Analysis of Various Credit Card Fraud Detection Techniques
Review Paper | Journal Paper
Vol.7 , Issue.6 , pp.1212-1216, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.12121216
Abstract
Bank Credit card frauds are on the increase and are becoming smarter with the passage of your time. Usually, the deceitful transactions are conducted by stealing the master card. Once the loss of the cardboard isn’t detected by the cardholder, a large loss are often round-faced by the MasterCard company. A really very little quantity of knowledge is needed by the wrongdoer for conducting any deceitful group action in on-line transactions. For getting product and services on-line, the net or phone phone. Devices are used. In some cases, the pattern during which transactions are done by the user is that the solely approach through which it’s doable to grasp that the cardboard is purloined. A fraud detection methodology must be applied to scale back the speed of triple-crown mastercard frauds. This analysis work relies on the prediction of deceitful mastercard transactions. During this paper, varied techniques for the mastercard fraud detection are reviewed in terms of sure parameters.
Key-Words / Index Term
MasterCard, machine learning, classification
References
[1] S.B.E. and Portia, A.A., Raj, "Analysis on credit card fraud detection methods," International Conference on Computer, Communication and Electrical Technology (ICCCET), pp. 152-156,2015.
[2] Rajni, Bhupesh Gour, and Surendra Dubey Jain, "A hybrid approach for credit card fraud detection using rough set and decision tree technique," International Journal of Computer Applications, vol. 139, no. 10, pp. 1-6,2016.
[3] Agrawal A.N Dermala N., "Credit card fraud detection using SVM and Reduction of false alarms," International Journal of Innovations in Engineering and Technology (IJIET), vol. 7, no. 2, pp. 176-182,2016.
[4] Phua C., Lee V., Smith, Gayler K.R., “A comprehensive survey of data mining-based fraud detection research”, arXiv preprint arXiv:1009.6119,2010.
[5] Stojanovic A., Aouada D., Ottersten B Bahnsen A.C., "Cost-sensitive credit card fraud detection using Bayes minimum risk," in 12th International Conference on Machine Learning and Applications (ICMLA), pp. 333-338, 2013.
[6] Carneiro E.M., Dias L.A.V., Da Cunha A.M., Mialaret L.F.S., “Cluster analysis and artificial neural networks: A case study in credit card fraud detection”, in 12th International Conference on Information Technology-New Generations, pp.122-126,2015.
[7] S. Aghili and P. Zavarsky K. T. Hafiz, "The use of predictive analytics technology to detect credit card fraud in Canada," in 11th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6, 2016.
[8] Bansal M Sonepat H.C.E., "Survey Paper on Credit Card Fraud Detection," International Journal of Advanced Research in Computer Engineering & Technology, vol. 3, no. 3, pp. 827-832,2014.
[9] S., Tuyls, K., Vanschoenwinkel, B. and Manderick, "Credit card fraud detection using Bayesian and neural networks," in Proceedings of the 1st international naiso congress on neuro-fuzzy technologies, pp. 261-270,2002.
[10] Kuldeep Randhawa, Chu Kiong Loo, Manjeevan Seera, Chee Peng Lim and Asoke K. Nandi, "Credit card fraud detection using AdaBoost and majority voting," IEEE Access, vol. 6, pp. 14277-14284,2018.
[11] A. Roy and J. Sun and R. Mahoney and L. Alonzi and S. Adams and P. Beling, "Deep learning detecting fraud in credit card transactions," in Systems and Information Engineering Design Symposium (SIEDS), pp. 129-134, 2018.
[12] Guanjun Liu, Zhenchuan Li, Lutao Zheng, Shuo Wang and Changjun Jiang Shiyang Xuan, "Random Forest for Credit Card Fraud Detection," in IEEE 15th International Conference On Networking, Sensing and Control (ICNSC), pp.1-6,2018.
[13] Zarrabi, H. Kazemi, "Using deep networks for fraud detection in the credit card transaction," IEEE 4th International Conference In Knowledge-Based Engineering and Innovation (KBEI), pp. 0630-0633,2017.
[14] John O., Adebayo O. Adetunmbi, and Samuel A. Oluwadaren Awoyemi, "Credit card fraud detection using machine learning techniques: A comparative analysis."International Conference on Computing Networking and Informatics (ICCNI), pp. 1-9,2017.
[15] S. Dutta, A. K. Gupta and N. Narayan, "Identity Crime Detection Using Data Mining, "3rd International Conference on Computational Intelligence and Networks (CINE), Odisha, pp. 1-5,2017.
