Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753055
A. Joshi, Akshaykumar Athani, K. Tangod
The world is focalizing towards smart technologies through wireless communication channel and at the same time facing energy crisis. This article implements the working of RGB color model which is essentially an automated eccentric lighting system which works using the ESP8266. We have named this model as LitUP. This proposed article includes client-server mechanism which instructs ESP8266 via a mobile application or website. MQTT protocol is used which is secured form of TCP/IP. This proposed model controls the intensity, brightness and hue of the lighting system easily with the app or website which has user friendly interface which provides choice for different types light depending on the aura. By default the white light will be switched on when the person enters the room as detected by the PIR sensor.
{"title":"LitUp-A Wireless Lighting System using IOT","authors":"A. Joshi, Akshaykumar Athani, K. Tangod","doi":"10.1109/ICGCIOT.2018.8753055","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753055","url":null,"abstract":"The world is focalizing towards smart technologies through wireless communication channel and at the same time facing energy crisis. This article implements the working of RGB color model which is essentially an automated eccentric lighting system which works using the ESP8266. We have named this model as LitUP. This proposed article includes client-server mechanism which instructs ESP8266 via a mobile application or website. MQTT protocol is used which is secured form of TCP/IP. This proposed model controls the intensity, brightness and hue of the lighting system easily with the app or website which has user friendly interface which provides choice for different types light depending on the aura. By default the white light will be switched on when the person enters the room as detected by the PIR sensor.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132060949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753101
Santosh Mahendra, Mithileysh Sathiyanarayanan, R. Vasu
There is a sudden exponential use of security systems in our day to day life. For example, security in a business space, organisation, or bank locker is important to every individual now. Lately, security cameras are being utilized in order to build safe and secure places in organisations. However, this technology needs a person regularly to detect any problem in the frame taken from the camera. The main aim of this paper is to enhance the traditional security system. The security system based on the IoT platform has the potential of interacting real-time with the device. The system consists of a camera, voice sensor/microphone, motion/activity sensor and an LTE/Wi-Fi module which is interfaced with the heart of the system, processor. This entire economic system using IoT in real-time will allow mobile devices and computers to remotely track the activities occurring at the location where the IoT device is placed and records all the activities, which will be saved on one’s cloud storage account. The IoT based security system helps in added protection of the user/customer property. Security systems are designed to perform certain tasks when a secured zone is breached. In this paper, notification is sent to the concerned person as an alert where the user can take necessary actions. The main advantage of this system is the ability to remotely manage one’s property 24/7. With this IoT based smart locker, one can monitor, get alerts, notify in case of emergency from anywhere in the world using mobile application via cloud connectivity 24/7. To be specific, we aim to design a light-weight, low cost, extensible, flexible wireless smart security system using IoT which employs the integration of various latest technologies. The combination of the various technologies can be used synergistically as a smart security to control a system in a house/organisation (lock or unlock a system with the help of SMS/app) from remote locations. The complete system is designed considering all types of door locks and lockers by providing a simple, effective ease of installation, to provide homes/organisations extreme security and our system will be a means for preventing, detecting and counter-measuring robbery or burglary.
{"title":"Smart Security System for Businesses using Internet of Things (IoT)","authors":"Santosh Mahendra, Mithileysh Sathiyanarayanan, R. Vasu","doi":"10.1109/ICGCIOT.2018.8753101","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753101","url":null,"abstract":"There is a sudden exponential use of security systems in our day to day life. For example, security in a business space, organisation, or bank locker is important to every individual now. Lately, security cameras are being utilized in order to build safe and secure places in organisations. However, this technology needs a person regularly to detect any problem in the frame taken from the camera. The main aim of this paper is to enhance the traditional security system. The security system based on the IoT platform has the potential of interacting real-time with the device. The system consists of a camera, voice sensor/microphone, motion/activity sensor and an LTE/Wi-Fi module which is interfaced with the heart of the system, processor. This entire economic system using IoT in real-time will allow mobile devices and computers to remotely track the activities occurring at the location where the IoT device is placed and records all the activities, which will be saved on one’s cloud storage account. The IoT based security system helps in added protection of the user/customer property. Security systems are designed to perform certain tasks when a secured zone is breached. In this paper, notification is sent to the concerned person as an alert where the user can take necessary actions. The main advantage of this system is the ability to remotely manage one’s property 24/7. With this IoT based smart locker, one can monitor, get alerts, notify in case of emergency from anywhere in the world using mobile application via cloud connectivity 24/7. To be specific, we aim to design a light-weight, low cost, extensible, flexible wireless smart security system using IoT which employs the integration of various latest technologies. The combination of the various technologies can be used synergistically as a smart security to control a system in a house/organisation (lock or unlock a system with the help of SMS/app) from remote locations. The complete system is designed considering all types of door locks and lockers by providing a simple, effective ease of installation, to provide homes/organisations extreme security and our system will be a means for preventing, detecting and counter-measuring robbery or burglary.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130949683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8752989
Tanuj Pawar, Parul Kalra, D. Mehrotra
Sentiment analysis basically consist of determining and categorizing opinions expressed on the basis of computational text. It helps us to determine user’s attitude towards a specific topic on the basis of positive, neutral and negative. Social media acts as one of the biggest platforms where people express their feelings on variety of issues by writing on websites, blogs, public forums or online groups. Sports nowadays have also become one of the major topics that people discuss on social media. People’s opinions are basically positive, neutral or negative, so only looking at each opinion and coming to a result is very difficult and time consuming. In this research paper, an overall process of feature based sentiment analysis is showcased and opinions of people are analyzed regarding cricket matches using RapidMiner.
