主权项 |
1. A method for implementation by one or more data processors comprising:
tagging, by at least one data processor, each of a plurality of transactions, based on parameters associated with the transactions, with one of a first tag value, representing a non-fraud condition, or a second tag value, representing a fraud condition; forming, by at least one data processor, a first cluster associated with the tagged transactions having the first tag value; forming, by at least one data processor, a second cluster associated with the tagged transactions having the second tag value; determining, by at least one data processor, a first centroid of the first cluster; determining, by at least one data processor, a second centroid of the second cluster; determining, by at least one data processor, a fuzzy tag value for one transaction of the plurality of transactions, based on a relationship between the transaction and the first centroid, and between the transaction and the second centroid, wherein the relationship for determining the fuzzy tag value includes a distance the transaction is from the first centroid, and a distance the transaction is from the second centroid; and replacing, by at least one data processor, in the one transaction of the plurality of transactions, the first tag value or the second tag value with the fuzzy tag value. |