Papers by Pawan Chaurasia
A Trailblazing Framework of Security Assessment for Traffic Data Management
Intelligent Automation & Soft Computing
Development of a System for Character Recognition, Graph Generation, and Autonomous Robot Control
Proceedings Of All India Seminar On Advances In Product Development (Apd-2006), 2006
In this paper, we present a new heuristic Graphical User Interface (GUI) incorporating Character ... more In this paper, we present a new heuristic Graphical User Interface (GUI) incorporating Character Recognition, Graph Generation and a computer guided user generated path tracking robot. In this GUI a new technique of Character Recognition (CR) has been implemented using stroke slope patterns (SSP) and number of break points in a user drawn input character. In this method the problem of stroke sequence has been overcome using a Relative Positioning System (RPS). The input is processed by an ...

Fortunately, we have entered in a world where most of the states of affairs are virtual. In this ... more Fortunately, we have entered in a world where most of the states of affairs are virtual. In this 21st century, the biggest mystery has solved. A big question about virtual currency got its answer. "A cryptocurrency or a virtual currency is a decentralized currency based on cryptography for security purposes, works as a digital medium of exchange." Blockchain is the backbone of decentralized currency. The modernity of blockchain technology changes the payment system. Bitcoin as a crypto-currency become more famous in the past years. Satoshi Nakamoto introduced Bitcoin to the world in 2008. There are some countries where crypto-currency like Bitcoin is used for specific purposes. To make a complete and robust network, hardware wallets, mining network and microcomputers are required for infrastructure of cryptocurrency. In this paper, we explained the working mechanism of crypto-currency. How it works when a transaction is requested by someone. Nodes of P2P network in which transaction is broadcasted, validates it and to fabricate a new block, the transaction is verified with another transaction. We will discuss the complete explanation of the working mechanism further. A probability is there to regulate the virtual currency in India so soon. The future of crypto-currency looks more promising due to increment in its users per year in India.

A Greater demands for fast and accurate user identification and authentication in electronic tran... more A Greater demands for fast and accurate user identification and authentication in electronic transaction increases day by day. Continuous development of technology, Security involvements are also increasing. ATM helps in a transaction of money any time & anywhere, faces the threat of attack, fraud, theft, etc., thus to deal with high security which provides safety to consumers, Authentication plays an important role. A new system approach for enhancing security and privacy in biometric applications like face detection, IRIS scan, fingerprint, voice, signature, etc. In this biometric system card-less operation done by biometric technology for operating ATMs. Proposed model provide high security in authentication which protects from illegal transactions. By this user required to authenticate him/her self with biometric identification and personal identification number. This proposed system is designed for illiterate, semi-literate and literate people. System decreases complexity with authentication as-you as Security‖ with high security. It reduces the problem of an excess number of plastic cards & saves environmental pollution. It saves time, cost, effort compared with a card-based system.
Financial fraud is an issue that has vast reaching consequences in both the finance industry and ... more Financial fraud is an issue that has vast reaching consequences in both the finance industry and daily life. Fraud can decrease confidence in industry, damage economy and affect people's life. In modern technology; such as internet, mobile computing led to growth in financial fraud in current years. Social factors such as distribution of credit cards has not only raise spending, but also resulted in a growth of fraud. This study was carried out to review financial fraud detection techniques of last one decade. The objective of this paper is to provide a systematic and comprehensive overview of fraud detection techniques.

Heart disease is one of the most fatal problems in the whole world, which cannot be seen with a n... more Heart disease is one of the most fatal problems in the whole world, which cannot be seen with a naked eye and comes instantly when its limitations are reached. Therefore, it needs accurate diagnosis at accurate time. Health care industry produced huge amount of data every day related to patients and diseases. However this data is not used efficiently by the researchers and practitioners. Today healthcare industry is rich in data however poor in knowledge. There are various data mining and machine learning techniques and tools available to extract effective knowledge from databases and to use this knowledge for more accurate diagnosis and decision making. Increasing research on heart disease predicting systems, it become significant to summarize the completely incomplete research on it. The main objective of this research paper is to summarize the recent research with comparative results that has been done on heart disease prediction and also make analytical conclusions. From the study, it is observed Naive Bayes with Genetic algorithm; Decision Trees and Artificial Neural Networks techniques improve the accuracy of the heart disease prediction system in different scenarios. In this paper commonly used data mining and machine learning techniques and their complexities are summarized.
Genetic algorithm is a powerful tool and wide class of global optimization methods. It belongs to... more Genetic algorithm is a powerful tool and wide class of global optimization methods. It belongs to the large class of evolutionary algorithm and an efficient way to get optimal solutions. There is a large class of optimization problems that are quite hard to solve by conventional optimization technique but genetic algorithm (GA) is very efficient in that case too. Genetic Algorithm is used to solve many real world problems, some applications are as automotive design, Robotics, Optimized Telecommunications Routing, Biometric invention, Trip-traffic and Shipment routing, Computer gaming, Gene expression profiting, Marketing and Merchandising, etc. The main goal of this work is to solve the telecommunication routing problem by using Genetic Algorithm.

