PREDICTION OF CREDIT CARD PAYMENT NEXT MONTH THROUGH TREE NET DATA MINING TECHNIQUES
DOI:
https://doi.org/10.47839/ijc.19.1.1698Keywords:
Data Mining, TreeNet, Person Correlation, Confusion Matrices Measures.Abstract
A number of research initiatives have recently been launched around the world regarding the conceptualization, specification, design and development principles of the future use of credit cards, storing secret information on them, while most time we use them for online payment. In addition, if it has enough money, we can pay for what we need at any time. Therefore, the goal of this proposed research is to use data mining techniques to predict credit card payment next month. Our proposed system contains five steps: (a) find the suitable database from the internet because this database is not available in Iraq, (b) pre-process the credit card database based on person correlation matrix to determine which feature is less correlated with other to remove it and reduce the time of prediction, (c) split pre-processing database into two parts training and testing dataset, (d) apply TreeNet prediction data mining techniques (TPDMT) on training dataset to test if we need payment next month or do not, find the optimal tree. TreeNet based on Boosting Machine usually makes the predictor to use Decision Trees (DTs). (e ) Finally, pass the testing dataset on the optimal tree results from TPDMT, then using the five measures related to confusion matrix to evaluate the results including “Accuracy (AC), recall or true positive rate (TP), precision (P), F-measure (considers both precision and recall) and Fb”.References
Y. Cheng, C.-H. Lien, “The comparisons of data mining techniques for the predictive accuracy of probability of default of credit card clients,” Expert Systems with Applications, vol. 36, pp. 2473–2480, 2009.
Credit Card Services: Using the Simple Order API, CyberSource Corporation HQ, July 2019.
F. Provost, & R. Kohavi, “Guest editors’ introduction: On applied research in machine learning,” Machine Learning, vol. 30, issue 2, pp. 127-132, 1998.
P.M. Deshpande, A.H. Siddiqi, K. Alam, K. Parmar, “Applications of data mining techniques for fraud detection in credit-debit card transactions,” Proceedings of the National Conference on Technological Advancement and Automatization in Engineering, January 2016, pp. 339-345.
R. Patidar, and L. Sharma, “Credit card fraud detection using neural network,” International Journal of Soft Computing and Engineering, no. 1, pp. 32-38, 2011.
J.K. Bae, and J. Kim, “A personal credit rating prediction model using data mining in smart ubiquitous environments,” International Journal of Distributed Sensor Networks, vol. 11, issue 9, paper 179060, 2015.
H. Modi, et al., “Fraud detection in credit card system using web mining,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 1, issue 2, pp. 175-179, 2013.
I.H. Witten, et al., Data Mining: Practical Machine Learning Tools and Techniques, Morgan Kaufmann, 2016.
V. Bhusari, and S. Patil, “Application of hidden Markov model in credit card fraud detection,” International Journal of Distributed and Parallel Systems, vol. 2, issue 6, pp. 203-211, 2011.
M.A.Z. Khan, J.D. Pathan, and A.H.E. Ahmed, “Credit card fraud detection system using hidden Markov model and K-clustering,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, issue 2, pp. 5458-5461, 2014.
H. Patel, and D. Patel, “A brief survey of data mining techniques applied to agricultural data,” International Journal of Computer Applications, vol. 95, issue 9, pp. 6-8, 2014.
TreeNet™ An exclusive implementation of Jerome Friedman’s MART methodology, Salford Systems, 2005.
Robust Multi-Tree Technology for Data Mining, Predictive Modeling and Data Processing, Version 2.0, 2005.
D. Steinber, Overview of TreeNet™ Technology Stochastic Gradient Boosting, January 2009.
A. Patel, S. Al-Janabi, I. Al Shourbaji, J. Pedersen, “A novel methodology towards a trusted environment in mashup web applications,” Computers & Security, vol. 49, pp. 107-122, 2015. https://doi.org/10.1016/j.cose.2014.10.009.
R. Kaviyarasi, and T. Balasubramanian, “Exploring the high potential factors that affects students’ academic performance,” International Journal of Education and Management Engineering, vol. 8, issue 6, pp. 15-23, 2018.
M.J.A. Berry, and G.S. Linoff, Data Mining Techniques: for Marketing, Sales, and Customer Relationship Management, John Wiley & Sons, 2004.
P.K. Chan, et al., “Distributed data mining in credit card fraud detection,” IEEE Intelligent Systems, vol. 6, pp. 67-74, 1999.
Y.B. Wah, and I.R. Ibrahim. “Using data mining predictive models to classify credit card applicants,” Proceedings of the 2010 6th IEEE International Conference on Advanced Information Management and Service (IMS), 2010, pp. 394-398.
J.A. Roberts, and E. Jones, “Money attitudes, credit card use, and compulsive buying among American college students,” Journal of Consumer Affairs, vol. 35, issue 2, pp. 213-240, 2001.
https://archive.ics.uci.edu/ml/datasets/default+of+credit+card+clients.
G.P. Spathoulas, S.K. Katsikas, “Reducing false positives in intrusion detection systems,” Comput. Secur., vol. 29, pp. 35–44, 2010.
J. Han and M. Kamber, Data Mining: Concepts and Techniques, 3th Edition, Elsevier, 2013.
P.-N. Tan, M. Steinbach, and V. Kumar, Introduction to Data Mining, Pearson Addison-Wesley, 2006.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.