{"title":"Enhancing Fraud Detection in Financial Transactions through Cyber Security Measures","authors":"Vishva Gandhi, Tirthesh Gajjar","doi":"10.32628/cseit2410281","DOIUrl":"https://doi.org/10.32628/cseit2410281","url":null,"abstract":"The digitization of financial systems has brought unprecedented convenience, but it has also increased fraud. This article explores the important intersection of cybersecurity and fraud detection in financial transactions. As the need to effectively combat fraud increases, he explores a variety of cybersecurity approaches and technologies. This article examines advanced technologies such as data mining, machine learning, biometric authentication, and blockchain through a comprehensive review of existing literature. It also highlights the challenges and limitations faced by modern fraud detection methodologies, including sophisticated cyberattacks and regulatory issues. By recognizing these challenges, stakeholders can work to implement holistic solutions that address both technical and regulatory aspects. Ultimately, the purpose of this document is to provide practical guidance for strengthening fraud detection capabilities, strengthening financial systems, and protecting consumer interests in the digital economy.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"3 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140681351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep SORT Related Studies","authors":"Abdul Majid, Qinbo Qinbo, Saba Brahmani","doi":"10.32628/cseit2410230","DOIUrl":"https://doi.org/10.32628/cseit2410230","url":null,"abstract":"Computer vision is the field of computer science in which computers are made capable to see and recognize like human being. Deep learning is using multiple layers for the purpose of understanding and recognizing various objects. Deep Simple Real Time Tracker is the area in which the objects are tracked in real time from multiple images and videos. Many researchers have contributed to the field and various algorithms have been proposed. The current study presents the deep SORT related studies in which the various algorithms have been presented for the sake of understanding and starting point for the researchers interested in computer vision and deep sorting. The single shot detection, feature extraction, have been explained along with the research conducted. Feature selection and extraction, matching recognition, object tracking through frames have been appended to the current study.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":" 29","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140685290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Breast Cancer Classification Using Machine Learning","authors":"Ankit, Harsh Bansal, Dhruva Arora, Kanak Soni, Rishita Chugh, Swarna Jaya Vardhan","doi":"10.32628/cseit2410274","DOIUrl":"https://doi.org/10.32628/cseit2410274","url":null,"abstract":"In the pursuit of precise forecasts in machine learning-based breast cancer categorization, a plethora of algorithms and optimizers have been explored. Convolutional Neural Networks (CNNs) have emerged as a prominent choice, excelling in discerning hierarchical representations in image data. This attribute renders them apt for tasks such as detecting malignant lesions in mammograms. Furthermore, the adaptability of CNN architectures enables customization tailored to specific datasets and objectives, enhancing early detection and treatment strategies. Despite the efficacy of screening mammography, the persistence of false positives and negatives poses challenges. Computer-Aided Design (CAD) software has shown promise, albeit early systems exhibited limited improvements. Recent strides in deep learning offer optimism for heightened accuracy, with studies demonstrating comparable performance to radiologists. Nonetheless, the detection of sub-clinical cancer remains arduous, primarily due to small tumor sizes. The amalgamation of fully annotated datasets with larger ones lacking Region of Interest (ROI) annotations is pivotal for training robust deep learning models. This review delves into recent high-throughput analyses of breast cancers, elucidating their implications for refining classification methodologies through deep learning. Furthermore, this research facilitates the prediction of whether cancer is benign or malignant, fostering advancements in diagnostic accuracy and patient care.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":" 47","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140684627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of AES and RSA with Other Encryption Techniques for Secure Communication","authors":"Prashant, MD Sohail Haque, Amrinder Kaur, Pankaj Yadav","doi":"10.32628/cseit2410263","DOIUrl":"https://doi.org/10.32628/cseit2410263","url":null,"abstract":"In today’s digitized era, where the whole world is interconnected and every information about individuals are collected, it is important to process and store the data such that it is safe from unauthorized access. Encryption is used to turn the plain text into cipher text which makes the data unreadable, thus maintaining its confidentiality and integrity. Among the several encryption methods available, Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) are popularly used due to their effectiveness and efficiency. However, alternative encryption techniques exist, each offers different level of security and performance. This study presents a thorough comparative analysis of AES and RSA alongside other encryption methods to assess their suitability for secure communication. Factors such as encryption strength, computational complexity, key management, scalability, and versatility are examined to provide a comprehensive understanding of each technique's strengths and weaknesses. By scrutinizing these aspects, this research aims to offer insights for decision-makers in selecting the most suitable encryption method tailored to specific requirements and constraints.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":" 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140684191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dr. Sandeep Tayal, Taniya Sharma, Shivansh Singhal, Anurag Thakur
