Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      1 Jan 2023, Volume 38 Issue 1   
    Article

    1. BIRCH ALGORITHM BASED SUSPICIOUS CURRENCY LAUNDERING DETECTION DATA MINING TECHNIQUE
    1*G.Mothilal Nehru 2.S.J. Vivekanandan 3.M.John Britto 4. M.Chandraprabha 5. J.Anita Smiles
    Journal of Data Acquisition and Processing, 2023, 38 (1): 1011-1016 . 

    Abstract

    The Money Laundering Detection System (MLDS) it denotes to the happenings of monetary institution that achieve to realize compliances with lawful requirements. Currency laundering regulations combine currency valeting (source of fund) with a destination of fund. Currency filtering is a course of veiling the unlawful derivation of dark cash and makes them seem unaffected. Currency laundering is a permeation of black currency is a critical tricky from national economies. Process that takes black currency and puts it complete a cycle of dealings or finished numerous versions in one group or within additional banks. The regeneration of the cash brands the currency seem to be after genuine bases and the money cannot be sketched posterior to its unlawful basis. Beating lawfully learnt currency to evade assessment also succeeds as currency washing. World has accepted constitutional actions aimed at the actual recognition and preclusion of money filtering. It is a worldwide crime which is achieved by every other separate in emerging and industrialized republics. It determines the money laundering has caused to economy. Noticing doubtful monetary dealings is a vital condition and key feature of anti-money valeting. Approaches are based on the amount of dealings, and the documentation application process is tremendously limited to the mechanism of unusual investment actions reporting. The goal of this article is to contemporary the trends and efficiency of money laundering kiosk measures from the viewpoint of an amount of doubtful dealings.

    Keyword

    Birch Algorithm, Currency Laundering, Data Mining, Suspicious Records.


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved