Institution
Jaypee Institute of Information Technology
Education•Noida, Uttar Pradesh, India•
About: Jaypee Institute of Information Technology is a education organization based out in Noida, Uttar Pradesh, India. It is known for research contribution in the topics: Computer science & Cluster analysis. The organization has 2136 authors who have published 3435 publications receiving 31458 citations. The organization is also known as: JIIT Noida.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this article, the authors present analytical models for line impedance and the coupling coefficient in the presence of additional ground tracks, and use a variational analysis combined with the transverse transmission-line technique to model interconnect lines guarded by ground tracks.
Abstract: In this paper, we present analytical models for line impedance and the coupling coefficient in the presence of additional ground tracks. We use a variational analysis combined with the transverse transmission-line technique to model interconnect lines guarded by ground tracks. Using the proposed model, it would be possible for designers to reduce crosstalk in coupled lines and obtain desired line impedance, thereby ensuring optimum signal integrity. The results obtained are verified by full-wave simulations and measurements performed on a vector network analyzer. The proposed model may find applications in the design and analysis of high-speed interconnects.
21 citations
••
20 Aug 2015TL;DR: A novel framework for prediction of click fraud in mobile advertising which consists of feature selection using Recursive Feature Elimination (RFE) and classification through Hellinger Distance Decision Tree (HDDT).
Abstract: Click fraud represents a serious drain on advertising budgets and can seriously harm the viability of the internet advertising market. This paper proposes a novel framework for prediction of click fraud in mobile advertising which consists of feature selection using Recursive Feature Elimination (RFE) and classification through Hellinger Distance Decision Tree (HDDT).RFE is chosen for the feature selection as it has given better results as compared to wrapper approach when evaluated using different classifiers. HDDT is also selected as classifier to deal with class imbalance issue present in the data set. The efficiency of proposed framework is investigated on the data set provided by Buzzcity and compared with J48, Rep Tree, logitboost, and random forest. Results show that accuracy achieved by proposed framework is 64.07 % which is best as compared to existing methods under study.
20 citations
••
01 Jan 2020TL;DR: This chapter focuses on the security issues arising out of online credit card usage and most common attributes and open datasets of credit card transactions have been compiled to provide a starting point for new researchers.
Abstract: With e-commerce becoming mainstream and a manifold increase in online transactions, security risks associated with these have become crucial concerns. In this chapter, we focus on the security issues arising out of online credit card usage. Literature in the last two and half decades has been reviewed to analyze the changing attack vectors and solution approaches to this problem. Most common attributes and open datasets of credit card transactions have been compiled to provide a starting point for new researchers. Existing fraud detection methods have been scrutinized for efficacy in addressing key challenges of fraud detection like real-time detection, concept drift, imbalanced datasets, and classifier adaptability. New directions in credit card fraud detection research have also been proposed.
20 citations
••
TL;DR: In this article, a numerical solution for the steady mixed convection magnetohydrodynamic (MHD) flow of an electrically conducting micropolar fluid over a porous shrinking sheet is presented.
Abstract: This paper presents a numerical solution for the steady mixed convection magnetohydrodynamic (MHD) flow of an electrically conducting micropolar fluid over a porous shrinking sheet. The velocity of shrinking sheet and magnetic field are assumed to vary as power functions of the distance from the origin. A convective boundary condition is used rather than the customary conditions for temperature, i.e., constant surface temperature or constant heat flux. With the aid of similarity transformations, the governing partial differential equations are transformed into a system of nonlinear ordinary differential equations, which are solved numerically, using the variational finite element method (FEM). The influence of various emerging thermophysical parameters, namely suction parameter, convective heat transfer parameter, magnetic parameter and power index on velocity, microrotation and temperature functions is studied extensively and is shown graphically. Additionally the skin friction and rate of heat transfer, which provide an estimate of the surface shear stress and the rate of cooling of the surface, respectively, have also been computed for these parameters. Under the limiting case an analytical solution of the flow velocity is compared with the present numerical results. An excellent agreement between the two sets of solutions is observed. Also, in order to check the convergence of numerical solution, the calculations are carried out by reducing the mesh size. The present study finds applications in materials processing and demonstrates excellent stability and convergence characteristics for the variational FEM code.
20 citations
•
16 Mar 2016TL;DR: A method of network intrusion detection system using key feature selection based on binary grey wolf optimization (GWO) and neural network classifier and the improved accuracy of proposed intrusion detection method with reduced feature set is proposed.
Abstract: Today's computing are network based computing. Intrusion security is one of the major challenges of such computing facilities that have to deal with every time without compromising the system performance. In practical, no such intrusion detection system is implemented that can guarantee hundred percent true detection of intrusion and threats. In this paper, we have proposed a method of network intrusion detection system using key feature selection based on binary grey wolf optimization (GWO) and neural network classifier. The proposed IDS can be installed on any strategic point of the network. By eliminating the insignificant features from dataset using GWO the size of dataset can be reduced hence reduction in training time of the classifier and storage for dataset. The simulation experiments with NSL-KDD dataset show the improved accuracy of proposed intrusion detection method with reduced feature set.
20 citations
Authors
Showing all 2176 results
Name | H-index | Papers | Citations |
---|---|---|---|
Sanjay Gupta | 99 | 902 | 35039 |
Mohsen Guizani | 79 | 1110 | 31282 |
José M. Merigó | 55 | 361 | 10658 |
Ashish Goel | 50 | 205 | 9941 |
Avinash C. Pandey | 45 | 301 | 7576 |
Krishan Kumar | 35 | 242 | 4059 |
Yogendra Kumar Gupta | 35 | 183 | 4571 |
Nidhi Gupta | 35 | 266 | 4786 |
Anirban Pathak | 33 | 214 | 3508 |
Amanpreet Kaur | 32 | 367 | 5713 |
Navneet Sharma | 31 | 219 | 3069 |
Garima Sharma | 31 | 97 | 3348 |
Manoj Kumar | 30 | 108 | 2660 |
Rahul Sharma | 30 | 189 | 3298 |
Ghanshyam Singh | 29 | 263 | 2957 |