oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2018 ( 7 )

2017 ( 6 )

2016 ( 4 )

2015 ( 94 )

Custom range...

Search Results: 1 - 10 of 1089 matches for " Devesh Narayan "
All listed articles are free for downloading (OA Articles)
Page 1 /1089
Display every page Item
A Survey on Hidden Markov Model for Credit Card Fraud Detection
Anshul Singh,Devesh Narayan
International Journal of Engineering and Advanced Technology , 2012,
Abstract: Credit card frauds are increasing day by day regardless of the various techniques developed for its detection. Fraudsters are so expert that they engender new ways for committing fraudulent transactions each day which demands constant innovation for its detection techniques as well. Many techniques based on Artificial Intelligence, Data mining, Fuzzy logic, Machine learning, Sequence Alignment, decision tree, neural network, logistic regression, na ve Bayesian, Bayesian network, metalearning, Genetic Programming etc., has evolved in detecting various credit card fraudulent transactions. A steady indulgent on all these approaches will positively lead to an efficient credit card fraud detection system. This paper presents a survey of various techniques used in credit card fraud detection mechanisms and Hidden Markov Model (HMM) in detail. HMM categorizes card holder’s profile as low, medium and high spending based on their spending behavior in terms of amount. A set of probabilities for amount of transaction is being assigned to each cardholder. Amount of each incoming transaction is then matched with card owner’s category, if it justifies a predefined threshold value then the transaction is decided to be legitimate else declared as fraudulent.
Augmentation of Travelling Salesman Problem using Bee Colony Optimization
Anshul Singh,,Mr. Devesh Narayan
International Journal of Innovative Technology and Exploring Engineering , 2012,
Abstract: Animals with social behaviors often uncover optimal solutions to a range of problems when compared to other techniques. This advantage is extensively used nowadays for a variety of applications. The bee colony optimization (BCO) is inspired by bees foraging behavior that includes colonies of artificial bees capable of solving combinatorial optimization problems e.g. Travelling Salesman Problem. K-opt local search for the value of k as 3 repeatedly reconnects random three edges of the graph after disconnecting so as to obtain refined path. In this article BCO and k-opt local search, the two heuristic techniques for optimization, are combined together to acquire sophisticated results. Comparisons of the proposed method with nearest neighborhood approach is performed and shown with presented system proved to be superior to the rest.
Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks  [PDF]
Keyur Parmar, Devesh C. Jinwala
Journal of Information Security (JIS) , 2015, DOI: 10.4236/jis.2015.61005
Abstract: In wireless sensor networks, secure data aggregation protocols target the two major objectives, namely, security and en route aggregation. Although en route aggregation of reverse multi-cast traffic improves energy efficiency, it becomes a hindrance to end-to-end security. Concealed data aggregation protocols aim to preserve the end-to-end privacy of sensor readings while performing en route aggregation. However, the use of inherently malleable privacy homomorphism makes these protocols vulnerable to active attackers. In this paper, we propose an integrity and privacy preserving end-to-end secure data aggregation protocol. We use symmetric key-based homomorphic primitives to provide end-to-end privacy and end-to-end integrity of reverse multicast traffic. As sensor network has a non-replenishable energy supply, the use of symmetric key based homomorphic primitives improves the energy efficiency and increase the sensor network’s lifetime. We comparatively evaluate the performance of the proposed protocol to show its efficacy and efficiency in resource-constrained environments.
MEDICAL DEVIC E APPROVAL PROCESS IN JAPAN
Sharma Devesh
Journal of Drug Delivery and Therapeutics , 2011,
Abstract: The Ministry of Health, Labor and Welfare (MHLW or Koseirodosho in Japanese) is in charge of the pharmaceutical regulatory affairs in Japan. Formal approvals and licenses are required to marketing drugs in Japan which are obtained from the MHLW. Japan’s Pharmaceutical and Medical Devices Agency (PMDA) has set itself the challenging task of expediting patient access to novel therapies while ensuring these meet international standards of safety, efficacy and quality. One of the biggest hurdles for the government is the “drug lag” problem, whereby many new innovative medicinal drugs do not reach the Japanese market until several years after the United States (US) and Europe (EU). This delay is caused due to the obligation to perform clinical bridging studies in Japan hand since clinical data obtained in non-Japanese trials such as EU and US studies cannot solely be used to obtain market approval in Japan. Japan provides a public medical insurance system, which is carried on as a social insurance system covering all citizens. Through this insurance system, about 30% of the nation’s medical expenses are covered by public funds, and all prices for medicine, including medical compensation for doctors and prices for new drugs are substantially controlled by the Japanese government.
