Credit Card Fraud Detection Using Machine Learning
Credit Card Fraud Detection Using Machine Learning
Credit card fraud is a serious and ever-growing problem with billions of dollars
lost every year due to fraudulent transactions. Fraud has always been present
and will always be. It is also ever changing, as the technology and usage
patterns change over time, which makes CCFD (credit card fraud detection) a
particularly hard problem. There are two major techniques for fraud detection,
namely, misuses (supervised) and anomaly detection (unsupervised). This
classification of techniques is proposed based on capability to process the
numerical and categorical datasets. Data will be processed by machine learning
(ML) based on decision tree, SVM and linear regression. This process gives
chart based result which has been prejudiced by data mining.
MINIMIZE SHOULDER SURFING ATTACK BY MEANS OF
MANUSCRIPT AND COLOUR BASED GRAPHICAL CODE WORD
PROPOSAL
In today’s world frauds are increasing in both regular purchasing and online
shopping. More increases in online shopping. For every transaction bank should
check whether the transaction is fraudulent or not. Fraudster uses various
techniques to generate the fraudulent transactions. Nowadays online
transactions are more fraudulent than offline transactions. Due to increase in
frauds more advance fraud detection system needed the most. Banking mostly
use data mining techniques for credit card fraud detection. In this paper we
propose a new credit card fraud detection system based on behavior certificate
(bc) which reflects the cardholders’ transaction habits using random tree data
mining technique.
PRIVACY PRESERVING FOR ONLINE USER BEHAVIOUR DATA
Online users’ privacy is thus under the risk of being exposed to third parties.
The last decade has spectator a body of research works trying to perform data
aggregation in a privacy-preserving way. Most of existing methods guarantee
strong privacy protection yet at the cost of very insufficient aggregation
operations, such as allowing only summation, which hardly satisfies the need of
behavior analysis. We propose a scheme ppsa, which encrypts users’ sensitive
data to prevent privacy exposure from both outside analysts and the aggregation
service provider, and fully supports selective aggregate functions for online user
behavior analysis while guaranteeing the exponent privacy. We have
implemented our method and evaluated its performance using a trace-driven
evaluation based on a real online behavior dataset. Experiment results show that
our scheme expertly supports both overall aggregate queries and various
selective aggregate queries with acceptable computation and communication
overheads.
TRUSTWORTHY CONVEY FOR SENSOR NETWORKS WITH
MOBILE SINK
The vehicles speed to prevent crashes occurrence and reduce the impact when
they occur, lessening the severity of injuries sustained by the victims. I propose
a modern and an efficient methodology for detecting and reporting illegal
speeds. The system alerts the driver if he exceeded the allowed speed limit. An
infraction is reported against him if he didn’t slow down within a predefined
amount of time. The infractions are sent to a central database and are displayed
in a webpage. The system was implemented in a local network, so an ethernet
cable sufficed for the communication purpose. Over speeding has been
identified as a major cause for traffic accidents. The accidents due to high speed
result in crashes, dangerous injuries and death.
ACCOUNT TRADE: ACCOUNTABILITY AGAINST DISHONEST BIG
DATA BUYERS AND SELLERS
The World Wide Web has developed into a necessary current tool for people’s
every day routine. The reality it is suitable means for announcement and
information look for has completed it particularly accepted. This actuality led
companies to establish using online promotion by creating business website.
Through the quick increase in the figure of websites, search engines had to
approach up with a explanation of algorithms and programs to meet the criteria
the fallout of a search and make available the users with related satisfied to their
search. We can give main concern to their site according to this it show’s in the
users result. The main concern is based upon the position system. The position
is provided by which websites are mostly visited by the users and which
websites are stayed in more than time in the user’s window. The result of the
research showed us that the top factors that supply to higher rankings.
ATTRIBUTE BASED HYBRID BOOLEAN KEYWORD SEARCH OVER
OUTSOURCED ENCRYPTED DATA
Now a day there is several websites are available. If we search any information
that shows list of available sites. We need to show exact result for the user
search we can use the Boolean keyword. Boolean keywords are used as
conjunctions to combine or exclude keywords in a search. Using these Boolean
methods, you are able to focus your search on the results that will most helpful.
It finds only the exact result for users search. Each site contains the unique
Boolean id using that we can search information’s, it hides the unnecessary
information. This way we can made the users search easy and convenient
manner.
