0% found this document useful (0 votes)
561 views11 pages

Upi Fraud Detection Using Machine Learning

Uploaded by

21311a6222
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
561 views11 pages

Upi Fraud Detection Using Machine Learning

Uploaded by

21311a6222
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

UPI FRAUD DETECTION

USING MACHINE LEARNING

Batch Number-10
Kongarapu Vamshi- 21311A6222
G.V.P.K. Dinesh- 21311A6211
Lohith Kumar- 22315A6207

Under the Guidance of


V.Geeta
Software and Hardware
Requirements
Software Hardware
Requirements: Requirements:
 Front End – •Hard Disk: Greater
Anaconda IDE than 500 GB
 Backend – SQL •RAM: Greater than 4
 Language – Python GB
3.8 •Processor: I3 and
Above
Existing Problem
 To detect counterfeit transactions, three
machine-learning algorithms were presented and
implemented.
 There are many measures used to evaluate the
performance of classifiers or predictors, such as
the Gradient Boost Classifier, Random Forest,
and Decision Tree.
 These metrics are either prevalence-dependent
or prevalence-independent.
 Furthermore, these techniques are used in UPI
fraud detection mechanisms, and the results of
these algorithms have been compared.
Proposed Solution
 Various modern techniques like artificial neural network can be
employed.
 Different machine learning algorithms are compared, including
K-Means Clustering ,etc.
 This project uses various algorithm, and neural network which
comprises of techniques for finding optimal solution for the
problem and implicitly generating the result of the fraudulent
transaction.
 The main aim is to detect the fraudulent transaction and to
develop a method of generating test data.
 This algorithm is a heuristic approach used to solve high
complexity computational problems.
 The implementation of an efficient fraud detection system is
imperative for all UPI issuing companies and their clients to
minimize their losses.
Abstract
 Increase in UPI usage for online payments.
 Cases of fraud associated with it are also rising.
 Few steps involving UPI transaction process using a Hidden Markov
Model (HMM).
 How it can be used for the detection of frauds.
 An HMM is initially trained for a cardholder.
 If an UPI transaction is not accepted by the trained HMM. It is
considered to be fraudulent.
 People can use UPI’s for online transactions as it provides an efficient
and easy-to-use facility.
 With the increase in usage of UPI’s, the capacity of UPI misuse has
also enhanced.
 UPI frauds cause significant financial losses for both UPI holders and
financial companies.
Design
Implementati
on
I. Use Case
Diagram:-
 An Use Case diagram
visually represents the
interactions between
users (actors) and a
system to accomplish the
specific goals.
II. CLASS
DIAGRAM
 A Class diagram

illustrates the
structure of a
system by
showing the
classes, attributes,
methods, and
relationships
between them.
III. ACTIVITY
DIAGRAM
 An Activity diagram visually represents the flow of activities within
a system, depicting actions, decisions, and transitions between
them.
Scenario : Customer initiating a transaction
Scenario : Customer being notified about fraudulent
transaction
IV. SEQUENCE DIAGRAM
 A sequence diagram illustrates the interactions between
objects or components in a system over time, showing the
sequence of messages exchanged between them.
Scenario : Customer initiating a transaction
Scenario : Customer completing a transaction

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy