0% found this document useful (0 votes)
12 views5 pages

1 5 2 Credit Card Data Usingmachine Learning-Based Algorithms

Abc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views5 pages

1 5 2 Credit Card Data Usingmachine Learning-Based Algorithms

Abc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/364397802

Fraud Detection in Credit Card Data using Unsupervised & Supervised


Machine Learning-Based Algorithms

Conference Paper · July 2022


DOI: 10.1109/ICSES55317.2022.9914287

CITATIONS READS

7 385

6 authors, including:

Gangadhar Hugar Harikumar Pallathadka


Laxmi Vidyapeeth Sarigam Manipur International University, Imphal, India
19 PUBLICATIONS 115 CITATIONS 223 PUBLICATIONS 1,872 CITATIONS

SEE PROFILE SEE PROFILE

Kamal Gulati
Amity University
80 PUBLICATIONS 1,261 CITATIONS

SEE PROFILE

All content following this page was uploaded by Gangadhar Hugar on 05 August 2023.

The user has requested enhancement of the downloaded file.


2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES) | 978-1-6654-7413-9/22/$31.00 ©2022 IEEE | DOI: 10.1109/ICSES55317.2022.9914287

Fraud Detection in Credit Card Data using


Unsupervised & Supervised Machine Learning-
Based Algorithms
Prasanna Kumar Lakineni1, Dr. Keyurkumar M Nayak2, Harikumar Pallathadka3, Dr. Kamal Gulati4, Kapil Pandey5 and
Dr. Pinal J. Patel6
1
Associate Professor, Dadi Institute of Engineering & Technology,Visakhapatnam, India,
2
Director, Laxmi Institute of Management, India,
3
Director, Manipur International University, Imphal, Manipur, India,
4
Associate Professor, Amity University, Noida, Uttar Pradesh, India | Independent Consultant, Stratford University, Virginia, USA,
5
Assistant Professor, Faculty of Management Studies, Gurukula Kangri (Deemed to be University), Haridwar, Uttrakhand, India,
6
Assistant Professor, Gujarat Technological University, India,

E-mail : [email protected] [email protected] [email protected] [email protected]


[email protected] [email protected]

Abstract- Online voting methods safeguard your vote's Problem Statement:


integrity by stopping people from voting more than Our online voting system will streamline the whole
once. This digital technology eliminates the necessity voting process by including a chatbot, Chabot, to
for physical gatherings and the use of paper ballots for assist each voter. Any time a user runs into a
voting For example, by email or an unprotected kind
problem, the chatbot is there to help them out
of online survey software. When referring to an
electronic voting system, you could hear the terms quickly. The voting procedure will be more
"online election system" or "online e voting system" affordable thanks to our voting technology. The
used interchangeably. Your organization's ability to outcomes of our voting method will be more
collect and monitor real-time input from its members reliable. We can keep track of voters with the aid of
is the common denominator in this case. Keep reading our voting system. We also save a lot of time using
to find out all you need to know about voting online. our method.

Keywords—Digital secure polling system, ballot, Research Objective:


Academic institutions, Elections, digital platform. It is the primary goal of this research to advance
online voting by offering all the necessary security
I.INTRODUCTION standards. This study's goal is to make voting more
convenient, less time-consuming, and more secure.
Systematic and verifiable input is collected from
your group via the use of online voting tools or Scope of Study:
online election systems. There are a number of sites Elections for roles such as "Group Leader, Project
where these decisions are made on a yearly basis, Leader, Employee of the Month, and other modest
including AGMs (Annual General Meetings). changes in working environment" are commonplace
Instead, consider conducting frequent polls inside in many workplaces. Online voting is a great option
your business organisation (e.g., anonymous if such is the case. Electors may cast their ballots
employee feedback surveys). from any location. In the course of a semester,
universities hold elections for positions such as
Problem Background: president and vice president.
Numerous academic works have been published
recently on the subject of online voting. In recent
II.LITERATURE REIVEW
years, online voting has been a focus of study, and
attempts are being undertaken to make the system
This is an election voting mechanism that may be
more safe. The consequences of using an unsecured
utilised by the public. To cast a vote, each voter
Internet connection.
must log in and choose the candidate of his or her
choice. The local area network is where all of the