EFFECTIVE PATTERN DISCOVERY FOR TEXT MINING USING
HIDDEN PATTERN FILTER SORTING TECHNIQUES
In this paper, the emergence of the internet, billions of websites were created,
which made it hard for the average user to extract useful information from the
web efficiently for a specific search. For resolving a problem we can make
exact information search system. In this system admin can upload the data’s and
also mention the important words are as keywords. If users search some
information, first we can separate as individual keywords that can compare with
the uploaded files keywords to finds the exact matching information. And also
it have some symbolic meaning to symbols (+, - etc...) If we specify (+)
between words it add the information if we specify (-) between words it
eliminates that specific information. According to this we can make a search
process easily and also make a accuracy results to the users.
TOWARDS CONFIDENCE INTERVAL ESTIMATION IN TRUTH
DISCOVERY
In this paper, now a day’s generous judgement is further crucial. Ruling accused
surrounded by amount of believes will create extra conflict. Lie down finding is
an appraisal of an oral declaration with the objective to disclose a likely on
purpose dishonesty. Lie discovery might pass on to a cognitive procedure of
detecting dishonesty by evaluate communication satisfied as well as non-verbal
cues. To stay away from most important difficulty this mission is helpful for
ruling. Believe wants to answer for several questions. It is based on voice
assistant. Similar suspects want to answer for similar query for one more time.
It helps user to notice whether they believe is lie or not. Afterward user can
download the statement. And user also allows screening the whole report to
analyse who is accused. This helps public supplementary theoretically as an
alternative of wasting man power.
AUTOMATIC ONLINE LECTURE HIGHLIGHTING BASED ON
MULTIMEDIA ANALYSIS
In this paper, online lecture is widely useful for those who are doing distance
education and interested students. This project plays major role in absence of
lecturers. This will reduce more work of faculties. Voice assistant is used in this
project to take lectures. To highlight sentences project will repeat more than
once to avoid use of highlighter. FAQ (frequently asked question) is also
allowed in this project to get students feedback. This can be simply accessed by
using keys. Voice based answers will be provided by admin for users feedback
or questions.
ACCESSING NETWORK USING SECURE ANDROID APPLICATIONS
Android has the biggest market share among all smart phone operating system.
Security is one of the main concerns for smart phone users today. As the power
and features of smartphone’s increase, so has their vulnerability for attacks by
viruses etc. Perhaps android is more secured operating system than any other
Smartphone operating system today. Android has very few restrictions for
developer, increases the security risk for end users. In this paper we have
reviewed android security model, application level security and security issues
in the android based Smartphone.
ADBLOCK USAGE IN WEB ADVERTISEMENT
Web users are increasingly turning to ad blockers to avoid ads, which are often
perceived as annoying or an invasion of privacy. While there has been
significant research into the factors driving ad blocker adoption and the
detrimental effect to ad publishers on the web, the resulting effects of ad blocker
usage on web users’ browsing experience is not well understood. To approach
this problem, we conduct a retrospective natural field experiment using firefox
browser usage data, with the goal of estimating the effect of ad blocking on user
engagement with the web. We focus on new users who installed an ad blocker
after a baseline observation period, to avoid comparing different populations.
Their subsequent browser activity is compared against that of a control group,
whose members do not use ad blockers, over a corresponding observation
period, controlling for prior baseline usage. In order to estimate causal effects,
we employ propensity score matching on a number of other features recorded
during the baseline period. In the group that installed an ad blocker, we find
significant increases in both active time spent in the browser (+28% over
control) and the number of pages viewed (+15% over control), while seeing no
change in the number of searches. Additionally, by reapplying the same
methodology to other popular Firefox browser extensions, we show that these
effects are specific to ad blockers. We conclude that ad blocking has a positive
impact on user engagement with the web, suggesting that any costs of using ad
blockers to users’ browsing experience are largely drowned out by the utility
that they offer.
CHILDREN TRACKING CLASSIFICATION CONTROL USING
ANDROID
Children tracking system based on android terminals is proposed. Recently, all
over the world crime against the children in the age of 14 to 17 years is more
popular. Parent’s always worry about their children whenever they are outside
from the home. In this paper, the proposed system consists of two sides out of
them one is parent module and another is the child module. The child module
consists of arm7microcontroller (lpc 2148), gps(global positioning system),
gsm(global system for mobile communication) and voice chip where the parent
module consists of android mobile phone. This paper gives the information
about missing child from school campus. There are two android mobile phones
for the safety of the both module. The system tracking the child from source to
destination i.e. from home to school or anywhere.
