Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933634
Heerendra Mahore, Ratish Agrawal, Roopam K. Gupta
Wireless Ad-hoc network is a dynamic network without any physical architecture in which each and every node participating in the network and may exit at any moment. Because of the nature of its simplicity and adaptability, a wireless network is widely employed in military communications, emergency communications, academic goals and mobile conferences. Due to the dynamic nature of the Adhoc network, it is prone to attacks. So, there are always security issues related to the wireless network because any node may enter into the network anytime or may leave anytime with authentication. So, there is always a chance that malicious node may enter into the network and hampers the communication system of the entire network. One among them is the black hole attack. The black hole affects the entire network with its malicious behaviour while checking out the communication path between source and destination. For connection, establishment RREQ message is transmitted from the source node and they will wait for RRRP. For each RREQ received, the black hole nodes send the source node fake RREP. The origin node responds to fake RREPs and sends their data by the path described in the fake RREP which ultimately may result in packet drop or alteration of the packets by black hole nodes. This research work designed a detection technique to avoid black hole attacks and improve network performance. In this work, an adaptive technique based on the AODV routing protocol is presented upon request. In this analysis, Some of the sender nodes are assigned a task of the agent that checks the incoming route reply message for the destination nodes and avoid malicious node in the network. The resulting analysis shows that packet delivery ratio had increased with detection technique as compared to without detection technique i.e. blackhole condition.
{"title":"Agent Based Black Hole Detection Technique in AODV Routing Protocol","authors":"Heerendra Mahore, Ratish Agrawal, Roopam K. Gupta","doi":"10.1109/ICACAT.2018.8933634","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933634","url":null,"abstract":"Wireless Ad-hoc network is a dynamic network without any physical architecture in which each and every node participating in the network and may exit at any moment. Because of the nature of its simplicity and adaptability, a wireless network is widely employed in military communications, emergency communications, academic goals and mobile conferences. Due to the dynamic nature of the Adhoc network, it is prone to attacks. So, there are always security issues related to the wireless network because any node may enter into the network anytime or may leave anytime with authentication. So, there is always a chance that malicious node may enter into the network and hampers the communication system of the entire network. One among them is the black hole attack. The black hole affects the entire network with its malicious behaviour while checking out the communication path between source and destination. For connection, establishment RREQ message is transmitted from the source node and they will wait for RRRP. For each RREQ received, the black hole nodes send the source node fake RREP. The origin node responds to fake RREPs and sends their data by the path described in the fake RREP which ultimately may result in packet drop or alteration of the packets by black hole nodes. This research work designed a detection technique to avoid black hole attacks and improve network performance. In this work, an adaptive technique based on the AODV routing protocol is presented upon request. In this analysis, Some of the sender nodes are assigned a task of the agent that checks the incoming route reply message for the destination nodes and avoid malicious node in the network. The resulting analysis shows that packet delivery ratio had increased with detection technique as compared to without detection technique i.e. blackhole condition.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"37 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77109895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There is a huge gap in the performance of the processor and the main memory. The speed of processor is much greater as compared to that of the main memory. The concept of paging has significantly increased the number of main memory accesses. In order to reduce the main memory access, a special hardware called the cache memory had been introduced. The cache memory bridges the performance gap between the main memory and the processor. This paper proposes a more efficient way to evaluate the weight factor thereby improving the results evaluated using CWRP [1]. The proposed work is easy to implement and provides better results compared to Least-Recently-Used (LRU), Clock with Adaptive Replacement (CAR) and First-In-First-Out (FIFO).
{"title":"Dynamic Weight Ranking algorithm using R-F score for Efficient Caching","authors":"Debabrata Swain, Shreerag Marar, Nikhil Motwani, Vivek Hiwarkar, Puran Singh","doi":"10.1109/ICACAT.2018.8933642","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933642","url":null,"abstract":"There is a huge gap in the performance of the processor and the main memory. The speed of processor is much greater as compared to that of the main memory. The concept of paging has significantly increased the number of main memory accesses. In order to reduce the main memory access, a special hardware called the cache memory had been introduced. The cache memory bridges the performance gap between the main memory and the processor. This paper proposes a more efficient way to evaluate the weight factor thereby improving the results evaluated using CWRP [1]. The proposed work is easy to implement and provides better results compared to Least-Recently-Used (LRU), Clock with Adaptive Replacement (CAR) and First-In-First-Out (FIFO).","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"113 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73643980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933580
Akagra Jain, Kushagra Shah, P. Chaturvedi, Anuj Tambe
Educational Data Research lays emphasis on analysis, prediction and generating accurate result. Every educational institute around the globe maintains the denouement repository. These repositories can be lay bared through data mining. In this paper multilayer perceptron and decision tree are set by side to predict the student grades from the repositories in which MLP (Multilayer Perceptron) gave finer and meticulous results compared to decision tree and there after the grades are processed using Random forest to predict the topic of their weak portion and help them to improve their future grades. This model will be helpful for teacher, student and their parents to know in advance about student predicted grade and will enable them to take preventive measure.