Cloud computing implies to the delivery of information technology (IT) services which functions b... more Cloud computing implies to the delivery of information technology (IT) services which functions by retrieving the resources from the Internet; implementing various web-based tools and applications, in opposition to directly connecting to a server. In a nutshell, cloud computing works on the purpose of taking all the efforts involved in processing large quantities of data from the device carried around and moving that work to huge computer clusters far away in a virtual space. The internet becomes the virtual information space "THE CLOUD", and all the data, work and applications are available from any device which when connected to the internet, anywhere in the world accesses it. Cloud computing is the provisioning of business computing model and providing multifarious facilities over the internet. Data that are looked over by third parties or other person at various remote locations can be assessed by individuals and various other business organizations through Cloud Computing applications. A cloud environment is categorized into computing clouds and data clouds.Task scheduling is considered to be the core feature and plays an important role in maintaining the quality of service in the cloud computing environment. The application of genetic algorithm in cloud computing task scheduler environment is a topic gaining popularity in the recent years. But, achieving an efficient task scheduling methodology is a major attribute for harnessing the potential of cloud computing applications in an effective manner. The objective of this paper is to discuss the application of heuristic algorithms; the use of GAs to minimize the total scheduling time and execution cost of tasks improves task completion time and maximize resource utilization in cloud computing framework by a task scheduler genetic algorithm.
From last two decades, technology evolving very quickly and changed the view nearly all aspects o... more From last two decades, technology evolving very quickly and changed the view nearly all aspects of modern life. There is a lot of development made in the area of machine learning. It is the subset of Artificial Intelligence that gives machine the possibility to determine and make decision without using explicit instructions. Today, ML has a tremendous impact in across all over the world and benefited various areas like medical diagnostics, fraud detection, driverless vehicles and security surveillance etc. Machine learning layout an inspiring set of technologies that consist of pragmatic tools for reviewing data and making predictions with the latest headway in artificial intelligence. The major theme of the paper is focused on the various tools and techniques of machine learning and its application in healthcare industry.

The study aims to examine why healthcare firms are lagging behind other digital marketing sectors... more The study aims to examine why healthcare firms are lagging behind other digital marketing sectors. This was achieved using an abductive approach, while a literary assessment was undertaken early in the research, and the literature review was completed following the evaluation of the empirical data collection and analysis. The study is carried out in case study by a clinical research organization. Qualitative and quantitative techniques were used by interviews with SEO experts and interviews with business developers of healthcare companies. The quantitative section involves two data collecting activities, a survey of SEO specialists and workers from different firms and data collection of top volume and traffic keywords from branch colleagues. The result is that inadequate work is being conducted for healthcare companies and businesses in general inside digital marketing. Another inference was that, when it comes to digital marketing, the healthcare sector is lagging behind other sectors.

A heart attack also known as cardiac arrest, diversify various conditions impacting the heart and... more A heart attack also known as cardiac arrest, diversify various conditions impacting the heart and became one of the chief-reason for death worldwide over the last few decades. Approximately, 31% of total deaths globally are due to CVDs. It constitutes the pinnacle of chronic processes which involve complex interactions between risk factors which can and cannot be improved. Most of the instances or cases of cardiovascular diseases can be allocated to revisable risk factors where most of the instances are considered preventable. ML became the enhancing approach for the evolution of predictive models in health care industries and was decided to test various algorithms to check what extent their prediction scores estimate or ameliorate upon the results acquired. Researchers deploy various machine learning and data mining techniques over a set of enormous data of cardiovascular patients to attain the prediction for heart attacks before their occurrence for helping healthcare industries and professionals. This research comprises various Supervised ML classifiers like, Gradient Boosting, Decision Tree, Random Forest and Logistic Regression that have been used to deploy a model for Myocardial Infarction prediction. It uses the existing datasets from the Framingham database and others from the database of the UCI Heart repository. This research intends to ideate the prediction for probabilities of occurrence of a heart attack in the patients. These classifiers have been deployed in pipeline approach of machine learning to attain the prediction using both ways i.e., without optimizations and feature transformations as well as vice-versa. The results impersonate that the Gradient Boosting classifier is achieving the highest accuracy score in such a way that prediction used by our model is of binary form in where 1 means a chance of heart attack and 0 means no chance. Some of the most influential attributes are chest pain type among which the typical angina is the most influential and asymptotic chest pain is least, cholesterol level in which the level greater than 200mg/dl are more prone, increased heart rate, thal, and age. It is concluded that premature heart attack is preventable in 80% of the total cases just by using a healthy diet along with regular exercises and not using tobacco products also the person who drinks more than 5 glasses of water daily are less likely to develop attacks.

international journal of engineering trends and technology, 2014
From last two-three decades, the global market of industrial and electronic equipment is changed ... more From last two-three decades, the global market of industrial and electronic equipment is changed and continues to grow exponentially all over the world. With these grows, electrical and electronic waste management is growing in same manner. Developing countries face tremendous problem which are related to the generation and management of E-Waste which are either from import or export illegally. There are a large number of harmful materials which containing toxic substances that can have an adverse impact on health and the environment. It is the global problem; if it is not handled decently within time; then the global world is affected. In India, E-Waste management presumes the major problem. This problem is not only generated from its own E-Waste but also the import dumping materials from other developed countries. The purpose of this article is to focus the issues and impact of this emerging problem. It is also required to sharpen on private and government agencies to do needful s...
The present paper deals with a model design through Unified Modeling Language (UML) for a mobile ... more The present paper deals with a model design through Unified Modeling Language (UML) for a mobile based electricity bill deposit system. Due to complex life style of people this model is proposed in the form of UML Class, Sequence and Use Case diagrams. For implementation of proposed model, a real case study of Uttar Pradesh Electricity Bill deposit System is considered. By the use of this model, one can display the status of deposited electricity bill on a hand held mobile device system.