E- TAX INFORMATION MANAGEMENT SYSTEM
For that purpose we are developing this application, which can collect the tax
information from different authorities based on the house no’s and owner name
by using web services and stores the data in our own database. For getting the
information regarding taxes citizens need to register first. The bill is calculating
on different modes like annual, half yearly, quarterly etc. By using the user id
and password citizens can log into the system and collect the necessary
information from the home page. For this every user need to provide his house
no and owner name. By clicking on the search button they will get their own.
REVERSIBLE DATA HIDING IN HOMOMORPHIC ENCRYPTED
DOMAIN BY MONITORING CIPHERTEXT GROUP
This application will help the common people under the jurisdiction of a
municipal corporation to register their grievances about day to day problems in
their ward through a mobile application. It will provide a common man to
deliver his complaints and problems to municipal authority as well as let the
municipal authorities to address the problem in a short period of time. This
application provides an interface to register one’s complained and follow it up.
It provides a camera module which helps clicking up a picture of any problem
that people are facing and upload its image along with the complaint.
ONLINE PRISONERS MANAGEMENT SYSTEM
Android has the biggest market share among all Smartphone operating
system. Security is one of the main concerns for Smartphone users today. As the
power and features of Smartphone’s increase, so has their vulnerability for
attacks by viruses etc. Perhaps android is more secured operating system than
any other Smartphone operating system today. Android has very few
restrictions for developer, increases the security risk for end users. In this paper
we have reviewed android security model, application level security and
security issues in the android based Smartphone.
BLOOD BANK MANAGEMENT SYSTEM
Entering the details about the blood groups, members, addresses etc. And
tracking the database is complicated when the details are maintained manually.
This makes the maintenance of schedule erroneous. This is a web application
allows you to access the whole information about blood bank management
software, readily scalable and adaptable to meet the complex need of blood
banks who are key facilitator for the healthcare sector, it also supports all the
functionalities of blood bank.
BOOK SHOP MANAGEMENT SYSTEM
The purpose of this project is to provide a platform for users and rental
product(s) owners in an effective and efficient manner. Online renting system is
a one stop rental portal. It provides services such as hiring motor vehicles,
service apartments, hotels, guest houses, meeting & conference halls, audio
visuals, party rentals, computers and other products. It provides the facility to
make online orders and get everything done before you reach the destination.
CIVIL REGISTRY
This paper discusses about the project implementation of social networking site
for teaching and learning purposes. The type of social space available to users
can provide a more personalized and interactive experience for educative
purpose. The growing demand of engineers in the industry makes it very
important for the students to know about the practical use of technologies that
are taught in the college and also to know about the latest technology and
projects that the industry works with. Thus, a platform where students can
interact with the industry professionals would prove to be a great benefit for
them. In this project a social networking site exclusive for the college has been
created whereby students, faculty and selective people from the industry would
be able to socialize and share their knowledge. Also it would be a hub to share
information about all the ongoing activities in the college campus. This paper
describes the features implemented in this project and presents a glimpse of how
the website works.
DATA TRANSFER WITHOUT NET
This paper is about sending data without using internet or Bluetooth because
these days Smartphone’s acquiring the whole world via android OS where one
uses apps to fulfill their needs. But for sending SMS or data either they will
have to send message by normal manner or by using e-mail or apps. This
application works on the same paradigm as e-mail does. What happen if internet
balance get finished unfortunately at that time when he or she is in great need of
that, than one can’t send data from any app , at that time this app can be proved
to be a boon for the person, sometimes government has to send guidelines via e-
mail to their employees, villagers etc. Or any catastrophe occurs than doctors
could help the people by sending guidelines where mostly internet connection
not available at that point of time this app can be fruitful and one can send files
through SMS to remote area also. With this low-cost application a user can send
attached file like .txt, .pdf, .doc etc. With maximum characters as compared to
normal SMS. This paper proposes a SMS application through which a user can
attach a file from the sd-card (retrieve) just like e-mail and send it to the
recipient to the remote area. And nominal charge will be deducted from the user
who sends data to the recipient.
