scispace - formally typeset
Search or ask a question
Institution

Jaypee Institute of Information Technology

EducationNoida, Uttar Pradesh, India
About: Jaypee Institute of Information Technology is a education organization based out in Noida, Uttar Pradesh, India. It is known for research contribution in the topics: Computer science & Cluster analysis. The organization has 2136 authors who have published 3435 publications receiving 31458 citations. The organization is also known as: JIIT Noida.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors present analytical models for line impedance and the coupling coefficient in the presence of additional ground tracks, and use a variational analysis combined with the transverse transmission-line technique to model interconnect lines guarded by ground tracks.
Abstract: In this paper, we present analytical models for line impedance and the coupling coefficient in the presence of additional ground tracks. We use a variational analysis combined with the transverse transmission-line technique to model interconnect lines guarded by ground tracks. Using the proposed model, it would be possible for designers to reduce crosstalk in coupled lines and obtain desired line impedance, thereby ensuring optimum signal integrity. The results obtained are verified by full-wave simulations and measurements performed on a vector network analyzer. The proposed model may find applications in the design and analysis of high-speed interconnects.

21 citations

Proceedings ArticleDOI
20 Aug 2015
TL;DR: A novel framework for prediction of click fraud in mobile advertising which consists of feature selection using Recursive Feature Elimination (RFE) and classification through Hellinger Distance Decision Tree (HDDT).
Abstract: Click fraud represents a serious drain on advertising budgets and can seriously harm the viability of the internet advertising market. This paper proposes a novel framework for prediction of click fraud in mobile advertising which consists of feature selection using Recursive Feature Elimination (RFE) and classification through Hellinger Distance Decision Tree (HDDT).RFE is chosen for the feature selection as it has given better results as compared to wrapper approach when evaluated using different classifiers. HDDT is also selected as classifier to deal with class imbalance issue present in the data set. The efficiency of proposed framework is investigated on the data set provided by Buzzcity and compared with J48, Rep Tree, logitboost, and random forest. Results show that accuracy achieved by proposed framework is 64.07 % which is best as compared to existing methods under study.

20 citations

Book ChapterDOI
01 Jan 2020
TL;DR: This chapter focuses on the security issues arising out of online credit card usage and most common attributes and open datasets of credit card transactions have been compiled to provide a starting point for new researchers.
Abstract: With e-commerce becoming mainstream and a manifold increase in online transactions, security risks associated with these have become crucial concerns. In this chapter, we focus on the security issues arising out of online credit card usage. Literature in the last two and half decades has been reviewed to analyze the changing attack vectors and solution approaches to this problem. Most common attributes and open datasets of credit card transactions have been compiled to provide a starting point for new researchers. Existing fraud detection methods have been scrutinized for efficacy in addressing key challenges of fraud detection like real-time detection, concept drift, imbalanced datasets, and classifier adaptability. New directions in credit card fraud detection research have also been proposed.

20 citations

Journal ArticleDOI
TL;DR: In this article, a numerical solution for the steady mixed convection magnetohydrodynamic (MHD) flow of an electrically conducting micropolar fluid over a porous shrinking sheet is presented.
Abstract: This paper presents a numerical solution for the steady mixed convection magnetohydrodynamic (MHD) flow of an electrically conducting micropolar fluid over a porous shrinking sheet. The velocity of shrinking sheet and magnetic field are assumed to vary as power functions of the distance from the origin. A convective boundary condition is used rather than the customary conditions for temperature, i.e., constant surface temperature or constant heat flux. With the aid of similarity transformations, the governing partial differential equations are transformed into a system of nonlinear ordinary differential equations, which are solved numerically, using the variational finite element method (FEM). The influence of various emerging thermophysical parameters, namely suction parameter, convective heat transfer parameter, magnetic parameter and power index on velocity, microrotation and temperature functions is studied extensively and is shown graphically. Additionally the skin friction and rate of heat transfer, which provide an estimate of the surface shear stress and the rate of cooling of the surface, respectively, have also been computed for these parameters. Under the limiting case an analytical solution of the flow velocity is compared with the present numerical results. An excellent agreement between the two sets of solutions is observed. Also, in order to check the convergence of numerical solution, the calculations are carried out by reducing the mesh size. The present study finds applications in materials processing and demonstrates excellent stability and convergence characteristics for the variational FEM code.

20 citations

Proceedings Article
16 Mar 2016
TL;DR: A method of network intrusion detection system using key feature selection based on binary grey wolf optimization (GWO) and neural network classifier and the improved accuracy of proposed intrusion detection method with reduced feature set is proposed.
Abstract: Today's computing are network based computing. Intrusion security is one of the major challenges of such computing facilities that have to deal with every time without compromising the system performance. In practical, no such intrusion detection system is implemented that can guarantee hundred percent true detection of intrusion and threats. In this paper, we have proposed a method of network intrusion detection system using key feature selection based on binary grey wolf optimization (GWO) and neural network classifier. The proposed IDS can be installed on any strategic point of the network. By eliminating the insignificant features from dataset using GWO the size of dataset can be reduced hence reduction in training time of the classifier and storage for dataset. The simulation experiments with NSL-KDD dataset show the improved accuracy of proposed intrusion detection method with reduced feature set.

20 citations


Authors

Showing all 2176 results

NameH-indexPapersCitations
Sanjay Gupta9990235039
Mohsen Guizani79111031282
José M. Merigó5536110658
Ashish Goel502059941
Avinash C. Pandey453017576
Krishan Kumar352424059
Yogendra Kumar Gupta351834571
Nidhi Gupta352664786
Anirban Pathak332143508
Amanpreet Kaur323675713
Navneet Sharma312193069
Garima Sharma31973348
Manoj Kumar301082660
Rahul Sharma301893298
Ghanshyam Singh292632957
Network Information
Related Institutions (5)
Birla Institute of Technology and Science
13.9K papers, 170K citations

90% related

Indian Institute of Technology Roorkee
21.4K papers, 419.9K citations

89% related

Jadavpur University
27.6K papers, 422K citations

89% related

VIT University
24.4K papers, 261.8K citations

89% related

Indian Institute of Technology Guwahati
17.1K papers, 257.3K citations

88% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202321
202258
2021401
2020395
2019464
2018366