Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673153
Rishi Gupta, Akash Verma, Hari Om Topal
In today’s world where there has been a significant change that have occurred over the past few decades in the general lifestyle of people many technological advancements have taken place which has uplifted the living standards of people significantly. As a result of these changes many new businesses and entrepreneurs are emerging on a rapid basis and there is cut-throat competition between the businesses competing in the same domain to retain their old customers and add new customers so that the respective businesses could grow and prosper. To do so the organizations must provide extremely good services to the customer regardless the business operates on small scale or large scale. Also, the ability of a business to interpret what their customer’s needs, and desires are will not only help them amass a much higher customer support but would also help them formulate customer service plans which would be formed based on customer’s requirements thus boosting the organizations respective business. To attain such knowledge and understanding the approach of customer services in a structured manner could be adopted. All the customers who will be in the same segment will be having similar market features. The emergence of many machine learning techniques has promoted the usage of customer segmentation techniques which are automated in nature which work in the favour of traditional analytics of the market which often fail to work efficiently when the customer base is significantly larger. In this paper, the K-Means Clustering algorithm has been implemented to serve the purpose.
{"title":"Customer Segmentation of Indian restaurants on the basis of geographical locations using Machine Learning","authors":"Rishi Gupta, Akash Verma, Hari Om Topal","doi":"10.1109/ICTAI53825.2021.9673153","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673153","url":null,"abstract":"In today’s world where there has been a significant change that have occurred over the past few decades in the general lifestyle of people many technological advancements have taken place which has uplifted the living standards of people significantly. As a result of these changes many new businesses and entrepreneurs are emerging on a rapid basis and there is cut-throat competition between the businesses competing in the same domain to retain their old customers and add new customers so that the respective businesses could grow and prosper. To do so the organizations must provide extremely good services to the customer regardless the business operates on small scale or large scale. Also, the ability of a business to interpret what their customer’s needs, and desires are will not only help them amass a much higher customer support but would also help them formulate customer service plans which would be formed based on customer’s requirements thus boosting the organizations respective business. To attain such knowledge and understanding the approach of customer services in a structured manner could be adopted. All the customers who will be in the same segment will be having similar market features. The emergence of many machine learning techniques has promoted the usage of customer segmentation techniques which are automated in nature which work in the favour of traditional analytics of the market which often fail to work efficiently when the customer base is significantly larger. In this paper, the K-Means Clustering algorithm has been implemented to serve the purpose.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"298 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121150398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cyber security competitions are gaining much attention as an outstanding method of computer security education. It is important to find out better and new ways to get involved students and freshers in computer security development challenges. This task collected and analyzed the solutions to 3600 issues captured through CTF from around 150 competitions were performed and hosted in last 2 years. This activity has identified safety issues highly relevant to the industry and academics. It is listed as safety tools and techniques used so much for the players. Here we have described a bunch of exercises as a toolkit for new comers and freshers to try it out in the system security threats identification and resolution.
{"title":"An Implementation of Capture the Flag (CTF) Tool","authors":"Mohammad Nadeem Uddin, Sparsh Mishra, Ankur Das, Tanmay Rastogi, Anshul Verma, Piya Kothari","doi":"10.1109/ICTAI53825.2021.9673160","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673160","url":null,"abstract":"Cyber security competitions are gaining much attention as an outstanding method of computer security education. It is important to find out better and new ways to get involved students and freshers in computer security development challenges. This task collected and analyzed the solutions to 3600 issues captured through CTF from around 150 competitions were performed and hosted in last 2 years. This activity has identified safety issues highly relevant to the industry and academics. It is listed as safety tools and techniques used so much for the players. Here we have described a bunch of exercises as a toolkit for new comers and freshers to try it out in the system security threats identification and resolution.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122600959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673198
Rashmi, Garima Bhardwaj
Digitisation is the use of digital technologies and advancements in order to achieve new revenue and value-generating prospects by creating advanced technology based business model. In the last decade most of the enterprises have undergo into radical changes and transformation to alter their functions, processes, and operations. The bancassurance is not an exception. Under it, digitisation must be used to counter the changing needs of the customers. Due to worldwide pandemic and lockdowns, most of the people evolve themselves to use technology in day to day work. Therefore, it is a wide open window for banks and insurers to take that opportunity and form a digital model with the use of technological advancements and innovations. The present paper discuss about the digitisation in the field of bancassurance. The study is qualitative in nature and based on secondary source of data. Banks must constantly upgrade and develop new innovative customised packages and services in order to remain competitive. Bancassurance success is heavily reliant on banks maintaining excellent customer relationships with the help of technological advancement. The use of technological innovations and advancements is the core for digitisation which going to make digital bancassurance model a huge success.
