. 58-66
Author(s):  
Fredy Humberto Troncoso Espinosa ◽  
Fuentes Figueroa Paulina Gisselot ◽  
Italo Ramiro Belmar Arriagada

El comportamiento fraudulento en el consumo de agua potable es un problema importante que enfrentan las empresas de tratamiento de agua debido a que genera pérdidas económicas significativas. Caracterizar consumos fraudulentos es una tarea compleja, basada principalmente en la experiencia, y que presenta el desafío de la incorporación constante de nuevos clientes y la variación en el consumo mensual. En esta investigación, las técnicas de minería de datos se utilizan para caracterizar y predecir los consumos fraudulentos de agua potable. Para esto, se utilizó información histórica relacionada con el consumo. Las técnicas aplicadas mostraron un alto rendimiento predictivo y su aplicación permitirá enfocar eficientemente los recursos orientados a evitar este tipo de fraude. Palabras Clave: minería de datos, machine learning, agua potable, detección de fraude. Referencias [1]Centro de Investigación Periodística., «Producción y facturación de agua potable,» 30 Julio 2020. [En línea]. Disponible en: https://ciperchile.cl/wp-content/uploads/gestion-siis-2014-pag 88.pdf. [Último acceso: 30 Julio 2020]. [2]Bureau Veritas S.A., «https://www.bureauveritas.cl/es,» [En línea]. Disponible en: https://www.bureauveritas.cl/es/bureau-veritas-lider-mundial-en-ensayos-inspeccion-y-certificacion. [Último acceso: 1 Junio 2020]. [3]Essbio S.A., «www.essbio.cl,» [En línea]. [4]I. Monedero, F. Biscarri, J. Guerrero, M. Peña, M. Roldán y C. León, «Detection of water meter under-registration using statistical algorithms,» Journal of Water Resources Planning and Management, vol. 142, nº 1, p. 04015036, 2016. [5]I. Monedero, F. Biscarri, C. León, J. Guerrero, J. Biscarri y R. Millán, «Detection of frauds and other non-technical losses in a power utility using Pearson coefficient, Bayesian networks and decision trees,» International Journal of Electrical Power & Energy Systems, vol. 34, nº 1, pp. 90-98, 2012. [6]S. Wang, «A comprehensive survey of data mining-based accounting-fraud detection research,» de 2010 International Conference on Intelligent Computation Technology and Automation, New York, 2010. [7]J. Bierstaker, R. Brody y C. Pacini, «Accountants' perceptions regarding fraud detection and prevention methods,» Managerial Auditing Journal, vol. 21, nº 5, pp. 520-535, 2006. [8]C. Phua, V. Lee, K. Smith y R. Gayler, «A comprehensive survey of data mining-based fraud detection research,» arXiv preprint arXiv:1009.6119, 2010. [9]S. Kotsiantis, I. Zaharakis y P. Pintelas, «Machine learning: a review of classification and combining techniques,» Artificial Intelligence Review, vol. 26, nº 3, pp. 159-190, 2006. [10]J. Han, J. Pei y M. Kamber, Data Mining: Concepts and Techniques, Elsevier, 2011.  


Electronics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 105
Author(s):  
Khaleel Husain ◽  
Mohd Soperi Mohd Zahid ◽  
Shahab Ul Hassan ◽  
Sumayyah Hasbullah ◽  
Satria Mandala

It is well-known that cardiovascular disease is one of the major causes of death worldwide nowadays. Electrocardiogram (ECG) sensor is one of the tools commonly used by cardiologists to diagnose and detect signs of heart disease with their patients. Since fast, prompt and accurate interpretation and decision is important in saving the life of patients from sudden heart attack or cardiac arrest, many innovations have been made to ECG sensors. However, the use of traditional ECG sensors is still prevalent in the clinical settings of many medical institutions. This article provides a comprehensive survey on ECG sensors from hardware, software and data format interoperability perspectives. The hardware perspective outlines a general hardware architecture of an ECG sensor along with the description of its hardware components. The software perspective describes various techniques (denoising, machine learning, deep learning, and privacy preservation) and other computer paradigms used in the software development and deployment for ECG sensors. Finally, the format interoperability perspective offers a detailed taxonomy of current ECG formats and the relationship among these formats. The intention is to help researchers towards the development of modern ECG sensors that are suitable and approved for adoption in real clinical settings.