{"title":"Prediction and Analysis of Student Performance using Hybrid Model of Multilayer Perceptron and Random Forest","authors":"Akagra Jain, Kushagra Shah, P. Chaturvedi, Anuj Tambe","doi":"10.1109/ICACAT.2018.8933580","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933580","url":null,"abstract":"Educational Data Research lays emphasis on analysis, prediction and generating accurate result. Every educational institute around the globe maintains the denouement repository. These repositories can be lay bared through data mining. In this paper multilayer perceptron and decision tree are set by side to predict the student grades from the repositories in which MLP (Multilayer Perceptron) gave finer and meticulous results compared to decision tree and there after the grades are processed using Random forest to predict the topic of their weak portion and help them to improve their future grades. This model will be helpful for teacher, student and their parents to know in advance about student predicted grade and will enable them to take preventive measure.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"94 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77617831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933737
Shaili Jain, Shashilata Rawat, P. Chaturvedi, Monika Kapoor
Reversible computing spans computational models that are both forward and backward deterministic. These models have applications in program inversion and bidirectional computing, and are also interesting as a study of theoretical properties. A reversible computation does, thus, not have to use energy, though this is impossible to avoid in practice, due to the way computers are build. It is, however, not always obvious how to implement reversible computing systems. The restriction to avoid information loss imposes new design criteria that need to be incorporated into the design; criteria that do not follow directly from conventional models.In this paper, research junk free reversible focal handling unit registering frameworks to physical door level usage. Math tasks are a reason for some registering frameworks, so a proposed the outline of snake, sub tractor, multiplexer, encoder and work towards a reversible circuit for general circuit are essential new circuits. In all plan actualized Xilinx programming and mimicked VHDL content sea.
{"title":"VLSI Architecture for Low Cost and Power Reversible Arithmetic Logic Unit based on Reversible Gate","authors":"Shaili Jain, Shashilata Rawat, P. Chaturvedi, Monika Kapoor","doi":"10.1109/ICACAT.2018.8933737","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933737","url":null,"abstract":"Reversible computing spans computational models that are both forward and backward deterministic. These models have applications in program inversion and bidirectional computing, and are also interesting as a study of theoretical properties. A reversible computation does, thus, not have to use energy, though this is impossible to avoid in practice, due to the way computers are build. It is, however, not always obvious how to implement reversible computing systems. The restriction to avoid information loss imposes new design criteria that need to be incorporated into the design; criteria that do not follow directly from conventional models.In this paper, research junk free reversible focal handling unit registering frameworks to physical door level usage. Math tasks are a reason for some registering frameworks, so a proposed the outline of snake, sub tractor, multiplexer, encoder and work towards a reversible circuit for general circuit are essential new circuits. In all plan actualized Xilinx programming and mimicked VHDL content sea.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"158 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73777426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933686
Dr. Akhilesh A. Waoo, S. Sharma
Wireless sensor networks are one of the attractive and emerging research domains, with tremendous applications in various aspects like health care monitoring, area monitoring, environmental/ earth real time sensing and monitoring of industries, etc. A WSN are capable of sensing and detecting different minute changes in events by means miniature sensor nodes dispersed over that network area. Each sensor node has the sensor for detection, controller, storage memory, A/D converter, battery and transceiver. Sensing, processing and communication are three main operation of a sensor node. Here, it is an important to collect data periodically from an area of interest, in case of time-sensitive applications. Then this sensed data must be collected and transmitted to a base station and the base station further process the data to meet the end-user queries. As the sensors of sensor nodes are operated on battery which is having a limited power, it is a huge challenge to design an energy efficient routing protocol for minimization of energy consumption and offering a long network lifetime with high-energy efficiency. Present work concerned with comparing the homogenous and heterogeneous systems for energy efficiency and long span of network lifetime.
