UPI (Dinesh)
UPI (Dinesh)
Batch Number-10
Kongarapu Vamshi- 21311A6222
G.V.P.K. Dinesh- 21311A6211
Lohith Kumar- 22315A6207
Machine Learning (ML) offers powerful tools to detect and prevent fraud in UPI
transactions by analyzing large volumes of transaction data to identify patterns
and anomalies indicative of fraudulent behavior. Traditional rule-based systems
often fall short due to the evolving nature of fraud techniques. ML algorithms, on
the other hand, can adapt to new patterns and continuously improve their
detection capabilities
Software and Hardware
Requirements
Software Hardware
Requirements: Requirements:
Front End – •Hard Disk: Greater
Anaconda IDE than 500 GB
Backend – SQL •RAM: Greater than 4
Language – Python GB
3.8 •Processor: I3 and
Above
Existing Problem
To detect counterfeit transactions, three
machine-learning algorithms were presented and
implemented.
There are many measures used to evaluate the
performance of classifiers or predictors, such as
the Gradient Boost Classifier, Random Forest,
and Decision Tree.
These metrics are either prevalence-dependent
or prevalence-independent.
Furthermore, these techniques are used in UPI
fraud detection mechanisms, and the results of
these algorithms have been compared.
Proposed Solution
Various modern techniques like artificial neural network can be
employed.
Different machine learning algorithms are compared, including
K-Means Clustering ,etc.
This project uses various algorithm, and neural network which
comprises of techniques for finding optimal solution for the
problem and implicitly generating the result of the fraudulent
transaction.
The main aim is to detect the fraudulent transaction and to
develop a method of generating test data.
This algorithm is a heuristic approach used to solve high
complexity computational problems.
The implementation of an efficient fraud detection system is
imperative for all UPI issuing companies and their clients to
minimize their losses.
Abstract
Increase in UPI usage for online payments.
Cases of fraud associated with it are also rising.
Few steps involving UPI transaction process using a Hidden Markov
Model (HMM).
How it can be used for the detection of frauds.
An HMM is initially trained for a cardholder.
If an UPI transaction is not accepted by the trained HMM. It is
considered to be fraudulent.
People can use UPI’s for online transactions as it provides an efficient
and easy-to-use facility.
With the increase in usage of UPI’s, the capacity of UPI misuse has
also enhanced.
UPI frauds cause significant financial losses for both UPI holders and
financial companies.
Design
Implementation
I. Use Case Diagram:-
An Use Case diagram visually represents the interactions between
users (actors) and a system to accomplish the specific goals.
II. CLASS
DIAGRAM
A Class diagram illustrates the structure of a system by showing the