{"title":"Analysis of Sentiments for Sports data using RapidMiner","authors":"Tanuj Pawar, Parul Kalra, D. Mehrotra","doi":"10.1109/ICGCIOT.2018.8752989","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752989","url":null,"abstract":"Sentiment analysis basically consist of determining and categorizing opinions expressed on the basis of computational text. It helps us to determine user’s attitude towards a specific topic on the basis of positive, neutral and negative. Social media acts as one of the biggest platforms where people express their feelings on variety of issues by writing on websites, blogs, public forums or online groups. Sports nowadays have also become one of the major topics that people discuss on social media. People’s opinions are basically positive, neutral or negative, so only looking at each opinion and coming to a result is very difficult and time consuming. In this research paper, an overall process of feature based sentiment analysis is showcased and opinions of people are analyzed regarding cricket matches using RapidMiner.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126804832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753006
Vrinda Gupta, N. Chandna, Jitendra Kumar Singh Jadon, Manisha Pant
Alzheimer’s disease is one of the major disease for which will still do not have complete cure. There are many people who are suffering Alzheimer’s and do not have any idea about dealing it in a better way. They are just helpless. This disease is commonly seen in elderly people. Here in this paper, study and survey has been provided about use of telecom applications for the cure of Alzheimer’s disease (AD). Going from very basics about the disease and it causes, introduction about the advance technologies of telecom industry for the treatment and betterment of patients suffering from the disease has been made. It also provides the knowledge about the use of applications in making of required devices and the need of transmission system for the patient to provide a better understanding of the subject. The motive is to provide some light on the connection between the medical system with telecom applications which can lead to new technologies in the field of medical science and help patients to get treated in a better way. We have also discusses about the treatment and curing methods for Alzheimer’s in which it can possibly cured or treated.
{"title":"Use Of Telecom Applications For The Cure Of Alzheimer’s Disease","authors":"Vrinda Gupta, N. Chandna, Jitendra Kumar Singh Jadon, Manisha Pant","doi":"10.1109/ICGCIOT.2018.8753006","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753006","url":null,"abstract":"Alzheimer’s disease is one of the major disease for which will still do not have complete cure. There are many people who are suffering Alzheimer’s and do not have any idea about dealing it in a better way. They are just helpless. This disease is commonly seen in elderly people. Here in this paper, study and survey has been provided about use of telecom applications for the cure of Alzheimer’s disease (AD). Going from very basics about the disease and it causes, introduction about the advance technologies of telecom industry for the treatment and betterment of patients suffering from the disease has been made. It also provides the knowledge about the use of applications in making of required devices and the need of transmission system for the patient to provide a better understanding of the subject. The motive is to provide some light on the connection between the medical system with telecom applications which can lead to new technologies in the field of medical science and help patients to get treated in a better way. We have also discusses about the treatment and curing methods for Alzheimer’s in which it can possibly cured or treated.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121369498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8752988
J. Dhamija, Kaumudi Rawat, T. Choudhury, Praveen Kumar
The algorithm proposed is to ensure safety and guarantee of clients information on the cloud. The conventional system of replication based dispersion hence will not be required anymore by using deletion revising code. As the client data increases in size or importance, data repetition is a method to be used to tackle situations like server crashes and more. Client has information and is highly depended on cloud for its retrieval. The current system is of a very high cost and not so efficient. Fuzzy keywords help in searching and providing more probable outcome as a result enhancing the searching efficiency and capability and lower data loss. Also to enhance the security of the data over the cloud, tiny and blowfish algorithms are used to encyrypt data file which are shared over the cloud. For this, an OTP will be generated and entered to access and decrypt the data on receiver end. Information stockpiling nowadays should become more predictable and basic because data is made accessible to client only when required in cases of distributed storage systems. Hence cloud comes into play as in our application we use cloud as the put away stage is now the cloud.
