Search results for: Rajinder Kaur
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 268

Search results for: Rajinder Kaur

238 3D Printing: Rebounding from Global Supply Chain Disruption Due to Natural Disaster

Authors: Gurjinder Singh, Jasmeen Kaur, Mukul Dhiman

Abstract:

This paper mainly describes the significance of 3D printing in the supply chain management in a scenario when there is disruption in global supply chain. Furthermore, the development and implementation of supply chain strategies in context of 3D printing technology is framed to make supply chain of an organization resilient to disruption caused by natural disasters.

Keywords: 3D printing, global supply chain, supply chain management, supply chain strategies

Procedia PDF Downloads 449
237 Classification System for Soft Tissue Injuries of Face: Bringing Objectiveness to Injury Severity

Authors: Garg Ramneesh, Uppal Sanjeev, Mittal Rajinder, Shah Sheerin, Jain Vikas, Singla Bhupinder

Abstract:

Introduction: Despite advances in trauma care, a classification system for soft tissue injuries of the face still needs to be objectively defined. Aim: To develop a classification system for soft tissue injuries of the face; that is objective, easy to remember, reproducible, universally applicable, aids in surgical management and helps to develop a structured data that can be used for future use. Material and Methods: This classification system includes those patients that need surgical management of facial injuries. Associated underlying bony fractures have been intentionally excluded. Depending upon the severity of soft tissue injury, these can be graded from 0 to IV (O-Abrasions, I-lacerations, II-Avulsion injuries with no skin loss, III-Avulsion injuries with skin loss that would need graft or flap cover, and IV-complex injuries). Anatomically, the face has been divided into three zones (Zone 1/2/3), as per aesthetic subunits. Zone 1e stands for injury of eyebrows; Zones 2 a/b/c stand for nose, upper eyelid and lower eyelid respectively; Zones 3 a/b/c stand for upper lip, lower lip and cheek respectively. Suffices R and L stand for right or left involved side, B for presence of foreign body like glass or pellets, C for extensive contamination and D for depth which can be graded as D 1/2/3 if depth is still fat, muscle or bone respectively. I is for damage to facial nerve or parotid duct. Results and conclusions: This classification system is easy to remember, clinically applicable and would help in standardization of surgical management of soft tissue injuries of face. Certain inherent limitations of this classification system are inability to classify sutured wounds, hematomas and injuries along or against Langer’s lines.

Keywords: soft tissue injuries, face, avulsion, classification

Procedia PDF Downloads 359
236 Study and Analysis of the Factors Affecting Road Safety Using Decision Tree Algorithms

Authors: Naina Mahajan, Bikram Pal Kaur

Abstract:

The purpose of traffic accident analysis is to find the possible causes of an accident. Road accidents cannot be totally prevented but by suitable traffic engineering and management the accident rate can be reduced to a certain extent. This paper discusses the classification techniques C4.5 and ID3 using the WEKA Data mining tool. These techniques use on the NH (National highway) dataset. With the C4.5 and ID3 technique it gives best results and high accuracy with less computation time and error rate.

Keywords: C4.5, ID3, NH(National highway), WEKA data mining tool

Procedia PDF Downloads 305
235 A Survey on Types of Noises and De-Noising Techniques

Authors: Amandeep Kaur

Abstract:

Digital Image processing is a fundamental tool to perform various operations on the digital images for pattern recognition, noise removal and feature extraction. In this paper noise removal technique has been described for various types of noises. This paper comprises discussion about various noises available in the image due to different environmental, accidental factors. In this paper, various de-noising approaches have been discussed that utilize different wavelets and filters for de-noising. By analyzing various papers on image de-noising we extract that wavelet based de-noise approaches are much effective as compared to others.

