• Title/Summary/Keyword: Frequent Patterns

Search Result 572, Processing Time 0.019 seconds

A Study on the Application of Outlier Analysis for Fraud Detection: Focused on Transactions of Auction Exception Agricultural Products (부정 탐지를 위한 이상치 분석 활용방안 연구 : 농수산 상장예외품목 거래를 대상으로)

  • Kim, Dongsung;Kim, Kitae;Kim, Jongwoo;Park, Steve
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.93-108
    • /
    • 2014
  • To support business decision making, interests and efforts to analyze and use transaction data in different perspectives are increasing. Such efforts are not only limited to customer management or marketing, but also used for monitoring and detecting fraud transactions. Fraud transactions are evolving into various patterns by taking advantage of information technology. To reflect the evolution of fraud transactions, there are many efforts on fraud detection methods and advanced application systems in order to improve the accuracy and ease of fraud detection. As a case of fraud detection, this study aims to provide effective fraud detection methods for auction exception agricultural products in the largest Korean agricultural wholesale market. Auction exception products policy exists to complement auction-based trades in agricultural wholesale market. That is, most trades on agricultural products are performed by auction; however, specific products are assigned as auction exception products when total volumes of products are relatively small, the number of wholesalers is small, or there are difficulties for wholesalers to purchase the products. However, auction exception products policy makes several problems on fairness and transparency of transaction, which requires help of fraud detection. In this study, to generate fraud detection rules, real huge agricultural products trade transaction data from 2008 to 2010 in the market are analyzed, which increase more than 1 million transactions and 1 billion US dollar in transaction volume. Agricultural transaction data has unique characteristics such as frequent changes in supply volumes and turbulent time-dependent changes in price. Since this was the first trial to identify fraud transactions in this domain, there was no training data set for supervised learning. So, fraud detection rules are generated using outlier detection approach. We assume that outlier transactions have more possibility of fraud transactions than normal transactions. The outlier transactions are identified to compare daily average unit price, weekly average unit price, and quarterly average unit price of product items. Also quarterly averages unit price of product items of the specific wholesalers are used to identify outlier transactions. The reliability of generated fraud detection rules are confirmed by domain experts. To determine whether a transaction is fraudulent or not, normal distribution and normalized Z-value concept are applied. That is, a unit price of a transaction is transformed to Z-value to calculate the occurrence probability when we approximate the distribution of unit prices to normal distribution. The modified Z-value of the unit price in the transaction is used rather than using the original Z-value of it. The reason is that in the case of auction exception agricultural products, Z-values are influenced by outlier fraud transactions themselves because the number of wholesalers is small. The modified Z-values are called Self-Eliminated Z-scores because they are calculated excluding the unit price of the specific transaction which is subject to check whether it is fraud transaction or not. To show the usefulness of the proposed approach, a prototype of fraud transaction detection system is developed using Delphi. The system consists of five main menus and related submenus. First functionalities of the system is to import transaction databases. Next important functions are to set up fraud detection parameters. By changing fraud detection parameters, system users can control the number of potential fraud transactions. Execution functions provide fraud detection results which are found based on fraud detection parameters. The potential fraud transactions can be viewed on screen or exported as files. The study is an initial trial to identify fraud transactions in Auction Exception Agricultural Products. There are still many remained research topics of the issue. First, the scope of analysis data was limited due to the availability of data. It is necessary to include more data on transactions, wholesalers, and producers to detect fraud transactions more accurately. Next, we need to extend the scope of fraud transaction detection to fishery products. Also there are many possibilities to apply different data mining techniques for fraud detection. For example, time series approach is a potential technique to apply the problem. Even though outlier transactions are detected based on unit prices of transactions, however it is possible to derive fraud detection rules based on transaction volumes.