SITUATION ANALYSIS OF FLOOD DISASTER IN SOUTH AND SOUTHEAST ASIA – A NEED OF INTEGRATED APPROACH
Devesh Sharma
International Journal of Science, Environment and Technology , 2012,
Abstract:
Study on Graphene Based Next Generation Flexible Photodetector for Optical Communication  [PDF]
Kanishka Majumder, Devesh Barshilia, Subimal Majee
Graphene (Graphene) , 2018, DOI: 10.4236/graphene.2018.72002
Abstract:
We report on the efficient photodetection (PD) properties of graphene based p-i-n photodetector, where all the three layers are either single or multilayer graphene sheets. We report the bandwidth and responsivity performance of the device. This simple structure paves the way for the next generation flexible wireless communication systems. A theoretical model is used to study the carrier distribution and current in a graphene based p-i-n photodetector system.
The Major Physical Layer Constraints of Fiber Optical fiber Packet Switch Architectures
Devesh Pratap Singh
International Journal of Information Technology and Computer Science , 2013, DOI: 10.5815/ijitcs.2013.06.07
Abstract: Many optical packet switch (OPS) architectures are proposed and demonstrated. In the design of these architectures, most of the attention is paid on the network layer parameters like high through put (low packet loss probability) and low latency, etc. and to achieve these goals. The structure of the architectures becomes very complex. In real scenarios, these architectures may not work efficiently because of physical layer constraints. Hence, cross layer optimization needs to be considered. This paper addresses the major physical layer constraints, and it has been found that the optical packet switch architecture can work efficiently within the bounded regimes which can be called as an operation window.
Change in spectrum of dermatophytes isolated from superficial mycoses cases: First report from Central India
Sahai Sanjeev,Mishra Devesh
Indian Journal of Dermatology, Venereology and Leprology , 2011,
Abstract:
Formulation, Optimization and Evaluation of Floating Microspheres of Captopril
Devesh Kapoor,Rakesh Patel
Asian Journal of Biomedical and Pharmaceutical Sciences , 2012,
Abstract: The objective of the present study was to develop floating microspheres of Captopril in order to achieve an extended retention in the upper GIT which may enhance the absorption and improve the bioavailability. The microspheres were prepared by solvent evaporation method using different ratio of hydroxyl propyl methyl cellulose (HPMC K4M) with drug in the mixture dichloromethane and ethanol at ratio of (1:1), with tween80 as the surfactant. Differential Scanning Calorimeter (DSC) study shows that drug and other excipients are compatible with each other. The effects of polymers concentration on drug release profile were investigated. A 32 full factorial design was applied to systemically optimize the drug release profile. Polymer to drug ratio (X1) and stirring speed (X2) were selected as independent variables. The floating microspheres were characterized by and results obtained are % yield, particle size analysis, drug entrapment efficiency, buoyancy percentage, in-vitro drug release was studied for 12 hour and scanning electron microscopy. Accelerated stability study was also performed for three months indicated that optimized formulation was stable. The floating microspheres showed better result and it may be use full for prolong the drug release in stomach and improve the bioavailability.
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
Dhara Buch,Devesh Jinwala
International Journal of Network Security & Its Applications , 2011,
Abstract: Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, leadto the susceptibility to many kinds of security attacks. Sensors used for real time response capability alsomake it difficult to devise the resource intensive security protocols because of their limited battery, power,memory and processing capabilities. One of potent form of Denial of Service attacks is Wormhole attackthat affects on the network layer. In this paper, the techniques dealing with wormhole attack areinvestigated and an approach for wormhole prevention is proposed. Our approach is based on theanalysis of the two-hop neighbors forwarding Route Reply packet. To check the validity of the sender, aunique key between the individual sensor node and the base station is required to be generated bysuitable scheme.
Page 1 /1089
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.