{"title":"Analysis of Energy Efficient Coverage and Prolonging Lifetime by Comparing Homogenous and Heterogeneous Wireless Sensor Networks","authors":"Dr. Akhilesh A. Waoo, S. Sharma","doi":"10.1109/ICACAT.2018.8933686","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933686","url":null,"abstract":"Wireless sensor networks are one of the attractive and emerging research domains, with tremendous applications in various aspects like health care monitoring, area monitoring, environmental/ earth real time sensing and monitoring of industries, etc. A WSN are capable of sensing and detecting different minute changes in events by means miniature sensor nodes dispersed over that network area. Each sensor node has the sensor for detection, controller, storage memory, A/D converter, battery and transceiver. Sensing, processing and communication are three main operation of a sensor node. Here, it is an important to collect data periodically from an area of interest, in case of time-sensitive applications. Then this sensed data must be collected and transmitted to a base station and the base station further process the data to meet the end-user queries. As the sensors of sensor nodes are operated on battery which is having a limited power, it is a huge challenge to design an energy efficient routing protocol for minimization of energy consumption and offering a long network lifetime with high-energy efficiency. Present work concerned with comparing the homogenous and heterogeneous systems for energy efficiency and long span of network lifetime.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"24 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86833075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933586
Ankit Shukla, Dhanpratap Singh
Sentiment is the way of representing our self in front of other so that other can respond accordingly or oppose it. The process of defining the emotion or opinion of a part of data is called sentiment analysis. The main reason for sentiment analysis is to categorize an author’s attitude toward numerous subjects into positive, terrible or impartial classes. However not limited to, commercial enterprise intelligence, politics, sociology, etc..Predictive analysis is required to predict the future for the validity of content on social network. The sentiments of the people can be collected from social networking websites, micro blogs, wikis and web packages etc.. In the proposed work predictive analysis techniques are investigated and compared on the ground of performance. It is observed that most of the high performing techniques are based on neural network machine learning algorithm.
{"title":"Classification of Sentiments Using Predictive Analysis Over Social Network: A Review","authors":"Ankit Shukla, Dhanpratap Singh","doi":"10.1109/ICACAT.2018.8933586","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933586","url":null,"abstract":"Sentiment is the way of representing our self in front of other so that other can respond accordingly or oppose it. The process of defining the emotion or opinion of a part of data is called sentiment analysis. The main reason for sentiment analysis is to categorize an author’s attitude toward numerous subjects into positive, terrible or impartial classes. However not limited to, commercial enterprise intelligence, politics, sociology, etc..Predictive analysis is required to predict the future for the validity of content on social network. The sentiments of the people can be collected from social networking websites, micro blogs, wikis and web packages etc.. In the proposed work predictive analysis techniques are investigated and compared on the ground of performance. It is observed that most of the high performing techniques are based on neural network machine learning algorithm.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"47 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75883960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933615
P. Shrivastava, S. Agrawal
The IoT is a wide network of devices, both domestic and industrial, connected via the web and connected to one another. This paper proposed an idea of unique identification through UID sensor. Communication in IoT can perform various tasks such as identification, controlling, verification and computation etc. communication is usually performed by using WIFI or Bluetooth. UID sensor deals with collecting the information from server and then sent this information to the datacenter. This scheme protects the welfare system from the fake voting. UID will reduce the duplication and provide authenticated scheme during election. People can poll using the AADHAR card. AADHAR card is a digital identity having 12 -16 digit. Unique ID number is given to the every citizen of INDIA which would help in fair polling system. Aadhaar Authentication is the authentication of demographic or biometric information of any person. In this authentication process of welfare system the Central Identities Data Repository (CIDR) receives the demographic or biometric information along with their Aadhaar number.
{"title":"Unique Identification In Elections through Internet Of Things","authors":"P. Shrivastava, S. Agrawal","doi":"10.1109/ICACAT.2018.8933615","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933615","url":null,"abstract":"The IoT is a wide network of devices, both domestic and industrial, connected via the web and connected to one another. This paper proposed an idea of unique identification through UID sensor. Communication in IoT can perform various tasks such as identification, controlling, verification and computation etc. communication is usually performed by using WIFI or Bluetooth. UID sensor deals with collecting the information from server and then sent this information to the datacenter. This scheme protects the welfare system from the fake voting. UID will reduce the duplication and provide authenticated scheme during election. People can poll using the AADHAR card. AADHAR card is a digital identity having 12 -16 digit. Unique ID number is given to the every citizen of INDIA which would help in fair polling system. Aadhaar Authentication is the authentication of demographic or biometric information of any person. In this authentication process of welfare system the Central Identities Data Repository (CIDR) receives the demographic or biometric information along with their Aadhaar number.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83083886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933633
M. Shrivastava, R. Agrawal, Pratibhadevi Tapashetti
In the proposed research work, frequency reconfigurable microstrip patch antenna concept (also called tunable antennas) has been presented. Microstrip patch antennas have been used as these are proved to be suitable structures for various types of reconfigurable antennas. These can be equipped with switches. Upon toggling the switch between on and off states, the antenna can be reconfigured. A square shaped reconfigurable microstrip slot antenna operating in the frequency range of 2.5 to 7 GHz is proposed. It is having one port, excited with microstrip line feed mechanism. A single layer patch antenna with substrate dielectric constant 4.4 (Epoxi glass) and height 1.7 mm is designed with two parallel slots controlled via mems. By making the two switches ON or OFF simultaneously, the resonant frequency is shown altering. The performance parameters of antenna i.e. reflection coefficient, gain etc. are determined. Reconfigurable antennas have been simulated through CST software and fabricated in the microwave laboratory. Developed prototype is measured experimentally in order to validate the reconfigurability basis.