Electronics ◽  
2021 ◽  
Vol 10 (3) ◽  
pp. 318
Author(s):  
Merima Kulin ◽  
Tarik Kazaz ◽  
Eli De Poorter ◽  
Ingrid Moerman

This paper presents a systematic and comprehensive survey that reviews the latest research efforts focused on machine learning (ML) based performance improvement of wireless networks, while considering all layers of the protocol stack: PHY, MAC and network. First, the related work and paper contributions are discussed, followed by providing the necessary background on data-driven approaches and machine learning to help non-machine learning experts understand all discussed techniques. Then, a comprehensive review is presented on works employing ML-based approaches to optimize the wireless communication parameters settings to achieve improved network quality-of-service (QoS) and quality-of-experience (QoE). We first categorize these works into: radio analysis, MAC analysis and network prediction approaches, followed by subcategories within each. Finally, open challenges and broader perspectives are discussed.


Electronics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 169
Author(s):  
Sherief Hashima ◽  
Basem M. ElHalawany ◽  
Kohei Hatano ◽  
Kaishun Wu ◽  
Ehab Mahmoud Mohamed

Device-to-device (D2D) communication is a promising paradigm for the fifth generation (5G) and beyond 5G (B5G) networks. Although D2D communication provides several benefits, including limited interference, energy efficiency, reduced delay, and network overhead, it faces a lot of technical challenges such as network architecture, and neighbor discovery, etc. The complexity of configuring D2D links and managing their interference, especially when using millimeter-wave (mmWave), inspire researchers to leverage different machine-learning (ML) techniques to address these problems towards boosting the performance of D2D networks. In this paper, a comprehensive survey about recent research activities on D2D networks will be explored with putting more emphasis on utilizing mmWave and ML methods. After exploring existing D2D research directions accompanied with their existing conventional solutions, we will show how different ML techniques can be applied to enhance the D2D networks performance over using conventional ways. Then, still open research directions in ML applications on D2D networks will be investigated including their essential needs. A case study of applying multi-armed bandit (MAB) as an efficient online ML tool to enhance the performance of neighbor discovery and selection (NDS) in mmWave D2D networks will be presented. This case study will put emphasis on the high potency of using ML solutions over using the conventional non-ML based methods for highly improving the average throughput performance of mmWave NDS.


Biomolecules ◽  
2021 ◽  
Vol 11 (4) ◽  
pp. 565
Author(s):  
Satoshi Takahashi ◽  
Masamichi Takahashi ◽  
Shota Tanaka ◽  
Shunsaku Takayanagi ◽  
Hirokazu Takami ◽  
...  

Although the incidence of central nervous system (CNS) cancers is not high, it significantly reduces a patient’s quality of life and results in high mortality rates. A low incidence also means a low number of cases, which in turn means a low amount of information. To compensate, researchers have tried to increase the amount of information available from a single test using high-throughput technologies. This approach, referred to as single-omics analysis, has only been partially successful as one type of data may not be able to appropriately describe all the characteristics of a tumor. It is presently unclear what type of data can describe a particular clinical situation. One way to solve this problem is to use multi-omics data. When using many types of data, a selected data type or a combination of them may effectively resolve a clinical question. Hence, we conducted a comprehensive survey of papers in the field of neuro-oncology that used multi-omics data for analysis and found that most of the papers utilized machine learning techniques. This fact shows that it is useful to utilize machine learning techniques in multi-omics analysis. In this review, we discuss the current status of multi-omics analysis in the field of neuro-oncology and the importance of using machine learning techniques.


Sign in / Sign up

Export Citation Format

Share Document