{"title":"Enhancing Data Retrieval Using Fuzzy Keywords and Data Security Using Feistal Encryption Algorithm","authors":"J. Dhamija, Kaumudi Rawat, T. Choudhury, Praveen Kumar","doi":"10.1109/ICGCIOT.2018.8752988","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752988","url":null,"abstract":"The algorithm proposed is to ensure safety and guarantee of clients information on the cloud. The conventional system of replication based dispersion hence will not be required anymore by using deletion revising code. As the client data increases in size or importance, data repetition is a method to be used to tackle situations like server crashes and more. Client has information and is highly depended on cloud for its retrieval. The current system is of a very high cost and not so efficient. Fuzzy keywords help in searching and providing more probable outcome as a result enhancing the searching efficiency and capability and lower data loss. Also to enhance the security of the data over the cloud, tiny and blowfish algorithms are used to encyrypt data file which are shared over the cloud. For this, an OTP will be generated and entered to access and decrypt the data on receiver end. Information stockpiling nowadays should become more predictable and basic because data is made accessible to client only when required in cases of distributed storage systems. Hence cloud comes into play as in our application we use cloud as the put away stage is now the cloud.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753027
P. M, R. V, Mohammed Riyaz Ahmed
The ability of a thing (in the Internet of Things) to identify itself wirelessly, using Radio Frequency waves makes them Ubiquitous. The ease of Tracking, Monitoring, Identifying and Data capturing can be owed to Radio Frequency IDentification (RFID) Systems. An RFID system consists of Reader and Tag, where they use antennas for transmitting an interrogation signal and identification data respectively. Here we propose a compact microstrip patch antenna for Ultra High Frequency (UHF) and Super High Frequency (SHF). The antenna is triband and operates at 926 MHz of UHF while at 2.48 GHz and 5.8 GHz in Microwave (another name for SHF) band. Beyond RFID applications the microwave band is defined to be used for WLAN applications by IEEE 802.11b and 802.11a standards. The performance analysis of the proposed antenna design shows that it well meets the requirements of the RFID mobile reader.
{"title":"Multiband Circularly Polarized Microstrip Reader Antenna for RFID Applications","authors":"P. M, R. V, Mohammed Riyaz Ahmed","doi":"10.1109/ICGCIOT.2018.8753027","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753027","url":null,"abstract":"The ability of a thing (in the Internet of Things) to identify itself wirelessly, using Radio Frequency waves makes them Ubiquitous. The ease of Tracking, Monitoring, Identifying and Data capturing can be owed to Radio Frequency IDentification (RFID) Systems. An RFID system consists of Reader and Tag, where they use antennas for transmitting an interrogation signal and identification data respectively. Here we propose a compact microstrip patch antenna for Ultra High Frequency (UHF) and Super High Frequency (SHF). The antenna is triband and operates at 926 MHz of UHF while at 2.48 GHz and 5.8 GHz in Microwave (another name for SHF) band. Beyond RFID applications the microwave band is defined to be used for WLAN applications by IEEE 802.11b and 802.11a standards. The performance analysis of the proposed antenna design shows that it well meets the requirements of the RFID mobile reader.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134091936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753068
K. Manoj, T. Sandeep, Dr. N Sudhakar Reddy, P. Alikhan
Ranking fraud on the mobile app market refers liable to mislead activities which have a purpose of bumping up the apps in popularity list. Because of this, app users have no facility to express their views. This is the same technique in ratings also. It ends up bringing increasing number of visits for application engineers to build the spreading of their application deals or application appraisals to submit the positioning extortion. It mainly provides a view of reviews to impact on the mobile apps or products and also detects the fake review list by the users. There are mainly three evidences to end up plainly mindful of the fraud in the mobile apps, i.e., positioning-based confirmations, rating-based confirmations, and finally review-based evidences. Compared to the remaining two evidences, review-based evidences are most helpful to the users who are trying to download new apps. Here, the main concern is the reviews of the authenticated users, that is, the users who already have an account in that field. And review-based evidences are very crucial. We precisely find the positioning extortion by mining dynamic periods in particular driving sessions for mobile apps and also discuss how the reviews are most useful for the new clients.