{"title":"Design and Development of Reconfigurable Antenna Using MEMSM","authors":"M. Shrivastava, R. Agrawal, Pratibhadevi Tapashetti","doi":"10.1109/ICACAT.2018.8933633","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933633","url":null,"abstract":"In the proposed research work, frequency reconfigurable microstrip patch antenna concept (also called tunable antennas) has been presented. Microstrip patch antennas have been used as these are proved to be suitable structures for various types of reconfigurable antennas. These can be equipped with switches. Upon toggling the switch between on and off states, the antenna can be reconfigured. A square shaped reconfigurable microstrip slot antenna operating in the frequency range of 2.5 to 7 GHz is proposed. It is having one port, excited with microstrip line feed mechanism. A single layer patch antenna with substrate dielectric constant 4.4 (Epoxi glass) and height 1.7 mm is designed with two parallel slots controlled via mems. By making the two switches ON or OFF simultaneously, the resonant frequency is shown altering. The performance parameters of antenna i.e. reflection coefficient, gain etc. are determined. Reconfigurable antennas have been simulated through CST software and fabricated in the microwave laboratory. Developed prototype is measured experimentally in order to validate the reconfigurability basis.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"40 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78527509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933577
Vikram Awate, A. K. Shrivastava, R. Tiwari, V. Dubey, A. K. Beliya, V. Singh, Neha Dubey
In this manuscript we report synthesis of phosphor which is activated by Dysprosium ion and its luminescence properties are studied. Herein synthesized phosphor are characterized by photoluminescence studies and its CCT and CRI values are calculated and it is found near to white light so the synthesized phosphor will be useful for white light emission in several display device.
{"title":"White Light Emission from Dy (III) activated Sr2 SiO4 phosphor","authors":"Vikram Awate, A. K. Shrivastava, R. Tiwari, V. Dubey, A. K. Beliya, V. Singh, Neha Dubey","doi":"10.1109/ICACAT.2018.8933577","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933577","url":null,"abstract":"In this manuscript we report synthesis of phosphor which is activated by Dysprosium ion and its luminescence properties are studied. Herein synthesized phosphor are characterized by photoluminescence studies and its CCT and CRI values are calculated and it is found near to white light so the synthesized phosphor will be useful for white light emission in several display device.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"74 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75916219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICACAT.2018.8933604
Ankita Mittal, A. Shrivastava, A. Saxena, M. Manoria
The emerging complexity of banking and its dynamic environment, risk assessment has become very important, particularly in the financial sector. As a result, there is a high level of competition between financial institutions, resulting in the loss of most loans. In order to improve credit quality and reduce credit risk, banks and researchers have developed credit scoring models to improve the credit assessment process during the credit assessment process. It is quite difficult for anyone for assess credibility of customer due to the complexity of the database. In order to tackle such issues, there is need for a framework which can decides the risk assessment by combining some characteristics. In this paper a brief study of risk assessment models using machine learning approach is discussed as well as proposed architecture is designed with an aim to significantly reduce the dimensionality of the data as well as to increase the accuracy of the classifications compared to other existing methods.
{"title":"A Study on Credit Risk Assessment in Banking Sector using Data Mining Techniques","authors":"Ankita Mittal, A. Shrivastava, A. Saxena, M. Manoria","doi":"10.1109/ICACAT.2018.8933604","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933604","url":null,"abstract":"The emerging complexity of banking and its dynamic environment, risk assessment has become very important, particularly in the financial sector. As a result, there is a high level of competition between financial institutions, resulting in the loss of most loans. In order to improve credit quality and reduce credit risk, banks and researchers have developed credit scoring models to improve the credit assessment process during the credit assessment process. It is quite difficult for anyone for assess credibility of customer due to the complexity of the database. In order to tackle such issues, there is need for a framework which can decides the risk assessment by combining some characteristics. In this paper a brief study of risk assessment models using machine learning approach is discussed as well as proposed architecture is designed with an aim to significantly reduce the dimensionality of the data as well as to increase the accuracy of the classifications compared to other existing methods.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"75 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84006120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}