1 5 2 Credit Card Data Usingmachine Learning-Based Algorithms
1 5 2 Credit Card Data Usingmachine Learning-Based Algorithms
net/publication/364397802
CITATIONS READS
7 385
6 authors, including:
Kamal Gulati
Amity University
80 PUBLICATIONS 1,261 CITATIONS
SEE PROFILE
All content following this page was uploaded by Gangadhar Hugar on 05 August 2023.
Authorized licensed use limited to: AMITY University. Downloaded on October 18,2022 at 11:54:20 UTC from IEEE Xplore. Restrictions apply.
research, development, and testing takes place. The organisational procedures, much as during elections
software used for online voting has been the subject for leadership [8]. You'll need to keep track of each
of research for a considerable amount of time, and individual's reaction to these adjustments. Using an
recent instances of incorrect implementations may online voting system in these situations can help you
be traced back to this time period.A safe and make better judgments, defend those conclusions,
appropriate voting environment must be provided for and provide evidence that these decisions were made
citizens in order for them to cast their ballots. An in accordance with your group's expectations.
online voting system is one in which a voter may
exercise his or her democratic right to vote from any Home Page:
location in the world. It's the primary page of the website. A website's
home page is the first page that visitors see. When
Digital Secure Polling System contains: an application begins, the phrase may also refer to
1. User’s details the page or sites that are always shown in the
2. User’s Names with ID and password. browser. Alternatively, the term "initial page" might
3. User’s vote in a database. be used in this context.
4. Sum of total number of votes.
5. Result panel Registration:
6. A unique user id given my administration In this we can register by giving the user details.
Registration panel
Various operational works proposed in the system In this we have to two types of registration.
is: 1) user can easily register themselves.
Database containing user information. The user's 2) And candidate who stands for election can also
information is checked for accuracy. erasing register
incorrect information from the record. Each piece of
data is sent to the appropriate authorities User Login:
For example, by email or an unprotected kind of
III.METHODOLOGY online survey software. When referring to an
electronic voting system, you could hear the terms
When there are numerous seats on a board of "online election system" or "online e voting system"
directors, a Digital Secure Polling System is an used interchangeably. Your organization's ability to
excellent idea: (e.g., chair, vice president, secretary, collect and monitor real-time input from its members
treasurer). Documentation (e.g., bios, resumes, head is the common denominator in this case. Keep
pictures) may be attached to any of the above. Make reading to find out all you need to know about
room for new members in your organisation. This voting online.
makes it easier to maintain a consistent and fair
review process, and it also informs applicants of Admin Panel:
what to anticipate. Where the admin has the control over the website.
By this they count the votes and decides the results.
Gather anonymous employee feedback. In order to
understand how their workers really feel about their Voting Panel:
employment and work lives, managers (and In this panel we see that how many candidates are
managers of managers) [5-7] want to know. Secret participate in election.
balloting in online voting systems enables workers
express their actual sentiments since they know that Results:
their input will be taken into consideration but not This is the phase where we can easily know which
directly linked to them. Annual budgets should be team has win the Election.
put to a vote. Using an online voting system ensures
that your group's votes are safe and accessible,
which is important when making budgetary
modifications. Consider making changes to your
operating procedures and rules. Expect group
members to respond strongly to changes in
Authorized licensed use limited to: AMITY University. Downloaded on October 18,2022 at 11:54:20 UTC from IEEE Xplore. Restrictions apply.
RESULTS
30
20
10
0
V.TECHNOLOGY USED
VI.CONCLUSION
Authorized licensed use limited to: AMITY University. Downloaded on October 18,2022 at 11:54:20 UTC from IEEE Xplore. Restrictions apply.
fraud is detected on the account. Assisting with REFERENCES
fraud verification, removing charges that were not
[1] Thompson, Ken (August 1984) Reflections on Trusting Trust
made by the cardholder or an authorised third party, [2] “The Constitutionality of Electronic Voting in Germany". NDI -
and closing the account to prevent further fraudulent National Democratic Institute USA. Archived from the original
activity are all responsibilities of the credit card on 25 March 2020. Retrieved 31 May 2020.
[3] Schneier, Bruce (September 2018), Archived 2018-06-09 at the
company. Checking your credit report is also a good Wayback Machine.
idea to make sure there are no other unusual charges [4] K. Vijayakumar and C. Arun, Continuous Security Assessment
of Applications in Cloud Environment, IJCTA, 9(36), 2016, pp.
on your record. Law enforcement's intervention is 533-541.
often planned in conjunction with the financial [5] N. A. Puri, A. R. Karare and R. C. Dharmik, "Deployment of
institution in question. How Do You Handle An application on Cloud and enhanced data security in Cloud
computing using ECC algorithm," 2014 IEEE International
Identity Theft Situation? There are many types of Conference on Advanced Communications, Control and
fraud in which a person's personal information is Computing Technologies, 2014, pp. 1667-1671, doi:
used to open new accounts or get benefits in the 10.1109/ICACCCT.2014.7019392.
[6] M. Sonika and S. B. G. T. Babu, “Analysis of Channel coding
victim's name. As opposed to other forms of performance for wireless communications,” J. Study Res., vol.
misrepresentation, this one is more complicated and XII, no. 29, pp. 29–49, 2020.
[7] Fontaine, C., & Galand, F. (2007). A Survey of Homomorphic
may lead to more significant problems. Cardholders Encryption for Nonspecialists. EURASIP Journal on
who don't accept bills or other mail, receive Visa, Information Security, (1), 013801.
are denied credit for no apparent reason, receive [8] Ryan, P. Y. A. (2007). The computer ate my vote. Retrieved
from
calls or letters about things that were not exchanged http://www.dagstuhl.de/Materials/Files/07/07091/07091.RyanPe
by the credit cardholder, and are served court papers ter.Paper.pdf
or capture warrants for things in which the [9] S. B. G. T. Babu and C. S. Rao, “Texture and steerability based
image authentication,” in 2016 11th International Conference on
cardholder was not involved are all indications of Industrial and Information Systems (ICIIS), 2016, vol. 2018-
fraudulent activity. Accepting such inexplicable Janua, pp. 154–159.
[10] Fowler, Stephen. "Here's What Vendors Say It Would a Cost to
happenings as mere coincidences is not an option; Replace Georgia's Voting System". "NYVV - Paper Ballots
instead, you must persistently probe for answers. Cost". www.nyvv.org
Authorized licensed use limited to: AMITY University. Downloaded on October 18,2022 at 11:54:20 UTC from IEEE Xplore. Restrictions apply.
View publication stats