{"title":"Analysis of Digitization, IOT and Block chain in Bancassurance","authors":"Rashmi, Garima Bhardwaj","doi":"10.1109/ICTAI53825.2021.9673198","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673198","url":null,"abstract":"Digitisation is the use of digital technologies and advancements in order to achieve new revenue and value-generating prospects by creating advanced technology based business model. In the last decade most of the enterprises have undergo into radical changes and transformation to alter their functions, processes, and operations. The bancassurance is not an exception. Under it, digitisation must be used to counter the changing needs of the customers. Due to worldwide pandemic and lockdowns, most of the people evolve themselves to use technology in day to day work. Therefore, it is a wide open window for banks and insurers to take that opportunity and form a digital model with the use of technological advancements and innovations. The present paper discuss about the digitisation in the field of bancassurance. The study is qualitative in nature and based on secondary source of data. Banks must constantly upgrade and develop new innovative customised packages and services in order to remain competitive. Bancassurance success is heavily reliant on banks maintaining excellent customer relationships with the help of technological advancement. The use of technological innovations and advancements is the core for digitisation which going to make digital bancassurance model a huge success.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131757944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673251
Roshnee Matlani, Roshan Dadlani, Sharv Dumbre, Shruti Mishra, A. Tewari
Gesture-controlled laptops and computers have recently gained a lot of traction. Leap motion is the name for this technique. Waving our hand in front of our computer/laptop allows us to manage certain of its functionalities. Over slides and overheads, computer-based presentations have significant advantages. Audio, video, and even interactive programmes can be used to improve presentations. Unfortunately, employing these techniques is more complicated than using slides or overheads. The speaker must operate various devices with unfamiliar controls (e.g., keyboard, mouse, VCR remote control). In the dark, these devices are difficult to see, and manipulating them causes the presentation to be disrupted. Hand gestures are the most natural and effortless manner of communicating. The camera’s output will be displayed on the monitor. The concept is to use a simple camera instead of a classic or standard mouse to control mouse cursor functions. The Virtual Mouse provides an infrastructure between the user and the system using only a camera. It allows users to interface with machines without the use of mechanical or physical devices, and even control mouse functionalities. This study presents a method for controlling the cursor’s position without the need of any electronic equipment. While actions such as clicking and dragging things will be carried out using various hand gestures. As an input device, the suggested system will just require a webcam. The suggested system will require the use of OpenCV and Python as well as other tools. The camera’s output will be presented on the system’s screen so that the user can further calibrate it.
{"title":"Virtual Mouse using Hand Gestures","authors":"Roshnee Matlani, Roshan Dadlani, Sharv Dumbre, Shruti Mishra, A. Tewari","doi":"10.1109/ICTAI53825.2021.9673251","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673251","url":null,"abstract":"Gesture-controlled laptops and computers have recently gained a lot of traction. Leap motion is the name for this technique. Waving our hand in front of our computer/laptop allows us to manage certain of its functionalities. Over slides and overheads, computer-based presentations have significant advantages. Audio, video, and even interactive programmes can be used to improve presentations. Unfortunately, employing these techniques is more complicated than using slides or overheads. The speaker must operate various devices with unfamiliar controls (e.g., keyboard, mouse, VCR remote control). In the dark, these devices are difficult to see, and manipulating them causes the presentation to be disrupted. Hand gestures are the most natural and effortless manner of communicating. The camera’s output will be displayed on the monitor. The concept is to use a simple camera instead of a classic or standard mouse to control mouse cursor functions. The Virtual Mouse provides an infrastructure between the user and the system using only a camera. It allows users to interface with machines without the use of mechanical or physical devices, and even control mouse functionalities. This study presents a method for controlling the cursor’s position without the need of any electronic equipment. While actions such as clicking and dragging things will be carried out using various hand gestures. As an input device, the suggested system will just require a webcam. The suggested system will require the use of OpenCV and Python as well as other tools. The camera’s output will be presented on the system’s screen so that the user can further calibrate it.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123274425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673252
P. Narang, Upasana Sharma
In recent years, there is an explosive growth of fake news on social media platform. Purpose behind spreading fake news is to create deception. This dissemination of fake news is becoming increasingly dangerous. This paper presents a comprehensive survey of fake news detection methods along with the identification of available data sets. We discuss the various artificial intelligence methods along with their comparative study. Finally, this review identifies the research challenges and potential directions for detection of fake news over social media.
