FrostHack Hackathon
Credit card fraud, act committed by any person who, with intent to defraud, uses a credit card that has been revoked, cancelled, reported lost, or stolen to obtain anything of value. Using the credit card number without possession of the actual card is also a form of credit card fraud. Through training by model I made ML model to make prediction regarding frauds. You need to give 30 transation details it will Predict. Particularly model is deployed on webstie using FLASK I also made a Website which will connect to main website. Link -https://curious-kitsune-44c4c3.netlify.app/ Slides -https://github.com/Devharal/Ace_Dynamics-/blob/858ea60f3599294b26b7a6942e31898a53289753/Presentation.pdf
Video Describing Model - https://drive.google.com/file/d/1M1yrmjqw8XYajSGr9eigi67Y7ZcTKkuE/view?usp=sharing
You must have Scikit Learn, Pandas (for Machine Leraning Model) and Flask (for API) installed.
Flask version: 0.12.2 conda install flask=0.12.2 (or) pip install Flask==0.12.2
This project has four major parts :
- ace-dynamics-fraud-detection.py - This contains code fot our Machine Learning model to predict employee salaries absed on trainign data in 'hiring.csv' file.
- app.py - This contains Flask APIs that receives employee details through GUI or API calls, computes the precited value based on our model and returns it.
- template - This folder contains the HTML template (index.html) to allow user to enter employee detail and displays the predicted employee salary.
- static - This folder contains the css folder with style.css file which has the styling required for out index.html file.
I have already save ML Model in model.pkl
- Run app.py using below command to start Flask API
python app.py
By default, flask will run on port 5000.
- Navigate to URL http://127.0.0.1:5000/ (or) http://localhost:5000
You should be able to view the homepage.
Enter valid numerical values in all 30 input boxes and hit Predict.
If everything goes well, you should be able to see the predcited salary vaule on the HTML page! check the output here: http://127.0.0.1:5000/predict