Authorized licensed use limited to: AMITY University. Downloaded on October 18,2022 at 11:54:20 UTC from IEEE Xplore. Restrictions apply.
research, development, and testing takes place. The organisational procedures, much as during elections
software used for online voting has been the subject for leadership [8]. You'll need to keep track of each
of research for a considerable amount of time, and individual's reaction to these adjustments. Using an
recent instances of incorrect implementations may online voting system in these situations can help you
be traced back to this time period.A safe and make better judgments, defend those conclusions,
appropriate voting environment must be provided for and provide evidence that these decisions were made
citizens in order for them to cast their ballots. An in accordance with your group's expectations.
online voting system is one in which a voter may
exercise his or her democratic right to vote from any Home Page:
location in the world. It's the primary page of the website. A website's
home page is the first page that visitors see. When
Digital Secure Polling System contains: an application begins, the phrase may also refer to
1. User’s details the page or sites that are always shown in the
2. User’s Names with ID and password. browser. Alternatively, the term "initial page" might
3. User’s vote in a database. be used in this context.
4. Sum of total number of votes.
5. Result panel Registration:
6. A unique user id given my administration In this we can register by giving the user details.
Registration panel
Various operational works proposed in the system In this we have to two types of registration.
is: 1) user can easily register themselves.
Database containing user information. The user's 2) And candidate who stands for election can also
information is checked for accuracy. erasing register
incorrect information from the record. Each piece of
data is sent to the appropriate authorities User Login:
For example, by email or an unprotected kind of
III.METHODOLOGY online survey software. When referring to an
electronic voting system, you could hear the terms
When there are numerous seats on a board of "online election system" or "online e voting system"
directors, a Digital Secure Polling System is an used interchangeably. Your organization's ability to
excellent idea: (e.g., chair, vice president, secretary, collect and monitor real-time input from its members
treasurer). Documentation (e.g., bios, resumes, head is the common denominator in this case. Keep
pictures) may be attached to any of the above. Make reading to find out all you need to know about
room for new members in your organisation. This voting online.
makes it easier to maintain a consistent and fair
review process, and it also informs applicants of Admin Panel:
what to anticipate. Where the admin has the control over the website.
By this they count the votes and decides the results.
Gather anonymous employee feedback. In order to
understand how their workers really feel about their Voting Panel:
employment and work lives, managers (and In this panel we see that how many candidates are
managers of managers) [5-7] want to know. Secret participate in election.
balloting in online voting systems enables workers
express their actual sentiments since they know that Results:
their input will be taken into consideration but not This is the phase where we can easily know which
directly linked to them. Annual budgets should be team has win the Election.
put to a vote. Using an online voting system ensures
that your group's votes are safe and accessible,
which is important when making budgetary
modifications. Consider making changes to your
operating procedures and rules. Expect group
members to respond strongly to changes in

Authorized licensed use limited to: AMITY University. Downloaded on October 18,2022 at 11:54:20 UTC from IEEE Xplore. Restrictions apply.
RESULTS

30
20
10
0

Figure 3- Results [11]

V.TECHNOLOGY USED

This online voting platform was developed by us in


order to using following technologies:
Front end: HTML, CSS, Bootstrap
Back end: - PHP, JavaScript
Database: - MySQL, phpMyAdmin

VI.CONCLUSION

Most of these functions are required to be performed


by a polling system that is capable of meeting strict
regulatory standards there is also a considerable
emphasis on the need of scalability and ecological
Figure 1- Working Methodology [9] sustainability in addition to strict security and
accuracy standards.
IV.OUTPUT SNIPPETS
E-voting aims to speed up ballot counting, save
money on hiring employees to physically tally votes,
and increase accessibility for those with disabilities.
In the long run, costs are likely to fall. The reporting
and publication of results is quicker. The ability to
vote from anywhere saves both time and money for
voters. This might lead to an increase in voter
participation. People who live overseas, those who
live in rural regions distant from voting booths, and
those who are physically challenged stand to gain
the most from electronic elections.