LEAVE MANAGEMENT SYSTEM (LMS)
This project performs the task of developing a web application that enables the
students and faculty to retrieve the data very easily. The main purpose of event
management system is to provide a platform for the users to view the
information about the events that took place in the past and the ones which are
about to take place in the near future. The users can be faculty, students and
administrator. They can first login into the website and see through the
information such as details about the events like the venue, theme of the event ,
participants, chief guests ,etc. The faculty can keep the record of the attendance
also .the administrator can login and update the information ,delete any
unwanted data ,arrange the information accordingly so that the user can go
through an user friendly and know all the where about of their college.
ONLINE MISSING VEHICLE TRACKING SYSTEM
This project aims at providing an online platform where the records of a typical
vehicle insurance company are properly and efficiently managed so as to ensure
improvement in the productivity of operations of the company. The proposed
vehicle insurance policy system is a web-based application that aims to develop
a complete and fully functional independent system to manage records of
vehicle insurance companies. It is developed with the intent of providing such
insurance companies an online platform for accurate processing, organized data
handling, and efficient retrieval and storage of records.
ONLINE EXAM FOR LICENSE
Technology has supported online examinations successfully for a number of
years, and has progressively enhanced the online examination process over the
years. However, some company’s particularly public tertiary offices in
developing countries are still involved in the conventional manual system of
writing examination. This manual system of writing examination has a lot of
demerits. The manual process of taking examinations is not only time-
consuming and tedious, but cumbersome, hence the need for a better, faster and
more reliable means of examining applicants. The objective of this paper is to
provide a report on the implementation of a web-based examination system for
RTO office purpose of license test.
PC AND LAPTOP CAN BE CONTROLLED FROM REMOTE PLACE
WITH SMARTPHONE
This paper represents how your pc and laptop can be controlled from remote
place with smartphone using internet. It basically turns your smart phone into
wireless keyboard and mouse with touchpad. This application can be performed
with some wireless connection between the pc or laptop and the Smartphone
with android operating system. By accessing the ip address of pc, we can
establish a connection between them using wi-fi connection. This application
not only turns your Smartphone into wireless keyboard and mouse but it also
provides various other features including voice to text conversion. The
implemented application consists of two parts; the first one is an application for
android Smartphone and the second one is a server application that executes the
command selected by user’s application. The outcome of this implementation is
a handy, easy-to-use application.
RESULT ALERT THROUGH EMAIL
With the advent of mobile network communication system, users have been
offered lots of services such as ability to send multimedia messages like sms,
video, data files, images etc. This paper describes the design and
implementation of a system (result alert system) that conveniently provides
examination results to students with the use of email and sms technology via
their mobile phones and devices. Mobile phones and devices are necessary
assets, most especially to students as it makes communication and the spread of
information a lot easier.
SEARCH ENGINE FOR USER ENHANCEMENT
Search engine optimization (seo) is important for websites to improve the rank
for search results and get more page views requested by the user. This search
engine ranks provide the better and optimized result to user, which will help
them to view the popular page among the number of pages available in the
search results. Apart from this search engine ranking, it also enables the
websites to compete with other rival’s website as each and every website owner
expect to see their own website on the list before other’s websites. This paper
puts forward idea about seo principles and basic strategies. It also expresses
different techniques that are employed by search engines to improve its results.
Also it presents the observation section, which gives the comparative analysis of
seo techniques. Update concepts sent to concern seo search member.
SIGN BOARD DETECTION IN ROADWAYS
Very often we see many road accidents taking place, which could be due to
many reasons like drivers ignorance of seeing the signboard, invisible sign
board during bad weather conditions or even due to the damaged signboards.
Road signboard information system is one such approach where the driver gets
the information about the upcoming hurdles. At night time and even during fog
and rainy season it is difficult for the driver to keep track of signboards .one
such solution for these problem is the road signboard information system, where
in image is displayed in the android app and voice alert system helps the driver
to concentrate on the road without even worrying about the signboards.
ANDROID BASED ATTENDANCE SYSTEM USING SESSION OTP
Students are the important part of the institution that matters. The attendance of
the students is also as important. It is the factor that matters a lot to the people in
their career. There are situations where students need to struggle if there is
shortage of attendance. It might go the extreme level also. There have been
technologies that have been introduced in order to reduce the work of the
faculties. Even the pen paper method of taking attendance can be reduced.
The android based attendance system using session otp is an application that
will allow the user to mark the attendance based on the otp sent. This will help
in managing the attendance of students of the institutions in a well organized
way.