{"title":"A Study on Artificial Intelligence Techniques for Fake News Detection","authors":"P. Narang, Upasana Sharma","doi":"10.1109/ICTAI53825.2021.9673252","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673252","url":null,"abstract":"In recent years, there is an explosive growth of fake news on social media platform. Purpose behind spreading fake news is to create deception. This dissemination of fake news is becoming increasingly dangerous. This paper presents a comprehensive survey of fake news detection methods along with the identification of available data sets. We discuss the various artificial intelligence methods along with their comparative study. Finally, this review identifies the research challenges and potential directions for detection of fake news over social media.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"758 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123278305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673483
P. Singh, Vinod Chaudhary, Sheetu Jain, Gannavarapu Ananth Kumar
Lung cancer becoming one of dangerous disease that occur in human life due to unmanageable growth of cells in lungs and it will cause the serious breathing problems occurs. The medical industries are providing high-tech facilities and efficient medical treatment for procure lung cancer diseases, so, it will control the lung cancer disease up to good extent and focus to take early precaution also including symptoms for better diagnosis. In today’s Artificial Intelligence and Machine Learning algorithms has great influence in medical sectors at the early prediction of the diseases and other measures with accurate outcomes along with data analysis. During this research, we apply various classification algorithms of machine learning to classify the lung cancer disease along with lung cancer dataset. Above classifiers are created and data is prepossessed in rapid-miner tool, and it has transformed into binary form to detect accuracy and performance of lung cancer disease.
{"title":"Compare and Contrast of Machine Learning Classification Algorithms to Predict Accuracy and Performance of Lung Cancer Disease","authors":"P. Singh, Vinod Chaudhary, Sheetu Jain, Gannavarapu Ananth Kumar","doi":"10.1109/ICTAI53825.2021.9673483","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673483","url":null,"abstract":"Lung cancer becoming one of dangerous disease that occur in human life due to unmanageable growth of cells in lungs and it will cause the serious breathing problems occurs. The medical industries are providing high-tech facilities and efficient medical treatment for procure lung cancer diseases, so, it will control the lung cancer disease up to good extent and focus to take early precaution also including symptoms for better diagnosis. In today’s Artificial Intelligence and Machine Learning algorithms has great influence in medical sectors at the early prediction of the diseases and other measures with accurate outcomes along with data analysis. During this research, we apply various classification algorithms of machine learning to classify the lung cancer disease along with lung cancer dataset. Above classifiers are created and data is prepossessed in rapid-miner tool, and it has transformed into binary form to detect accuracy and performance of lung cancer disease.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115850492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673460
Ritin Behl, Sachi Pandey, A. Sinha
Cloud technology is advancing rapidly because of it’s capability to replace the traditional computing techniques. Cloud offers various kinds of services for the user that are being used. In this research paper, storage as a service provided by cloud is examined as the data of the owner is being shared to the cloud so we have to ensure that data integrity is being maintained. In order to have a robust mechanism that offers a secure pathway for sharing data different encryption algorithms have been utilized. We investigate all the suitable algorithms with various combinations because any single algorithm is prone to some kind of attack. Testing of these algorithms is done by analyzing the parameters such as time required for execution, use of computational resources, key management, etc. Finally the best one that stands and fulfill all the criteria in a reasonable manner is selected for the purpose of storage.
{"title":"An Hybrid Approach to Insure Data Integrity on Outsourced Data using Symmetric Key Cryptography","authors":"Ritin Behl, Sachi Pandey, A. Sinha","doi":"10.1109/ICTAI53825.2021.9673460","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673460","url":null,"abstract":"Cloud technology is advancing rapidly because of it’s capability to replace the traditional computing techniques. Cloud offers various kinds of services for the user that are being used. In this research paper, storage as a service provided by cloud is examined as the data of the owner is being shared to the cloud so we have to ensure that data integrity is being maintained. In order to have a robust mechanism that offers a secure pathway for sharing data different encryption algorithms have been utilized. We investigate all the suitable algorithms with various combinations because any single algorithm is prone to some kind of attack. Testing of these algorithms is done by analyzing the parameters such as time required for execution, use of computational resources, key management, etc. Finally the best one that stands and fulfill all the criteria in a reasonable manner is selected for the purpose of storage.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115401700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673389
Mohit Kumar
The governance of most of the country depends on the election system. Almost all countries follow the voting system in the election process and based on which government has decided. In the past, voting was done manually or through ballot boxes, and many countries still followed this pattern. But nowadays, the E-voting system has come into existence, and they are considered to be fast as they generate results quickly. The major drawback of an E-voting system is the security features, and to overcome this situation and many approaches are developed to enhance the security features. In this paper, the Blockchain approach will be implemented to improve the security features of the Electronic-voting system using the concept of proof of work. Flask framework is used for the analysis purpose, and the evaluation parameter used for the validation of the models is security analysis and legal issues. Blockchain consumes so much power during the computation, so the paper has also discussed about the computing cost.