{"title":"Resume Screening using Machine Learning","authors":"Dr. Sandeep Tayal, Taniya Sharma, Shivansh Singhal, Anurag Thakur","doi":"10.32628/cseit2410275","DOIUrl":"https://doi.org/10.32628/cseit2410275","url":null,"abstract":"This study explores the utilization of Machine Learning (ML) and Natural Language Processing (NLP) in automating the resume screening process. Traditional methods, often manual and subjective, fail to efficiently manage the volume and variety of resumes. By employing NLP techniques like named entity recognition and part-of-speech tagging, coupled with ML classifiers such as K-Nearest Neighbors and Support Vector Machines, we propose a system that enhances the precision of candidate selection while significantly reducing time and effort.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":" 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140683212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encryption, Privacy, and Usability : A Comparative Evaluation of Leading Secure Messaging Platforms","authors":"Kumar Ashish, Yaswanth Bolisetty, Deepanshu Singh, Amarinder Kaur","doi":"10.32628/cseit2410272","DOIUrl":"https://doi.org/10.32628/cseit2410272","url":null,"abstract":"This content provides an overview and analysis of popular messaging applications, focusing on encryption methods, security features, and usability. This work includes Signal, Telegram, WhatsApp, etc. By analyzing well-known platforms such as it evaluates usability and functionality while also evaluating their effectiveness in protecting user privacy. Key topics discussed include end-to-end encryption, encryption protocols, secure authentication methods, and preventing attacks such as man-in-the-middle and eavesdropping. Additionally, this content discusses issues and considerations related to secure messaging, including regulatory compliance, commercialization, and exchange cybersecurity threats. Combining current research and industry developments, it provides insight into the strengths and limitations of current messaging solutions as well as trending innovations in cryptography and privacy-enhancing techniques.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":" 40","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140687925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web of Things (IoT): Shrewd Living and Way of life","authors":"Vedanti Patel, Mansi Vegad","doi":"10.32628/cseit2410243","DOIUrl":"https://doi.org/10.32628/cseit2410243","url":null,"abstract":"In our everyday life we can see that innovation is advancing continually. The web of things (IoT) contains different applications and advancements that are accessible in brilliant homes, shrewd water system, and medical services. The IoT goes about as an extended variant of the web, which furnishes us with the information we really want to productively carry on with our lives more. It depends on interfacing up gadgets utilized every day. The fundamental goal of this paper is to figure out how to involve IoT in Brilliant Homes, Medical services, and Farming.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"88 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140707958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shreya Pandey, Afaq Shaikh, Siddhi Keni, Uma Garodiya, Ayush Yadav
{"title":"OneWorldGiving : Uniting NGO’s and Donors for a Better World","authors":"Shreya Pandey, Afaq Shaikh, Siddhi Keni, Uma Garodiya, Ayush Yadav","doi":"10.32628/cseit2410246","DOIUrl":"https://doi.org/10.32628/cseit2410246","url":null,"abstract":"\"OneWorldGiving: Uniting NGOs and donors for a Better World\" is a project aiming to bridge the gap between donors and NGOs in India's philanthropic scene. The initiative aims to create a platform that promotes efficiency, transparency, and cooperation, fostering shared responsibility and trust among all parties involved. Other studies have focused on cloud-based mobile applications, automation of donation procedures using Azure Logic Apps, Android app for receiving food, clothing, and book contributions, and mobile applications for community projects and NGOs. However, challenges such as platform-specific specifications, outdated devices, and specialist knowledge in Flutter programming may arise. The NGO Portal website aims to help NGOs and potential volunteers interact, promoting a sense of community and unity among stakeholders. The Android application focuses on making book contributions to NGOs easier, with a Donation Registration component, Firebase database, and User Management feature. The project aims to create a transformative platform that promotes cooperation, openness, and group compassion, improving lives for those in need. ","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"95 S4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140707278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jibin Joy, N Meenakshi, Thejas Vinodh,, Abel Thomas, Shifil S
{"title":"Translation System for Sign Language Learning","authors":"Jibin Joy, N Meenakshi, Thejas Vinodh,, Abel Thomas, Shifil S","doi":"10.32628/cseit2410257","DOIUrl":"https://doi.org/10.32628/cseit2410257","url":null,"abstract":"Sign language display software converts text/speech to animated sign language to support the special needs population, aiming to enhance communication comfort, health, and productivity. Advancements in technology, particularly computer systems, enable the development of innovative solutions to address the unique needs of individuals with special requirements, potentially enhancing their mental well-being. Using Python and NLP, a process has been devised to detect text and live speech, converting it into animated sign language in real-time. Blender is utilized for animation and video processing, while datasets and NLP are employed to train and convert text to animation. This project aims to cater to a diverse range of users across different countries where various sign languages are prevalent. By bridging the gap between linguistic and cultural differences, such software not only facilitates communication but also serves as an educational tool. Overall, it offers a cost-effective and widely applicable solution to promote inclusivity and accessibility.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"84 s1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140706961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Uma Goradiya, Naman Pandey, Mantasha Khan, Satyam Tiwari, Mandar Pawar
{"title":"SAKHII- Empowering Women with One-Tap Safety App","authors":"Uma Goradiya, Naman Pandey, Mantasha Khan, Satyam Tiwari, Mandar Pawar","doi":"10.32628/cseit2410254","DOIUrl":"https://doi.org/10.32628/cseit2410254","url":null,"abstract":"In India, numerous crimes targeting women occur daily. We are far from knowing the actual figures due to hundreds of cases that go unnoticed. Recognizing this pressing issue, the objective of this project is to develop a mobile application that can provide features of self-defense training techniques and emergency services access, such as locating the nearest police station, hospitals, bus stops, and pharmacies. It will include a list of emergency calling options to dial emergency numbers and real-time location sharing. When activated, the app will send the user's location every 3 minutes and enable them to share their location with the nearest police station and government bodies with just one tap in case of an emergency. This application is integrated with numerous features in one app, playing a pivotal role in women’s safety while providing a user-friendly experience.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"5 31","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140712392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}