UID
“Voice and video over wireless LAN” is concerned with establishing audio and
video calls using wireless LAN. We are using client server model for achieving
this purpose. A wireless router is used to establish the wireless lan. Establishing
wireless LAN is easier, cost effective and less time consuming than establishing
wired LAN. This system provides flexibility of operation. We are configuring
one system having minimum of 1gb ram as a server. Server is responsible for
establishing and maintaining connection among clients. Any pc within the range
of wlan can be configured as client. Installation and maintenance of wired LAN
is tedious and expensive. Comparatively installation of WLAN is simple and
quicker. Maintenance required is also less. Comparatively it is easier to
troubleshoot. Hence we propose a wireless system for audio and video calls
within an organization.
BREAST CANCER
Although uncommon, breast cancer in young women is worthy of special
attention due to the unique and complex issues that are raised. This article
reviews specific challenges associated with the care of younger breast cancer
patients, which include fertility preservation, management of inherited breast
cancer syndromes, maintenance of bone health, secondary prevention, and
attention to psychosocial issues.
BLOOD AND ORGAN DONOR ONLINE
Blood and organ is an important aspect for all living things. It proves to be a
lifesaving component in case of emergency requirement. In this users can view
all the information provided. The main aim of developing this application is to
reduce the time to a great extend that is spent in searching for the right donor
and the availability of blood and organ required. As well as user can register
himself for his/her organ donation after his/her death to the needed ones.
E- BUS PASS REGISTER AND RENEWAL
Bus pass registration is useful for passengers who are facing problems with the
current manual work of bus pass registration and renewal. His/her renewal or
registration can be done through credit card. In the manual system the user has
to go on particular date and time if they fail then the renewal cannot be done.
This online bus pass registration application will help candidates to save their
time and renewal bus pass without standing in a line for hours near counters.
Initially uses need to register with the application by submitting their details
through online. The administrator will verify the candidate details and if they
are satisfied they will approve bus pass. The candidate can login with their
username and password and renewal is performed. The renewal process is
carried by paying the money using the credit card. The candidate can give their
valuable feedback for further enhancement of this project.
ANDROID BASED SUBURBAN TRAIN TICKET BOOKING SYSTEM
The proposed system applies to all police stations across the country and
specifically looks into the subject of crime records management. It is well
understood that crime prevention, detection and conviction of criminals depend
on a highly responsive backbone of information management. The efficiency of
the police function and the effectiveness with which it tackles crime depend on
what quality of information it can derive from its existing records and how fast
it can have access to it.
Project is built using artificial algorithms that analyzes user’s queries and
understand user’s message. In banks, human is insufficient and usually takes
long time to process the single request which results in wastage of time and also
reduce quality of customer service. The primary goal of this chat bot is, banking
officials can interact with mentioning their queries in plain english and the chat
bot can resolve their queries with appropriate response in return. The system is
designed for banks use where banking officials can ask (type) any bank related
questions like loan, account, policy etc. The system recognizes user’s query and
understands what he wants to convey and simultaneously answers them
appropriately. The built in artificial intelligence system realizes users
requirements and provides suitable answers to the banking officials. Our
intelligent system will first take input from bank officials. This input will be
taken as written format (by typing queries). According to input, intelligent
system will processes the query and give response to user.
SMART FARE AND PASSENGER MANAGEMENT SYSTEM
Report on a new approach on enhancing advancements in certain user
recognition applications which is to provide better management system on
passenger and fare management using recognition devices for better
authentication with message notification for passengers. The existing system
allows only reservations but the proposed system enhances real time fare
management with dropping point notification to passengers.
ONLINE EXAM AUTHENTICATION SYSTEM USING FACE
RECOGNITION
Report on a new approach on enhancing advancements in certain user
recognition applications which is to provide better authentication using
recognition devices. The existing system provides authentication using
traditional username password fields but the proposed system allows facial
recognition for better authentication in the online system.
ATTRIBUTE BASED DATA TRANSFER WITH GENERAL POLICIES
With the popularity of cloud computing, there have been increasing concerns
about its security and privacy. Since the cloud computing environment is
distributed and untrusted, data owners have to encrypt outsourced data to
enforce confidentiality. Therefore, how to achieve practicable access control of
encrypted data in an untrusted environment is an urgent issue that needs to be
solved. Attribute-based methods provide authorization to parties based on
whether their set of attributes (e.g., name, mail id, mobile number, etc.) Fulfills
a policy. In this paper, we combine elements of abe and abcs together with
garbled circuits to construct attribute-based data transfer (abdt). Our focus is on
an interactive solution involving a client that holds a certificate (issued by an
authority) vouching for that client’s attributes and a server that holds a policy
computable on such a set of attributes.