Keywords: de-noising techniques, edges, image, image processing

Procedia PDF Downloads 304
234 A CMOS D-Band Power Amplifier in 22FDSOI Technology for 6G Applications

Authors: Karandeep Kaur

Abstract:

This paper presents the design of power amplifier (PA) for mmWave communication systems. The designed amplifier uses GlobalFoundries 22 FDX technology and works at an operational frequency of 140 GHz in the D-Band. With a supply voltage of 0.8V for the super low threshold voltage transistors, the amplifier is biased in class AB and has a total current consumption of 50 mA. The measured saturated output power from the power amplifier is 5.6 dBm with an output-referred 1dB-compression point of 1.6dBm. The measured gain of PA is 19 dB with 3 dB-bandwidth ranging from 120 GHz to 140 GHz. The chip occupies an area of 795µm × 410µm.

Keywords: mmWave communication system, power amplifiers, 22FDX, D-Band, cross-coupled capacitive neutralization

Procedia PDF Downloads 127
233 Biomedical Waste Management an Unsung Hero

Authors: Preeti Madan, Shalini Malhotra, Nirmaljit Kaur, Charoo Hans, VK Sabarwal

Abstract:

Hospital is one of the most diverse and complex institutions frequented by people from every walk of life without any distinction between age, sex, gender, religion or intellect. This is over and above the normal inhabitant of hospital i.e. doctors, patients, and paramedical staff. The hospital waste generated 85% is non hazardous, 10% infectious and around 5% are non-infectious but hazardous waste. The management of biomedical waste is still in its infancy. There is a lot of confusion with the problems among the generators, operators, decision makers, and general community about the safe management of biomedical waste prompt action initiated to seek new scientific, safe, and cost-effective management of waste.

Keywords: biomedical waste, nosocomial infection, waste management, hospitals

Procedia PDF Downloads 414
232 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 370
231 Adolescents’ Role in Family Buying Decision Making

Authors: Harleen Kaur, Deepika Jindal Singla

Abstract:

Buying decision making is a complicated process, in which consumer’s decision is under the impact of others. The buying decision making is directed in a way that they have to act as customers in the society. Media and family are key socialising agents for adolescents’. Moreover, changes in the socio-cultural environment in India necessitate that adolescents’ influence in family’s buying decision-making should be investigated. In comparison to Western society, Indian is quite different, when compared in terms of family composition and structure, behaviour, values and norms which effect adolescents’ buying decision-making.

Keywords: adolescents, buying behavior, Indian urban families, consumer socialization

Procedia PDF Downloads 442
230 Reduction Study of As(III)-Cysteine Complex through Linear Sweep Voltammetry

Authors: Sunil Mittal, Sukhpreet Singh, Hardeep Kaur

Abstract:

A simple voltammetric technique for on-line analysis of arsenite [As (III)] is reported. Owing to the affinity of As (III) with thiol group of proteins and enzymes, cysteine has been employed as reducing agent. The reduction study of As(III)-cysteine complex on indium tin oxide (ITO) electrode has been explored. The experimental parameters such as scan rate, cysteine concentration, pH etc. were optimized to achieve As (III) determination. The developed method provided dynamic linear range of detection from 0.1 to 1 mM with a detection limit of 0.1 mM. The method is applicable to environmental monitoring of As (III) from highly contaminated sources such as industrial effluents, wastewater sludge etc.

Keywords: arsenite, cysteine, linear sweep voltammetry, reduction

Procedia PDF Downloads 197
229 A Study of Closed Sets and Maps with Ideals

Authors: Asha Gupta, Ramandeep Kaur

Abstract:

The purpose of this paper is to study a class of closed sets, called generalized pre-closed sets with respect to an ideal (briefly Igp-closed sets), which is an extension of generalized pre-closed sets in general topology. Then, by using these sets, the concepts of Igp- compact spaces along with some classes of maps like continuous and closed maps via ideals have been introduced and analogues of some known results for compact spaces, continuous maps and closed maps in general topology have been obtained.

