Papers by Navneet Kashyap
Digital training kit is used for the design of combinational and sequential logic circuits. There... more Digital training kit is used for the design of combinational and sequential logic circuits. There are a number of sources which provide virtual digital training kit but there are issues with the sources. Mobile has more computing power than computer which makes mobile a better platform for such applications. To increase the efficiency of the application we will be using improved A* algorithm and to make the GUI simple for the end user to understand we will be dividing the screen into square grids and to decide the next grid we will use heuristic value. Keywords-(1)Digital training kit (2)Virtual digital training kit (3) Improved A* algorithm (4) Square grid (5) Heuristic value (6)Virtual system (7) mobile computing IJERTV8IS110216
International Journal of Applied Research on Information Technology and Computing, 2016
Enormous information is a term for huge information sets having extensive, more shifted and compl... more Enormous information is a term for huge information sets having extensive, more shifted and complex structure with the troubles of putting away, investigating and envisioning for further procedures or results. The procedure of exploration into gigantic measures of information to uncover concealed examples and mystery relationships named as large information investigation. These valuable data for organisations or associations with the assistance of increasing wealthier and more profound experiences are getting preference over the opposition. Consequently, huge information usage should be broken down and executed as precisely as could be expected under the circumstances. Huge data is another name given to a various field of information serious data in which the datasets are large to the point that they are hard to work with successfully. The term has been basically utilised as a part of two settings, first as an innovative test when managing information serious spaces, for example, high vitality material science, cosmology or web seek, and furthermore as a sociological issue when information about us is gathered and mined by organisations, for example, Facebook, Google, Mobile telephone organisations and Governments. The fixation is on the second issue from another point of view, to be specific how the client can pick up consciousness of the by and by important part Big Data that is freely accessible in the social web. The measure of client-produced media transferred to the web is extending quickly, and it is past the abilities of any human to filter through everything to see which media affects our protection. In light of an investigation of online networking in Flicker, Google Picasa, Facebook and Google+, protection suggestions and capability of the developing pattern of geo-labelled online networking are talked about. Finally, an idea with which clients can stay educated about which parts of the social Big Data is pertinent to them.
In the time of enormous information, information examination, business knowledge database adminis... more In the time of enormous information, information examination, business knowledge database administration assumes an imperative part from specialized business administration and exploration perspective. Over numerous decades, database administration has been a subject of dynamic examination. There are distinctive kind of database administration framework have been proposed over a time frame yet Relational Database Management System (RDBMS) is the one which has been most prevalently utilized as a part of scholastic examination and technical setup. As of late, Graphs databases recovered enthusiasm among the analysts for certain conspicuous reasons. A standout amongst the most critical explanations behind such an enthusiasm for a graph database is a result of the inalienable property of charts as a Graphs structure. Charts are available all around in the information structure, which speaks to the solid availability inside the information. The vast majority of the Graph database models a...
International Journal of Applied Research on Information Technology and Computing, 2016
We have explored new methodologies for regular graph-based pattern exploration in graph datasets ... more We have explored new methodologies for regular graph-based pattern exploration in graph datasets and studied a novel algorithm called gSpan (graph-based substructure pattern mining), which finds frequent substructures without candidate production. gSpan fabricates another lexicographic arrangement between diagrams and maps every chart to a kind smaller depth-first search (DFS) code as its standard label. Taking into account this lexico-realistic request, gSpan embraces the depth-First search approach to mine regular associated subgraphs efficiently. Our performance study demonstrates that gSpan significantly beats previous calculations, once in a while by a request of scale.
This survey paper measures up and outlines from almost all released technological and examine con... more This survey paper measures up and outlines from almost all released technological and examine content in intelligent fraud detection within the last 10 years. It characterizes the expert fraudster, formalizes the principle types of identified fraudulence, and provides the way of information confirmation gathered inside influenced commercial ventures. Contrasted with all related audits on misrepresentation recognition, this study covers a wonderful work more specialized articles and is the one and only, to the best of our insight, which proposes elective information and arrangements from related areas. Fraud detection includes checking the conduct of populaces of clients with a specific end goal to assess, identify, or stay away from undesirable conduct (Undesirable conduct is an expansive term including wrongdoing), interruption, and record defaulting. The objective of this paper is give complete investigation of various sorts of frauds and their discovery strategies.
Oriental journal of computer science and technology, Aug 20, 2016
Internet is the main tool for e-business. E-transaction is made faster by Internet. With the incr... more Internet is the main tool for e-business. E-transaction is made faster by Internet. With the increase of e-transaction internet fraud or e-business fraud is increasing. Credit fraud in the banking sector is a growing concern. Few sort of card (debit/credit) fraud is decreasing by providing detection and prevention system from banks and government. But card-not-present fraud losses are increasing at higher rate because of online transaction as there is no chance to use Chip and PIN as well as card is not used face-to-face. Card-not-present fraud losses are growing in an un-protective and un-detective way. This paper seeks to investigate the current debate regarding the fraud in the banking sector and vulnerabilities in online banking and to study some possible remedial actions to detect and prevent credit fraud. The research also reveals lots of channels of fraud in online banking which are increasing day by day. These kinds of fraud are the main barriers for the e-business in the banking sector. This paper devised a new approach for fraud detection in these sector with help of graph database & by matching pattern of previous frauds.
Uploads
Papers by Navneet Kashyap