Radiation Therapy and Chemotherapy after Breast Conserving Surgery for Invasive Breast Cancer: An Intermediate Result (침윤성 유방암에서 유방보존수술 후 방사선치료 및 항암화학 병용치료의 성적 및 위험인자 분석)

  • Lee, Seok-Ho;Choi, Jin-Ho;Lee, Young-Don;Park, Heoung-Kyu;Kim, Hyun-Young;Park, Se-Hoon;Lee, Kyu-Chan
    • Radiation Oncology Journal
    • /
    • v.25 no.1
    • /
    • pp.16-25
    • /
    • 2007
  • [ $\underline{Purpose}$ ]: Breast conserving surgery (BCS) followed by chemotherapy (CTx.) and radiation therapy (RT) is widely performed for the treatment of early breast cancer. This retrospective study was undertaken to evaluate our interim results in terms of failure patterns, survival and relative risk factors. $\underline{Materials\;and\;Methods}$: From January 1999 through December 2003, 129 patients diagnosed with invasive breast cancer and treated with BCS followed by RT were subject to retrospective review. The median age of the patients was 45 years (age distribution, $27{\sim}76$ years). The proportions of patients according to their tumor, nodes, and metastases (TNM) stage were 65 (50.4%) in stage I, 41 (31.7%) in stage IIa, 13 (10.1%) in stage IIb, 9 (7.0%) in stage III, and 1 patient (0.8%) in stage IIIc. For 32 patients (24.8%), axillary node metastasis was found after dissection. BCS consisted of quadrantectomy in 115 patients (89.1%) and lumpectomy in 14 patients (10.6%). Axillary node dissection at axillary level I and II was performed for 120 patients (93%). For 7 patients (5.4%), only sentinel node dissection was performed with BCS. For 2 patients (1.6%) axillary dissection of any type was not performed. Postoperative RT was given with 6 MV X-rays. A tumor dose of 50.4 Gy was delivered to the entire breast area using a tangential field with a wedge compensator. An aditional dose of $9{\sim}16\;Gy$ was given to the primary tumor bed areas with electron beams. In 30 patients (23.3%), RT was delivered to the supraclavicular node. Most patients had adjuvant CTx. with $4{\sim}6$ cycles of CMF (cyclophosphamide, methotrexate, 5-fluorouracil) regimens. The median follow-up period was 50 months (range: $17{\sim}93$ months). $\underline{Results}$: The actuarial 5 year survival rate (5Y-OSR) was 96.9%, and the 5 year disease free survival rate (5Y-DFSR) was 93.7%. Local recurrences were noted in 2 patients (true: 2, regional node: 1) as the first sign of recurrence at a mean time of 29.3 months after surgery. Five patients developed distant metastases as the first sign of recurrence at $6{\sim}33$ months (mean 21 months). Sites of distant metastatic sites were bone in 3 patients, liver in 1 patient and systemic lesions in 1 patient. Among the patients with distant metastatic sites, two patients died at 17 and 25 months during the follow-up period. According to stage, the 5Y-OSR was 95.5%, 100%, 84.6%, and 100% for stage I, IIa, IIb, and III respectively. The 5Y-DFSR was 96.8%, 92.7%, 76.9%, and 100% for stage I, IIa, IIb, and III respectively. Stage was the only risk factor for local recurrence based on univariate analysis. Ten stage III patients included in this analysis had a primary tumor size of less than 3 cm and had more than 4 axillary lymph node metastases. The 10 stage III patients received not only breast RT but also received posterior axillary boost RT to the supraclavicular node. During the median 53.3 months follow-up period, no any local or distant failure was found. Complications were asymptomatic radiation pneumonitis in 10 patients, symptomatic pneumonitis in 1 patient and lymphedema in 8 patients. $\underline{Conclusion}$: Although our follow up period is short, we had excellent local control and survival results and reaffirmed that BCS followed by RT and CTx. appears to be an adequate treatment method. These results also provide evidence that distant failure occurs earlier and more frequent as compared with local failure. Further studies and a longer follow-up period are needed to assess the effectiveness of BCS followed by RT for the patients with less than a 3 cm primary tumor and more than 4 axillary node metastases.