Keywords: ideal, gp-closed sets, gp-closed maps, gp-continuous maps

Procedia PDF Downloads 180
228 Reasons for Non-Applicability of Software Entropy Metrics for Bug Prediction in Android

Authors: Arvinder Kaur, Deepti Chopra

Abstract:

Software Entropy Metrics for bug prediction have been validated on various software systems by different researchers. In our previous research, we have validated that Software Entropy Metrics calculated for Mozilla subsystem’s predict the future bugs reasonably well. In this study, the Software Entropy metrics are calculated for a subsystem of Android and it is noticed that these metrics are not suitable for bug prediction. The results are compared with a subsystem of Mozilla and a comparison is made between the two software systems to determine the reasons why Software Entropy metrics are not applicable for Android.

Keywords: android, bug prediction, mining software repositories, software entropy

Procedia PDF Downloads 552
227 Diversity and Distribution Ecology of Coprophilous Mushrooms of Family Psathyrellaceae from Punjab, India

Authors: Amandeep Kaur, Ns Atri, Munruchi Kaur

Abstract:

Mushrooms have shaped our environment in ways that we are only beginning to understand. The weather patterns, topography, flora and fauna of Punjab state in India create favorable growing conditions for thousands of species of mushrooms, but the complete region was unexplored when it comes to coprophilous mushrooms growing on herbivorous dung. Coprophilous mushrooms are the most specialized fungi ecologically, which germinate and grow directly on different types of animal dung or on manured soil. In the present work, the diversity of coprophilous mushrooms' of Family Psathyrellaceae of the order Agaricales is explored, their relationship to the human world is sketched out, and their supreme significance to life on this planet is revealed. During the investigation, different dung localities from 16 districts of Punjab state have been explored for the collection of material. The macroscopic features of the collected mushrooms were documented on the Field key. The hand cut sections of the various parts of carpophore, such as pileus, gills, stipe and the basidiospores details, were studied microscopically under different magnification. Various authentic publications were consulted for the identification of the investigated taxa. The classification, authentic names and synonyms of the investigated taxa are as per the latest version of Dictionary of Fungi and the MycoBank. The present work deals with the taxonomy of 81 collections belonging to 39 species spread over 05 coprophilous genera, namely Psathyrella, Panaeolus, Parasola, Coprinopsis, and Coprinellus of family Psathyrellaceae. In the text, the investigated taxa have been arranged as they appear in the key to the genera and species investigated. In this work, have been thoroughly examined for their macroscopic, microscopic, ecological, and chemical reaction details. The authors dig deeper to give indication of their ecology and the dung type where they can be obtained. Each taxon is accompanied by a detailed listing of its prominent features and an illustration with habitat photographs and line drawings of morphological and anatomical features. Taxa are organized as per their status in the keys, which allow easy recognition. All the taxa are compared with similar taxa. The study has shown that dung is an important substrate which serves as a favorable niche for the growth of a variety of mushrooms. This paper shows an insight what short-lived coprophilous mushrooms can teach us about sustaining life on earth!

Keywords: abundance, basidiomycota, biodiversity, seasonal availability, systematics

Procedia PDF Downloads 34
226 Coefficients of Some Double Trigonometric Cosine and Sine Series

Authors: Jatinderdeep Kaur

Abstract:

In this paper, the results of Kano from one-dimensional cosine and sine series are extended to two-dimensional cosine and sine series. To extend these results, some classes of coefficient sequences such as the class of semi convexity and class R are extended from one dimension to two dimensions. Under these extended classes, I have checked the function f(x,y) is two dimensional Fourier Cosine and Sine series or equivalently it represents an integrable function. Further, some results are obtained which are the generalization of Moricz's results.

Keywords: conjugate dirichlet kernel, conjugate fejer kernel, fourier series, semi-convexity

Procedia PDF Downloads 405
225 PH.WQT as a Web Quality Model for Websites of Government Domain

Authors: Rupinder Pal Kaur, Vishal Goyal

Abstract:

In this research, a systematic and quantitative engineering-based approach is followed by applying well-known international standards and guidelines to develop a web quality model (PH.WQT- Punjabi and Hindi Website Quality Tester) to measure external quality for websites of government domain that are developed in Punjabi and Hindi. Correspondingly, the model can be used for websites developed in other languages also. The research is valuable to researchers and practitioners interested in designing, implementing and managing websites of government domain Also, by implementing PH.WQT analysis and comparisons among web sites of government domain can be performed in a consistent way.

