A Fraud Detection Approach in Telecommunication using Cluster GA

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© May to June Issue 2011 by IJCTT Journal
Volume-1 Issue-2                          
Year of Publication : 2011
Authors :V.Umayaparvathi, Dr.K.Iyakutti.

MLA

V.Umayaparvathi, Dr.K.Iyakutti "A Step towards Precision Farming of Rice Crop by Estimating Loss Caused by Leaf Blast Disease Using Digital Image Processing and Fuzzy Clustering "International Journal of Computer Trends and Technology (IJCTT),V1(2):165-170 May to June Issue 2011 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract—In trend mobile is one of the important devices in public sector. In mobile community there are N numbers of vendors, manufacturers available. The telecommunications industry was first to adopt data mining technology. Telecommunication companies day by day generate and store enormous amounts of high - quality data, have a very large customer data base and operate in a rapidly changing and highly competitive business environment. Telecommunication companies utilize data mining technique to improve their market ing efforts, identify fraud and better manage their telecommunication network connection. In this paper we provide an effective solution to identify the fraud detection in telecommunication using Data Mining clustering techniques with GA as well as misbeha vior users. We believe this approach will help in our society.

References-

[ 1 ] Saleh Al Kodhair, Mining Association Rules using Genetic Algorithm, 2008, Master Thesis.
[ 2 ] S. Sakurai, Y. Kitahara, and R. Orihara, “A Sequential Pattern Mining Method based on Sequential Interestingness”, Fall.2008, International Journal of Computational Intelligence, pp.252 - 260.
[ 3 ] Jay Ay res , Johannes Gehr ke, Tomi Yiu, and Jason Flannick,”Sequential Pattern Mining using A Bitmap Representation”, 2002, SIGKDD ’02 Edmonton, Alberta, Canada.
[4] Malone, J., etc.. (2005). Data mini ng Using Rule Extraction from Kohonen Self - organising Maps. Neural Comput & Applic 15: 9 - 17.
[5] Wu, S., Gao, X. and Bastian, M. (2003). Data Warehousing and Data Mining. Metallurgical Industry Press. Beijing.
[6] Wang, Y. (2004). The Study on Data Warehouse and Data Mining in Telecom industry Management Analysis and Application. College of Computer Science, Chongqing University. Chongqing.