Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Identity crime is well known, prevalent, and costly; and credit application
fraud is a specific case of identity crime.
Credit applications are Internet or paper-based forms with written requests
by potential customers for credit cards, mortgage loans, and personal loans.
Credit application fraud is a specific case of identity crime, involving
synthetic identity fraud and real identity theft.
As in identity crime, credit application fraud has reached a critical mass of
fraudsters who are highly experienced, organized, and sophisticated.
The existing multi-layered detection system complemented with additional
layer Communal Detection. CD finds real social relationships to reduce the
suspicion score, and is tamper-resistant to synthetic social relationships.
The proposed system can overcome all the limitations of the existing
system. The project should be developed such that the necessary functions
and performance are achieved within the constraints.
The project is developed within latest technology.
Introduction
Existing System
Identity crime has become prominent because there is so much real identity
data available on the Web, and confidential data accessible through unsecured
mailboxes.
It has also become easy for perpetrators to hide their true identities. This can
happen in a myriad of insurance, credit, and telecommunications fraud, as well
as other more serious crimes.
There are two types of duplicates: exact (or identical) duplicates have the all
same values; near (or approximate) duplicates have some same values (or
characters), some similar values with slightly altered spellings, or both.
In existing System are based on white-listing and detecting spikes of similar
applications. White-listing uses real social relationships on a fixed set of
attributes.
Here they can use communal detection algorithm. To account for legal
behaviour and data errors, Communal Detection (CD) is the whitelist-oriented
approach on a fixed set of attributes.
The whitelist, a list of communal and self relationships between applications, is
crucial because it reduces the scores of these legal behaviours and false
positives.
Disadvantages
Proposed System
The aim of proposed system is to develop a system of
improved facilities.
The proposed system can overcome all the limitations of
the existing system.
The system provides pro per security and reduces the manual
work.
The project should be developed such that the necessary
functions and performance are achieved within the constraints.
The project is developed within latest technology.
Through the techno logy may become obsolete after some
period of time, due to the fact that never version of same
software supports older versions, the system may still be used.
So there are minimal constraints involved with this project.
Advantages
Security of data.
Ensure data accuracys.
Proper control of the higher officials.
Minimize manual data entry.
Minimum time needed for the various processing.
Greater efficiency.
Better service.
User friendliness and interactive.
Minimum time required.
Modules
FIR Mangement
This module allows viewing the First Information Report of all the
crimes that took place at recent years. The administrator can enter
FIR information and save it in a database.
Case History Details Management
Here we can view the details of the case, date of occurrence, the
type of crime and place of occurrence etc
Hardware Specification
Processor
RAM
Hard disk
FDD
Monitor
Mouse
CD Drive
Keyboard
:
:
:
:
:
:
:
:
Software Specification
Screen Shots
User Register
Login Page
Compliant Report
Crime Report
Missing Person
Criminal Report
Conclusion
Future Work
In future we can use Image recognization instead of using
hetrogenious database more over
High speed, accuracy and non-redundant data are the main
advantages of the proposed system.
In the proposed system the user is provided with a choice of data
screen, which are similar in formats to the source documents.
Data entry errors can be minimized through validity checks.
After the verification only the data are placed the permanent
database.