Keywords: external quality, PH.WQT, indian languages, punjabi and hindi, quality model, websites of government

Procedia PDF Downloads 271
224 Resource Management Framework in Cloud Computing

Authors: Gagandeep Kaur, Sonal Chawla

Abstract:

In a Cloud Computing environment, resource provisioning, resource allocation and resource scheduling is the most complex issues these days. Cloud User expects the best resource utilization and Cloud Provider expects revenue maximization by considering budget and time constraints. In this research paper, Resource Management Framework has been proposed to allocate the resources to Cloud Users and Cloud Providers in Cloud environment. The main aim of the proposed work is to provide the resources and services to Cloud Providers and Cloud Users in an efficient and effective manner. The proposed framework has been simulated and tested using the CloudSim simulator tool.

Keywords: cloud computing, resource allocation, auction, provisioning

Procedia PDF Downloads 117
223 An Extraction of Cancer Region from MR Images Using Fuzzy Clustering Means and Morphological Operations

Authors: Ramandeep Kaur, Gurjit Singh Bhathal

Abstract:

Cancer diagnosis is very difficult task. Magnetic resonance imaging (MRI) scan is used to produce image of any part of the body and provides an efficient way for diagnosis of cancer or tumor. In existing method, fuzzy clustering mean (FCM) is used for the diagnosis of the tumor. In the proposed method FCM is used to diagnose the cancer of the foot. FCM finds the centroids of the clusters of the foot cancer obtained from MRI images. FCM thresholding result shows the extract region of the cancer. Morphological operations are applied to get extracted region of cancer.

Keywords: magnetic resonance imaging (MRI), fuzzy C mean clustering, segmentation, morphological operations

Procedia PDF Downloads 362
222 Literature Review of Rare Synchronous Tumours

Authors: Diwei Lin, Amanda Tan, Rajinder Singh-Rai

Abstract:

We present the first reported case of a concomitant Leydig cell tumor (LCT) and paratesticular leiomyoma in an adult male with a known history of bilateral cryptorchidism. An 80-year-old male presented with a 2-month history of a left testicular lump associated with mild discomfort and a gradual increase in size on a background of bilateral cryptorchidism requiring multiple orchidopexy procedures as a child. Ultrasound confirmed a lesion suspicious for malignancy and he proceeded to a left radical orchidectomy. Histopathological assessment of the left testis revealed a concomitant testicular LCT with malignant features and paratesticular leiomyoma. Leydig cell tumors (LCTs) are the most common pure testicular sex cord-stromal tumors, accounting for up to 3% of all testicular tumors. They can occur at almost any age, but are noted to have a bi-modal distribution, with a peak incidence at 6 to 10 and at 20 to 50 years of age. LCT’s are often hormonally active and can lead to feminizing or virilizing syndromes. LCT’s are usually regarded as benign but can rarely exhibit malignant traits. Paratesticular tumours are uncommon and their reported prevalence varies between 3% and 16%. They occur in a complex anatomical area which includes the contents of the spermatic cord, testicular tunics, epididymis and vestigial remnants. Up to 90% of paratesticular tumours are believed to originate from the spermatic cord, though it is often difficult to definitively ascertain the exact site of origin. Although any type of soft-tissue neoplasm can be found in the paratesticular region, the most common benign tumors reported are lipomas of the spermatic cord, adenomatoid tumours of the epididymis and leiomyomas of the testis. Genetic studies have identified potential mutations that could potentially cause LCTs, but there are no known associations between concomitant LCTs and paratesticular tumors. The presence of cryptorchidism in adults with both LCTs and paratesticular neoplasms individually has been previously reported and it appears intuitive that cryptorchidism is likely to be associated with the concomitant presentation in this case report. This report represents the first documented case in the literature of a unilateral concomitant LCT and paratesticular leiomyoma on a background of bilateral cryptorchidism.

