فهرست مطالب

Journal of Advances in Computer Engineering and Technology
Volume:7 Issue: 3, Summer 2021

  • تاریخ انتشار: 1402/06/20
  • تعداد عناوین: 4
|
  • A Review of Fraud Detection Algorithms for Electronic Payment Card Transactions
    Touraj Banirostam *, Hamid Banirostam, MirMohsen Pedram, AmirMasoud Rahamni Pages 157-166

     Several studies have been presented to solve challenges of electronic card (e-card) fraud that the two main purposes of these studies are to identify types of e-card fraud and to investigate the methods used in bank fraud detection. To achieve this purpose, one of the most common methods of detecting fraud is to investigate suspicious changes in user behavior. Supervised learning techniques help to find anomalies by analyzing user behavioral history based on past transaction patterns in fraud detection systems. One of challenging issues in detecting fraud is to consider the change of customer behavior and the ability of fraudsters to devise new patterns of fraud, which makes unsupervised learning techniques popular for detecting unknown and new frauds. In this paper, the concepts of fraud, types of banking fraud along with their challenges, different form of fraud and banks' data research tools for early identification have been examined, then a review of the researches on fraud detection will be conducted. This paper aims to introduce fraud detection techniques and methods that have provided appropriate results in the big data environment. Finally, the fraud detection algorithms and proposed methods of related works presented in this paper, will be fully compared on a common dataset in terms of parameters such as speed of fraud detection, accuracy, and cost (hardware and network resources). Ensemble Meta-Learning can be used alone to build a stronger classifier. These techniques have been relatively successful in detecting fraud and reducing costs.

    Keywords: Accuracy, E-Card, Fraud Transaction, Supervised Algorithm, Unsupervised Algorithm
  • A Survey on Routing Protocols in Vehicular Ad hoc Network
    Elham Bozorgzadeh, Hamid Barati *, Ali Barati Pages 167-176
    Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) that have inherited some of this type of network's features. Due to road accidents, these networks are a promising technology to increase passengers' comfort and safety and increase road safety and provide traffic information. In vehicular ad hoc networks, it is challenging to design an efficient routing protocol for data routing in vehicles due to rapid topology changes and frequent disconnections. Applications in these fields require efficient routing protocols. The design of a routing protocol must be done both in terms of useful information dissemination and under the information dissemination environment's actual conditions. In this paper, we overview the existing VANET routing protocols; As there are different routing protocols in VANET, we need to do detailed research on various routing protocols and their strengths/weaknesses. The routing protocols essentially concentrate on delay, packet delivery magnitude relation, information measure utilization, and plenty of alternative factors. However, there are challenges to select a routing protocol to a dynamic topology and special characteristics of VANETs. VANET is extremely advantageous because it helps in up the road safety through reducing the amount of accidents by warning drivers regarding the danger before they really face it and different facilities to comfort drivers.
    Keywords: Vehicular ad hoc networks, routing, Safety, Mobile Ad hoc Networks
  • A New Model-based Bald Eagle Search Algorithm with Sine Cosine Algorithm for Data Clustering
    Farhad Soleimanian Gharehchopogh *, Berivan Rostampnah Pages 177-186

      Clustering is one of the most popular techniques in unsupervised learning in which data is divided into different groups without any prior knowledge, and for this reason, clustering is used in various applications today. One of the most popular algorithms in the field of clustering is the k-means clustering algorithm. The most critical weakness of k-means clustering is that it is sensitive to initial values for parameterization and may stop at local minima. Despite its many advantages, such as high speed and ease of implementation due to its dependence on the initial parameters, this algorithm is in the optimal local configuration and does not always produce the optimal answer for clustering. Therefore, this paper proposes a new model using the Bald Eagle Search (BES) Algorithm with the Sine Cosine Algorithm (SCA) for clustering. The evaluation of the proposed model is based on the number of iterations, convergence, number of generations, and execution time on 8 UCI datasets. The proposed model is compared with Flower Pollination Algorithm (FPA), Crow Search Algorithm (CSA), Particle Swarm Optimization (PSO), and Sine-Cosine Algorithm (SCA). The results show that the proposed model has a better fit compared to other algorithms. According to the analysis, it can be claimed that the proposed model is about 10.26% superior to other algorithms and also has an extraordinary advantage over k-means.

    Keywords: Clustering, Bald Eagle Search Algorithm, Sine-Cosine Algorithm, K-means
  • A Review of Anonymity Algorithms in Big Data
    Elham Shamsinejad, MirMohsen Pedram, AmirMasoud Rahamni, Touraj Banirostam * Pages 187-196

    By increasing access to high amounts of data through internet-based technologies such as social networks and mobile phones and electronic devices, many companies have considered the issues of accessing large, random and fast data along with maintaining data confidentiality. Therefore, confidentiality concerns and protection of specific data disclosure are one of the most challenging topics. In this paper, a variety of data anonymity methods, anonymity operators, the attacks that can endanger data anonymity and lead to the disclosure of sensitive data in the big data have been investigated. Also, different aspects of big data such as data sources, content format, data preparation, data processing and common data repositories will be discussed. Privacy attacks and contrastive techniques like k anonymity, neighborhood t and L diversity have been investigated and two main challenges to use k anonymity on big data will be identified, as well. Two main challenges to use k anonymity on big data will be identified. The first challenge of confidential attributes can also be as pseudo-identifier attributes, which increases the number of pseudo-identifier elements, and it may lead to the loss of great information to achieve k anonymity. The second challenge in big data is the unlimited number of data controllers are likely to lead to the disclosure of sensitive data through the independent publication of k anonymity. Then different anonymity algorithms will be presented and finally, the different parameters of time order and the consumable space of big data anonymity algorithms will be compared.

    Keywords: Big Data, Anonymity, Confidentiality Disclosure