{"title":"Securing the E-voting system through blockchain using the concept of proof of work","authors":"Mohit Kumar","doi":"10.1109/ICTAI53825.2021.9673389","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673389","url":null,"abstract":"The governance of most of the country depends on the election system. Almost all countries follow the voting system in the election process and based on which government has decided. In the past, voting was done manually or through ballot boxes, and many countries still followed this pattern. But nowadays, the E-voting system has come into existence, and they are considered to be fast as they generate results quickly. The major drawback of an E-voting system is the security features, and to overcome this situation and many approaches are developed to enhance the security features. In this paper, the Blockchain approach will be implemented to improve the security features of the Electronic-voting system using the concept of proof of work. Flask framework is used for the analysis purpose, and the evaluation parameter used for the validation of the models is security analysis and legal issues. Blockchain consumes so much power during the computation, so the paper has also discussed about the computing cost.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122571619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673348
Shruti, Monika Singh
The Internet of Things (IoT) is a trendy topic having social, economic, and technological consequences. It’s built using a protocol that makes it easier to engage and communicate with one another and with users. Healthcare is an important part of the Internet of Things because it reduces obstacles that patients and clinicians experience. By boosting the usefulness of a patient’s important information, the suggested solution delivers a new healthcare system that is scalable and flexible. The suggested solution gathers essential data from existing hospital-grade equipment in a portable container that can wirelessly communicate with database, which can then be monitored on any mobile or internet-connected device. To keep the kit modest, an Arduino is utilized, and the data is collected and processed by a Raspberry Pi before being stored in a Firebase database. An android application has been developed to display the result of patient. In this research, we provide a new and intelligent healthcare system based on modern technologies like the Internet of Things (IoT). This technology is smart enough to sense and process a patient’s data using a medical decision support system. This device offers a low-cost solution for people who live in remote areas; they can use it to detect if they have a serious health problem and seek treatment from nearby hospitals.
{"title":"Intelligent HealthCare System using Raspberry Pi","authors":"Shruti, Monika Singh","doi":"10.1109/ICTAI53825.2021.9673348","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673348","url":null,"abstract":"The Internet of Things (IoT) is a trendy topic having social, economic, and technological consequences. It’s built using a protocol that makes it easier to engage and communicate with one another and with users. Healthcare is an important part of the Internet of Things because it reduces obstacles that patients and clinicians experience. By boosting the usefulness of a patient’s important information, the suggested solution delivers a new healthcare system that is scalable and flexible. The suggested solution gathers essential data from existing hospital-grade equipment in a portable container that can wirelessly communicate with database, which can then be monitored on any mobile or internet-connected device. To keep the kit modest, an Arduino is utilized, and the data is collected and processed by a Raspberry Pi before being stored in a Firebase database. An android application has been developed to display the result of patient. In this research, we provide a new and intelligent healthcare system based on modern technologies like the Internet of Things (IoT). This technology is smart enough to sense and process a patient’s data using a medical decision support system. This device offers a low-cost solution for people who live in remote areas; they can use it to detect if they have a serious health problem and seek treatment from nearby hospitals.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124952786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.1109/ICTAI53825.2021.9673381
Prabhat Singh, V. Chauhan, Shivam Singh, Priya Agarwal, Shrey Agrawal
Master Card organizations can recognize fake transaction so clients do not pay for things that they didn’t buy. Such issues may be handled with Machine Learning. This undertaking means to outline the demonstration of an informational collection utilizing AI with Credit Card Fraud Detection. This Fraud Detection issue incorporates displaying previous credit card transaction with information of the ones that ended up being extortion. Our model is then used to check if other purchase/order is fraudulent. The aim is, to distinguish maximum of deceitful transactions and limiting the erroneous misrepresentation arrangements. In this cycle, we have zeroed in on dissecting and pre-handling informational collections just as the sending of numerous inconsistency location calculations, for example, SVM, logistic regression, KNN and random forest calculation on the PCA changed Credit Card transaction information.
{"title":"Model for Credit Card Fraud Detection using Machine Learning Algorithm","authors":"Prabhat Singh, V. Chauhan, Shivam Singh, Priya Agarwal, Shrey Agrawal","doi":"10.1109/ICTAI53825.2021.9673381","DOIUrl":"https://doi.org/10.1109/ICTAI53825.2021.9673381","url":null,"abstract":"Master Card organizations can recognize fake transaction so clients do not pay for things that they didn’t buy. Such issues may be handled with Machine Learning. This undertaking means to outline the demonstration of an informational collection utilizing AI with Credit Card Fraud Detection. This Fraud Detection issue incorporates displaying previous credit card transaction with information of the ones that ended up being extortion. Our model is then used to check if other purchase/order is fraudulent. The aim is, to distinguish maximum of deceitful transactions and limiting the erroneous misrepresentation arrangements. In this cycle, we have zeroed in on dissecting and pre-handling informational collections just as the sending of numerous inconsistency location calculations, for example, SVM, logistic regression, KNN and random forest calculation on the PCA changed Credit Card transaction information.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129464319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}