Keywords: testicular cancer, leydig cell tumour, leiomyoma, paratesticular neoplasms

Procedia PDF Downloads 339
221 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 88
220 Impact of Hybrid Optical Amplifiers on 16 Channel Wavelength Division Multiplexed System

Authors: Inderpreet Kaur, Ravinder Pal Singh, Kamal Kant Sharma

Abstract:

This paper addresses the different configurations used of optical amplifiers with 16 channels in Wavelength Division Multiplexed system. The systems with 16 channels have been simulated for evaluation of various parameters; Bit Error Rate, Quality Factor, for threshold values for a range of wavelength from 1471 nm to 1611 nm. Comparison of various combination of configurations have been analyzed with EDFA and FRA but EDFA-FRA configuration performance has been found satisfactory in terms of performance indices and stable region. The paper also compared various parameters quantized with different configurations individually. It has been found that Q factor has high value with less value of BER and high resolution for EDFA-FRA configuration.

Keywords: EDFA, FRA, WDM, Q factor, BER

Procedia PDF Downloads 328
219 Parametric Approach for Reserve Liability Estimate in Mortgage Insurance

Authors: Rajinder Singh, Ram Valluru

Abstract:

Chain Ladder (CL) method, Expected Loss Ratio (ELR) method and Bornhuetter-Ferguson (BF) method, in addition to more complex transition-rate modeling, are commonly used actuarial reserving methods in general insurance. There is limited published research about their relative performance in the context of Mortgage Insurance (MI). In our experience, these traditional techniques pose unique challenges and do not provide stable claim estimates for medium to longer term liabilities. The relative strengths and weaknesses among various alternative approaches revolve around: stability in the recent loss development pattern, sufficiency and reliability of loss development data, and agreement/disagreement between reported losses to date and ultimate loss estimate. CL method results in volatile reserve estimates, especially for accident periods with little development experience. The ELR method breaks down especially when ultimate loss ratios are not stable and predictable. While the BF method provides a good tradeoff between the loss development approach (CL) and ELR, the approach generates claim development and ultimate reserves that are disconnected from the ever-to-date (ETD) development experience for some accident years that have more development experience. Further, BF is based on subjective a priori assumption. The fundamental shortcoming of these methods is their inability to model exogenous factors, like the economy, which impact various cohorts at the same chronological time but at staggered points along their life-time development. This paper proposes an alternative approach of parametrizing the loss development curve and using logistic regression to generate the ultimate loss estimate for each homogeneous group (accident year or delinquency period). The methodology was tested on an actual MI claim development dataset where various cohorts followed a sigmoidal trend, but levels varied substantially depending upon the economic and operational conditions during the development period spanning over many years. The proposed approach provides the ability to indirectly incorporate such exogenous factors and produce more stable loss forecasts for reserving purposes as compared to the traditional CL and BF methods.

Keywords: actuarial loss reserving techniques, logistic regression, parametric function, volatility

Procedia PDF Downloads 98
218 Developmental Delays among Children with Neonatal Hyperbilirubinemia

Authors: Simplejit Kaur Dhanoa, Manmohan Singh

Abstract:

This study was done with the primary objective to evaluate the motor and mental developmental delays among children having neonatal Jaundice. A total sample of 300 neonates were collected; out of them, 150 were preterm neonates, and 150 were full term neonates from the hospital setting and follow up study was done with the help of the Developmental Assessment scale of the Indian Infant. The registered samples were assessed up to 2.6 years with a gap of 6 months. The outcomes of this study reveal that developmental delays were present among children who had preterm neonatal jaundice as compare to full term normal babies. Further, It was reported that both motor and mental development is affected due to neonatal hyperbilirubinemia in addition to preterm birth.