[16] K. Modi and R. Dayma, "Review on fraud detection methods in credit card transactions, "International Conference on Intelligent Computing and Control (I2C2), Coimbatore, pp. 1-5,2017
Citation
S. Preeti, Ashima, "Analysis of Various Credit Card Fraud Detection Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1212-1216, 2019.
Research in Service-Oriented Architecture with Cloud and SaaS Solutions
Review Paper | Journal Paper
Vol.7 , Issue.6 , pp.1217-1220, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.12171220
Abstract
The Software as a Service (SaaS) and Service Oriented Architecture (SOA) leads the confusion which one an apt for the nowadays. SaaS cloud delivery model becomes popular. So, the clear understanding is necessary to know the concepts of the SaaS delivery model and SOA architecture. In this paper is used to explore the concepts of SaaS and SOA to give a better understanding of these two technologies.
Key-Words / Index Term
SOA, SaaS, Cloud Computing, Service Oriented
References
[1] Chou, D.C. and A.Y. Chou, “Software as a Service (SaaS) as an outsourcing model: An economic analysis," 2008.
[2] AFST, “SaaS Applications: Security and Interoperability. AFS Technologies”,2014.
[3] Collier, M., “SaaS enablement”,2012.
[4] CW,” Predictions 2014: How CIOs plan to spend their 2014 IT budget” Computer Weekly, 2014.
[5] McLellan, C., “Saas-pros-cons-and-leadingvendors”,Oracle Service Cloud,2013.
[6] e-Core, “Cloud and SaaS solutions”, e-Core,2009.
[7] Mell, P., & Grance, T., "The NIST definition of cloud computing", Special Publication 800-145, National Institute of Standards and Technology, available at http://csrc.nist.gov/ publications/ PubsSPs.html#800-145,2011.
[8] Eyad Saleh, Nuhad Shaabani, and Christoph Meinel, “A Framework for Mitigating Traditional Web Applications into Multi-Tenant SaaS," INFOCOMP 2012, The Second International Conference on Advanced Communications and Computation.
[9] Jaffe, L. “SaaS-Software as a Service”, 1-4,2013.
[10] Yinong Chen, “A Dream of Software Engineers – Service Orientation and Cloud Computing”, 6th IEEE Joint International Information Technology and Artificial Intelligence Conference Keynote, accessed from www.public.asu.edu/~ychen10 /activities/jicsit11/ChenKeynote11.pdf on August 2013.
[11] Jaroslav Gergic, “Software Engineering in the age of SaaS and Cloud Computing", a whitepaper from www.gooddata.com, August 2013, retrieved on Sep 2013.
[12] Bedin, W. and M. Moinuddin, “An overview of software as a service in retail”,2007.
[13] Santosh, T., “Software as a service”,2014.
[14] Merker, L., “Considering enterprise software as a service? University Business”.2009.
[15] Hanu Kommalapati and William H. Zack, “The SaaS Development Lifecycle“, a white paper from www.infoq.com, Oct 2011, accessed on Sep. 20, 2013.
[16] David Brumbaugh, "Developing Cloud-based SaaS Applications”, an article from news.dice.com, June 2013, accessed on September 2013.
[17] Abhishek Kumar, Manindra Singh, “An Empirical Study on Testing of SOA based Services”, I.J. Information Technology and Computer Science, 2015, 01, 54-66 Published Online December 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2015.01.07.
[18] Rahmansyah, R. and F. Gaol, “Service-oriented architecture governance implementation in a software development project as an enterprise solutions”, J. Comput. Sci., 9: 1638-1647. DOI: 10.3844/jcssp.2013.1638.1647..,2013.
[19] Karthik Vishwanaathan, “Right Engineering SaaS: Successfully deploying Software as a Service Models”, a white paper from Aspire Systems, retrieved from www.sandhill.com/assets/pdf/Right_Engineering_SaaS.pdf on September 2013.
[20] Farhat, T, "Software-as-a-Service (SaaS) as-a secure-service”. Slideshare,2013.
[21] Phillip A. Laplante, Jia Zhang, Jeffrey Voas, “What’s in a name? Distinguish between SaaS and SOA”. IT Pro May/June 2008 article published by IEEE Computer Society.
[22] Jabr, M.A. and H.K. Al-omari,” E-learning management system using service-oriented architecture”, 2010, J. Comput. Sci., 6: 285-295. DOI:10.3844/jcssp.2010.285.295.
[23] Sabasti, I., Siluvai, P. Jawahar, V.and Kumar, S., "A framework for simple object access protocol messages to detect expansion attacks for secure web services". J. Comput. Sci.,2013., 9: 308-313. DOI: 10.3844/jcssp.2013.308.313.