{"title":"Genuine ratings for mobile apps with the support of authenticated users’ reviews","authors":"K. Manoj, T. Sandeep, Dr. N Sudhakar Reddy, P. Alikhan","doi":"10.1109/ICGCIOT.2018.8753068","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753068","url":null,"abstract":"Ranking fraud on the mobile app market refers liable to mislead activities which have a purpose of bumping up the apps in popularity list. Because of this, app users have no facility to express their views. This is the same technique in ratings also. It ends up bringing increasing number of visits for application engineers to build the spreading of their application deals or application appraisals to submit the positioning extortion. It mainly provides a view of reviews to impact on the mobile apps or products and also detects the fake review list by the users. There are mainly three evidences to end up plainly mindful of the fraud in the mobile apps, i.e., positioning-based confirmations, rating-based confirmations, and finally review-based evidences. Compared to the remaining two evidences, review-based evidences are most helpful to the users who are trying to download new apps. Here, the main concern is the reviews of the authenticated users, that is, the users who already have an account in that field. And review-based evidences are very crucial. We precisely find the positioning extortion by mining dynamic periods in particular driving sessions for mobile apps and also discuss how the reviews are most useful for the new clients.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130312784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753062
S. P, A. A. Deshpande
Technology is advancing at a rapid rate with its presence in every field alongside with humans. In the field of Agriculture, farmers are able to detect diseases in their crops, plants and fruits by making use of various sensors available in the technological market. This paper surveys different diseases in Pomegranate plant and suggests sensors which can be used to detect those diseases.
{"title":"Pomegranate Diseases and Detection using Sensors: A Review","authors":"S. P, A. A. Deshpande","doi":"10.1109/ICGCIOT.2018.8753062","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753062","url":null,"abstract":"Technology is advancing at a rapid rate with its presence in every field alongside with humans. In the field of Agriculture, farmers are able to detect diseases in their crops, plants and fruits by making use of various sensors available in the technological market. This paper surveys different diseases in Pomegranate plant and suggests sensors which can be used to detect those diseases.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114423047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8752971
A. Sutagundar, Masuda Ettinamani, Ameenabegum H. Attar
In present area, going to supermarkets for shopping is increasing rapidly. In the Shopping mall, people get their daily essential products like consumer goods, clothes, and foodstuff. At the time of festivals and offers, there is a huge rush in the shopping mall. In shopping mall or supermarket, they are using barcode technique for billing the products. It takes lot of time and customer has to wait till all products get scanned to generate the bill. To avoid this situation, we proposed IoT based smart shopping mall. It consists of RFID tag, LCD display, android application, Wi-Fi and cloud. All products present in the shopping mall will be tagged with RFID. Customer’s required products will be put in the trolley, where its code will be detected using RFID and name of the product and cost will be displayed on the LCD. Data is pushed to the amazon cloud using Wi-Fi module ESP8266 and the data is sent to Android App of the Customers. Total billing is done by wireless modules. We are providing a searching option for the customers to know the availability and unavailability of products in the shopping mall.
{"title":"Iot Based Smart Shopping Mall","authors":"A. Sutagundar, Masuda Ettinamani, Ameenabegum H. Attar","doi":"10.1109/ICGCIOT.2018.8752971","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752971","url":null,"abstract":"In present area, going to supermarkets for shopping is increasing rapidly. In the Shopping mall, people get their daily essential products like consumer goods, clothes, and foodstuff. At the time of festivals and offers, there is a huge rush in the shopping mall. In shopping mall or supermarket, they are using barcode technique for billing the products. It takes lot of time and customer has to wait till all products get scanned to generate the bill. To avoid this situation, we proposed IoT based smart shopping mall. It consists of RFID tag, LCD display, android application, Wi-Fi and cloud. All products present in the shopping mall will be tagged with RFID. Customer’s required products will be put in the trolley, where its code will be detected using RFID and name of the product and cost will be displayed on the LCD. Data is pushed to the amazon cloud using Wi-Fi module ESP8266 and the data is sent to Android App of the Customers. Total billing is done by wireless modules. We are providing a searching option for the customers to know the availability and unavailability of products in the shopping mall.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114597202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753077
T. Choudhury, Gaurav Dangi, T. Singh, Abhinav Chauhan, Archit Aggarwal
Attempted use of combinations of machine learning techniques to detect credit card fraud is presented in this paper. Credit card fraud is increasing day by day every year on a large scale, which results in great loss to organizations, this paper proposes a model to predict whether the credit card presented is fraudulent or not determined by more than 150 attributes per visitor, which have been trained before hand with a dataset. As the data used for the purposes of this paper was highly imbalanced, different sampling techniques have been used to balance the training data. The experiment shows good performance along with accuracy in fraud detection.
{"title":"An Efficient Way to Detect Credit Card Fraud Using Machine Learning Methodologies","authors":"T. Choudhury, Gaurav Dangi, T. Singh, Abhinav Chauhan, Archit Aggarwal","doi":"10.1109/ICGCIOT.2018.8753077","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753077","url":null,"abstract":"Attempted use of combinations of machine learning techniques to detect credit card fraud is presented in this paper. Credit card fraud is increasing day by day every year on a large scale, which results in great loss to organizations, this paper proposes a model to predict whether the credit card presented is fraudulent or not determined by more than 150 attributes per visitor, which have been trained before hand with a dataset. As the data used for the purposes of this paper was highly imbalanced, different sampling techniques have been used to balance the training data. The experiment shows good performance along with accuracy in fraud detection.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126166293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}