Keywords: hyperbinirubinemia, preterm neonates, developmental delays, preterm

Procedia PDF Downloads 134
217 Resource Assessment of Animal Dung for Power Generation: A Case Study

Authors: Gagandeep Kaur, Yadwinder Singh Brar, D. P. Kothari

Abstract:

The paper has an aggregate analysis of animal dung for converting it into renewable biomass fuel source that could be used to help the Indian state Punjab to meet rising power demand. In Punjab district Bathinda produces over 4567 tonnes of animal dung daily on a renewable basis. The biogas energy potential has been calculated using values for the daily per head animal dung production and total no. of large animals in Bathinda of Punjab. The 379540 no. of animals in district could produce nearly 116918 m3 /day of biogas as renewable energy. By converting this biogas into electric energy could produce 89.8 Gwh energy annually.

Keywords: livestock, animal dung, biogas, renewable energy

Procedia PDF Downloads 485
216 Evaluating the Performance of Color Constancy Algorithm

Authors: Damanjit Kaur, Avani Bhatia

Abstract:

Color constancy is significant for human vision since color is a pictorial cue that helps in solving different visions tasks such as tracking, object recognition, or categorization. Therefore, several computational methods have tried to simulate human color constancy abilities to stabilize machine color representations. Two different kinds of methods have been used, i.e., normalization and constancy. While color normalization creates a new representation of the image by canceling illuminant effects, color constancy directly estimates the color of the illuminant in order to map the image colors to a canonical version. Color constancy is the capability to determine colors of objects independent of the color of the light source. This research work studies the most of the well-known color constancy algorithms like white point and gray world.

Keywords: color constancy, gray world, white patch, modified white patch

Procedia PDF Downloads 285
215 Role of Water Supply in the Functioning of the MLDB Systems

Authors: Ramanpreet Kaur, Upasana Sharma

Abstract:

The purpose of this paper is to address the challenges faced by MLDB system at the piston foundry plant due to interruption in supply of water. For the MLDB system to work in Model, two sub-units must be connected to the robotic main unit. The system cannot function without robotics and water supply by the fan (WSF). Insufficient water supply is the cause of system failure. The system operates at top performance using two sub-units. If one sub-unit fails, the system capacity is reduced. Priority of repair is given to the main unit i.e. Robotic and WSF. To solve the problem, semi-Markov process and regenerative point technique are used. Relevant graphs are also included to particular case.

Keywords: MLDB system, robotic, semi-Markov process, regenerative point technique

Procedia PDF Downloads 42
214 Performance Analysis of ERA Using Fuzzy Logic in Wireless Sensor Network

Authors: Kamalpreet Kaur, Harjit Pal Singh, Vikas Khullar

Abstract:

In Wireless Sensor Network (WSN), the main limitation is generally inimitable energy consumption during processing of the sensor nodes. Cluster head (CH) election is one of the main issues that can reduce the energy consumption. Therefore, discovering energy saving routing protocol is the focused area for research. In this paper, fuzzy-based energy aware routing protocol is presented, which enhances the stability and network lifetime of the network. Fuzzy logic ensures the well-organized selection of CH by taking four linguistic variables that are concentration, energy, centrality, and distance to base station (BS). The results show that the proposed protocol shows better results in requisites of stability and throughput of the network.

Keywords: ERA, fuzzy logic, network model, WSN

Procedia PDF Downloads 234
213 Speckle Noise Reduction Using Anisotropic Filter Based on Wavelets

Authors: Kritika Bansal, Akwinder Kaur, Shruti Gujral

Abstract:

In this paper, the approach of denoising is solved by using a new hybrid technique which associates the different denoising methods. Wavelet thresholding and anisotropic diffusion filter are the two different filters in our hybrid techniques. The Wavelet thresholding removes the noise by removing the high frequency components with lesser edge preservation, whereas an anisotropic diffusion filters is based on partial differential equation, (PDE) to remove the speckle noise. This PDE approach is used to preserve the edges and provides better smoothing. So our new method proposes a combination of these two filtering methods which performs better results in terms of peak signal to noise ratio (PSNR), coefficient of correlation (COC) and equivalent no of looks (ENL).