People who commit fraud and identity theft should


be held accountable for their actions, not only for
their financial losses. Frauds and thefts of identity
Figure 2 - Ballot Position [10] may be quite upsetting. Is there a way to prevent
credit card fraud?? Using a credit card account
without permission is regarded to be an act of fraud.
Fraud is usually detected when a credit card is lost or
stolen, when unusual charges appear on a billing
account, or when the credit card company's fraud
department is called to inquire about a purchase. The
credit card provider should be contacted promptly if

Authorized licensed use limited to: AMITY University. Downloaded on October 18,2022 at 11:54:20 UTC from IEEE Xplore. Restrictions apply.
fraud is detected on the account. Assisting with REFERENCES
fraud verification, removing charges that were not
[1] Thompson, Ken (August 1984) Reflections on Trusting Trust
made by the cardholder or an authorised third party, [2] “The Constitutionality of Electronic Voting in Germany". NDI -
and closing the account to prevent further fraudulent National Democratic Institute USA. Archived from the original
activity are all responsibilities of the credit card on 25 March 2020. Retrieved 31 May 2020.
[3] Schneier, Bruce (September 2018), Archived 2018-06-09 at the
company. Checking your credit report is also a good Wayback Machine.
idea to make sure there are no other unusual charges [4] K. Vijayakumar and C. Arun, Continuous Security Assessment
of Applications in Cloud Environment, IJCTA, 9(36), 2016, pp.
on your record. Law enforcement's intervention is 533-541.
often planned in conjunction with the financial [5] N. A. Puri, A. R. Karare and R. C. Dharmik, "Deployment of
institution in question. How Do You Handle An application on Cloud and enhanced data security in Cloud
computing using ECC algorithm," 2014 IEEE International
Identity Theft Situation? There are many types of Conference on Advanced Communications, Control and
fraud in which a person's personal information is Computing Technologies, 2014, pp. 1667-1671, doi:
used to open new accounts or get benefits in the 10.1109/ICACCCT.2014.7019392.
[6] M. Sonika and S. B. G. T. Babu, “Analysis of Channel coding
victim's name. As opposed to other forms of performance for wireless communications,” J. Study Res., vol.
misrepresentation, this one is more complicated and XII, no. 29, pp. 29–49, 2020.
[7] Fontaine, C., & Galand, F. (2007). A Survey of Homomorphic
may lead to more significant problems. Cardholders Encryption for Nonspecialists. EURASIP Journal on
who don't accept bills or other mail, receive Visa, Information Security, (1), 013801.
are denied credit for no apparent reason, receive [8] Ryan, P. Y. A. (2007). The computer ate my vote. Retrieved
from
calls or letters about things that were not exchanged http://www.dagstuhl.de/Materials/Files/07/07091/07091.RyanPe
by the credit cardholder, and are served court papers ter.Paper.pdf
or capture warrants for things in which the [9] S. B. G. T. Babu and C. S. Rao, “Texture and steerability based
image authentication,” in 2016 11th International Conference on
cardholder was not involved are all indications of Industrial and Information Systems (ICIIS), 2016, vol. 2018-
fraudulent activity. Accepting such inexplicable Janua, pp. 154–159.
[10] Fowler, Stephen. "Here's What Vendors Say It Would a Cost to
happenings as mere coincidences is not an option; Replace Georgia's Voting System". "NYVV - Paper Ballots
instead, you must persistently probe for answers. Cost". www.nyvv.org

Authorized licensed use limited to: AMITY University. Downloaded on October 18,2022 at 11:54:20 UTC from IEEE Xplore. Restrictions apply.
View publication stats

You might also like