COLLEGE MANAGEMENT SYSTEM
College management system software allows college authorities to streamline
education process and manage students with ease and provide a unified
environment where teaching & learning can thrive. This project includes
process like students module, teachers module, faculties module, subjects
module, and score module where all the results of students are available, article
posting module and location module. We can easily identify the details of each
and everything in this college management system.
CONTENT-BASED INFORMATION RETRIEVAL TECHNIQUES
Distributed information retrieval methods are growing rapidly because of the
rising need to access and search distributed digital documents. However, the
content based information retrieval (CBIR) is concentrated to extract and
retrieve the information from massive digital libraries, which require a huge
amount of computing and storage resources. The grid computing provides the
reliable infrastructure for effective and efficient retrieval on these large
collections. In order to build an effective and efficient cbir technique, varieties
of architectures were developed based on grid technologies. The goal of such
architecture is to solve interoperability and heterogeneous resource issues, and
increase the efficiency and effectiveness of information retrieval (IR)
techniques by harnessing the grid computing capabilities. This paper reviews
and analyzes latest research carried out in the domain of large-scale dataset IR
based on a grid. The evaluation is based on scalability, response time, scope,
data type, search technique, middleware, and query type. The contribution is to
illustrate the features, capabilities, and shortages of current solutions that can
guide the researchers in this evolving area.
SECURE INFORMATION SHARING USING STEGNOGRAPHY AND
CRYPTOGRAPHY
Steganography techniques are used to address digital copyrights management,
protect information, and conceal secrets. Steganography and cryptography are
two popular ways of sending vital information in a secret way. One hides the
existence of the message and the other distorts the message itself. This paper
discussed a technique used on the advanced LSB (least significant bit) and RSA
algorithm. By matching data to an image, there is less chance of an attacker
being able to use steganalysis to recover data. Before hiding the data in an
image the application first encrypts it.
WEB BASED RECRUITMENT MANAGEMENT SYSTEM IN PHP
This project is an ideal web-based recruitment tool for companies and
co-op/internship programs. Candidates will also able to get the selected list and
future upcoming jobs and eligibility criteria to fill the form. Admin will have
the authority to fully maintain the database and make any changes as per their
requirements. It contains modules for job postings, applications, company and
applicant information, interview signup, and advanced reporting/searching.
DEVELOPMENT OF WEB PORTAL FOR HEALTH CENTRE
The objectives were to provide a complete informative website for aromas users
with the option to make an appointment for a vaccination or health certificate,
order prescriptions and get update information directly published by aromas
staff. And to give the staff of aroma a graphical web interface to manage the
content and the booking system. The report goes through the basic language
used and why. Further it takes up it how works and how the final product looks
and behaves.
A DATA SHARING PROTOCOL TO MINIMIZE SECURITY AND
PRIVACY RISKS IN CLOUD STORAGE
Data sharing in the cloud is a technique that allows users to conveniently access
data over the cloud. The data owner outsources their data in the cloud due to
cost reduction and the great conveniences provided by cloud services. Data
owner is not able to control over their data, because cloud service provider is a
third party provider. The main crisis with data sharing in the cloud is the
privacy and security issues. Various techniques are available to support user
privacy and secure data sharing. This paper focus on various schemes to deal
with secure data sharing such as Data sharing with forward security, secure data
sharing for dynamic groups, Attribute based data sharing, encrypted data
sharing and Shared Authority Based Privacy-Preserving Authentication
Protocol for access control of outsourced data.
SKIN LESION CLASSIFICATION USING SUPERVISEDALGORITHM
IN DATA MINING
Skin cancer is one of the major types of cancers with an increasing incidence
over the past decades. Accurately diagnosing skin lesions to discriminate
between benign and skin lesions is crucial.J48 Algorithm and SVM (SUPPORT
VECTOR MACHINE) based techniques to estimate effort.In this work
proposed system of the project is using data mining techniques for collecting the
datasets for skin cancer. So that system can overcome to diagnosing the disease
quickly and accuracy. Comparing to other algorithm proposed algorithm has
more accuracy. When we have to using two kind of algorithm .They are J48,
SVM. J48 Algorithm produced better accuracy more than SVM algorithm. The
accuracy of the proposed system is 90.2381%. It means This prediction is very
close to the actual values