Keywords: denoising, anisotropic diffusion filter, multiplicative noise, speckle, wavelets

Procedia PDF Downloads 485
212 Advanced Machine Learning Algorithm for Credit Card Fraud Detection

Authors: Manpreet Kaur

Abstract:

When legitimate credit card users are mistakenly labelled as fraudulent in numerous financial delated applications, there are numerous ethical problems. The innovative machine learning approach we have suggested in this research outperforms the current models and shows how to model a data set for credit card fraud detection while minimizing false positives. As a result, we advise using random forests as the best machine learning method for predicting and identifying credit card transaction fraud. The majority of victims of these fraudulent transactions were discovered to be credit card users over the age of 60, with a higher percentage of fraudulent transactions taking place between the specific hours.

Keywords: automated fraud detection, isolation forest method, local outlier factor, ML algorithm, credit card

Procedia PDF Downloads 78
211 Image Steganography Using Predictive Coding for Secure Transmission

Authors: Baljit Singh Khehra, Jagreeti Kaur

Abstract:

In this paper, steganographic strategy is used to hide the text file inside an image. To increase the storage limit, predictive coding is utilized to implant information. In the proposed plan, one can exchange secure information by means of predictive coding methodology. The predictive coding produces high stego-image. The pixels are utilized to insert mystery information in it. The proposed information concealing plan is powerful as contrasted with the existing methodologies. By applying this strategy, a provision helps clients to productively conceal the information. Entropy, standard deviation, mean square error and peak signal noise ratio are the parameters used to evaluate the proposed methodology. The results of proposed approach are quite promising.

Keywords: cryptography, steganography, reversible image, predictive coding

Procedia PDF Downloads 390
210 A Review: Artificial Intelligence (AI) Driven User Access Management and Identity Governance

Authors: Rupan Preet Kaur

Abstract:

This article reviewed the potential of artificial intelligence in the field of identity and access management (IAM) and identity governance and administration (IGA), the most critical pillars of any organization. The power of leveraging AI in the most complex and huge user base environment was outlined by simplifying and streamlining the user access approvals and re-certifications without any impact on the user productivity and at the same time strengthening the overall compliance of IAM landscape. Certain challenges encountered in the current state were detailed where majority of organizations are still lacking maturity in the data integrity aspect. Finally, this paper concluded that within the realm of possibility, users and application owners can reap the benefits of unified approach provided by AI to improve the user experience, improve overall efficiency, and strengthen the risk posture.

Keywords: artificial intelligence, machine learning, user access review, access approval

Procedia PDF Downloads 60
209 Purification and Characterization of Phycoerythrin from a Mesophilic Cyanobacterium Nostoc piscinale PUPCCC 405.17

Authors: Sandeep Kaur

Abstract:

Phycoerythrin (PE) from the mesophilic filamentous cyanobacterium Nostoc piscinale PUPCCC 405.17, a good producer of phycobiliproteins, has been characterized in terms of their unit assembly and stability. The phycoerythrin was extracted by freeze-thawing the cells in water, concentrated by ammonium sulphate fractionation and purified by anion exchange chromatography. The purification process resulted in 2.90 fold increase in phycoerythrin purity reaching to 1.54. Sodium Dodecyl Sulphate- Polyacrylamide Gel Electrophoresis of purified PE demonstrated three protein bands of 14.3, 27.54 and 39.81 kDa. The native PE also showed one band of 125.87 kDa, assumed to be a dimer (αβ)2γ based on results of non-denaturing PAGE. Lyophilized powder PE was more stable compared to phycoerythrin in the solution. The half-life of dry PE is 80 days when stored at 4 °C under dark. The phycoerythrin from this organism has potential applications in food as natural colour and as a fluorescent marker.

Keywords: characterization, Nostoc piscinale, phycoerythrin, purification

Procedia PDF Downloads 107