[24] Stephen S. Yau and Ho G. An, “Software Engineering Meets Services and Cloud Computing”, an article published by IEEE Computer Society and InfoQ, 2011, pp 47-53.
[25] Nassif, A.B., and M.A.M. Capretz, 2013. Offering saas as SOA services. Innovat. Adv. Comput. Inform., Syst. Sci. Eng.. 152: 405-414. DOI: 10.1007/978- 1-4614-3535-8.
Citation
G. Marimuthu, "Research in Service-Oriented Architecture with Cloud and SaaS Solutions," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1217-1220, 2019.
Review on Smart Ration Distribution System
Review Paper | Journal Paper
Vol.7 , Issue.6 , pp.1221-1223, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.12211223
Abstract
Presently multi day apportion card is incredibly imperative for each home and utilized for different eld, for example, relatives subtleties, to get gas association, it execute as location proof for different purposes and so on. Every one of the general population having a proportion card to get the different materials (sugar, rice, oil, lamp oil, and so on) from the proportion shops. RFID cards are given rather than customary apportion cards, this RFID tag contains all data of card holder like Aadhar no., thumb impression, iris impression and so on. Shrewd card based programmed proportion shop is novel methodology in open circulation system (PDS) significant for progressively beneficial, exact, and mechanized procedure of extent con- veyance. In proposed framework customer needs to enlist with the entry where he is designated with client ID and Password which are open from email ID. At the point when customer visits the proportion shop, he/she will filter RFID tag before RFID peruser. Burden cell and IR sensor is utilized for exact weighing of grain and fluid individually.
Key-Words / Index Term
RFID Tag, Node MCU,PIC,Ration card
References
[1] Harshali P. Rane, Kavita S. Patil, AditiS. Chaudhari, Priyanka M.Pendharkar, “Automated Rationing System Using Raspberry Pi”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue 4, April 2017
[2] Kumbhar Aakanksha, Kumavat Sukanya, Lonkar Madhuri, Mrs. A.S. Pawar, “Smart Ration Card System Using Raspberry-pi”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, Issue 4, April 2016
[3] S.Valarmathy, R.Ramani, Fahim Akhtar, S.Selvaraju, G.Ramachandran “Automatic Ration Material Distributions Based on GSM and RFID Technology”, I.J. Intelligent Systems and Applications, 2013, 11, 47-54, October 2013.
[4] Kashinath Wakade, Pankaj Chidrawar, Dinesh Aitwade, “Smart Ration Distribution and Controlling”, International Journal of Scientific and Research Publications, Volume 5, Issue 4, April 2015.
[5] Rashmi Pandhare, Mayur Rewatkar, Nikita Meghal , Nikhil Bondre, Ashvini Ambatkar ,Akshaya Dole, “Modern Public Distribution System for Digital India”, International Research Journal of Engineering and Technology (IRJET) Volume: 03 Issue: 03 | Mar-2016.
[6] Survey on Smart Ration Card using Internet of Things Aarti Bhosale Shweta Bhor Pratima Sabale Pushpak Shinde International Journal of Computer Applications (0975 – 8887) Volume 180 – No.3, December 2017
[7] Chetan S. Kandare Trimbakeshwar Nasik Vaishali R. Tribhuvan Smart Application using Biometric and RFID for Ration Card International Journal of Computer Applications (0975 – 8887) Volume 177 – No.4, November 2017
[8] Golden Bagul1, Brendon Desouza2, Tejaswini Gaikwad3, Ankush Panghanti4, Trupti Kumbhare A Survey on Smart Ration Card System International Journal Of Engineering And Computer Science Volume 6 Issue 1 Jan. 2017, Page No. 20096-20098
[9] Prashant Kontam1, Ajinkya Tarlekar2, Akshay Deshmukh3, Vivek Kale4, Prof.Sachin Patil5 A Review on Smart Ration Card System International Journal of Innovative Research in Computer and Communication Engineering Vol. 5, Issue 3, March 2017
[10] Ms. Kritika Patil1 , Ms. Monica Sundrani2, Ms. Sweta Kumari3, Ms. Aditi Kakde4, Prof. Mahesh Gosavi Smart Ration Card System Based on GSM Technique International Research Journal of Engineering and Technology (IRJET) Volume: 03 Issue: 11 | Nov -2016 2016, Page 1318
Citation
Supriya Lokhande, Sagar Shinde, "Review on Smart Ration Distribution System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1221-1223, 2019.