Software Reliability Chain Model Pawan Kumar Chaurasia Department of Information Technology, Baba... more Software Reliability Chain Model Pawan Kumar Chaurasia Department of Information Technology, Babasaheb Bhimrao Ambedkar University Lucknow (U.P), India _________________________________________________________________________________________ Abstract: Today most of the people depend on electronic devices or handheld devices. With rapid changes in hardware and software, it affects cost, size, complexity and features of system. Due to increase complexity, faults and failures also increase/decrease in a same manner. Various disaster and the accidents are the examples of failure software. Author focus on the causes of failure and try to build chain models for various error, fault and failure. Software reliability are used for different purposes: system reliability estimation during development, decision making, maintenance recommendation and proposed for new version. In this paper, author tried to collect all the information related to failure of the software and establish the various c...

A Machine Learning Approach for Heart Attack Prediction
International Journal of Engineering and Advanced Technology
A heart attack also known as cardiac arrest, diversify various conditions impacting the heart and... more A heart attack also known as cardiac arrest, diversify various conditions impacting the heart and became one of the chief-reason for death worldwide over the last few decades. Approximately, 31% of total deaths globally are due to CVDs. It constitutes the pinnacle of chronic processes which involve complex interactions between risk factors which can and cannot be improved. Most of the instances or cases of cardiovascular diseases can be allocated to revisable risk factors where most of the instances are considered preventable. ML became the enhancing approach for the evolution of predictive models in health care industries and was decided to test various algorithms to check what extent their prediction scores estimate or ameliorate upon the results acquired. Researchers deploy various machine learning and data mining techniques over a set of enormous data of cardiovascular patients to attain the prediction for heart attacks before their occurrence for helping healthcare industries a...

International Journal of Advanced Research in Computer Science
Reliability estimation framework for object oriented design has been developed in this paper. The... more Reliability estimation framework for object oriented design has been developed in this paper. The proposed framework relates the object oriented design constructs (Inheritance, Cohesion and Coupling) with design defect and the design defect correlates with the reliability of the object oriented design (OOD). The objective of framework is to implement relation between object oriented design constructs and design defect; object oriented design defect and reliability. Framework, quantify the values of object oriented design constructs and mitigate the defect of software design. Two models have been proposed: Reliability estimation model and rigidity estimation model. Rigidity estimation model has been proposed which focus on object oriented design constructs while reliability estimation model focus on rigidity defect mitigation for improving reliability of object oriented design.
Proposed Algorithm for Secured Transaction using 3-Tier Architecture
International Journal of Computer Sciences and Engineering

International Journal of Computer Applications
From last three decades various tools, techniques and methods are developed by researchers. The o... more From last three decades various tools, techniques and methods are developed by researchers. The objective of research is to optimize the error and improve the quality of the software. During development of software, various errors are introduced by the developer at various phases of software development life cycle (SDLC). It is difficult to identify all the errors of the software by the developer of different phases. Various methodologies are proposed and implemented by the researcher to identify the errors. The objective of this paper is to review and develop taxonomy of requirement errors, prepare a list of requirement errors for the analysis. Conclusions are listed on software requirement errors at last. The list of requirement errors may support the researchers to improve their work in a systematic way and classify all requirement errors to increase the software quality.
Journal of Global Research in Computer Science, Mar 11, 2014
Mutation testing is a fault based testing technique in which mutants are generated in the program... more Mutation testing is a fault based testing technique in which mutants are generated in the program and apply different test cases on the mutants. Some mutants are killed and some mutants are alive. On the base of killed and alive mutants, mutant score is calculated. Mutants are categorizing into weak, strong and firm mutants on the cost reduction methods. This paper is used to review the mutation testing and categorize the mutants and focus on cost reduction techniques.
Journal of Global Research in Computer Science, Sep 12, 2013
Technology is changed with the requirement of the user. There is a tremendous change in size, spe... more Technology is changed with the requirement of the user. There is a tremendous change in size, speed and structure of computer hardware and software. With these changes, complexity of computer system also increases with the time. As a result, different types of faults, bugs and failures has also increased in due coverage of time. Therefore, plenty of work has been done to test the failure using operational profile and numerous analysis software reliability models for estimating software reliability growth has been proposed. In order to assess their usability and importance, this paper does a critical review on the need and significance of a specifying operational and usage based modeling.
Uploads
Papers by Pawan Chaurasia