Projectwale,Opp. DMCE,Airoli,sector 2
projectwale@gmail.com

Category: Machine Learning

final year projects for computer science

E-Commerce Chatbot

ABSTRACT: –   In today’s rapidly changing business environment, it is extremely important to be able to respond to clients’ needs in the most efficient and timely manner. If your customers want to see your business online and have instant access to your products or services, Online Shopping is a lifestyle e-commerce web application that…
Read more

Credit Card fraud Management System

ABSTRACT: –   With the age of digitization, there is an increased amount of usage of online trans- actions via credit cards and net banking options. With e-commerce services offered by most of the websites, credit cards have become a popular mode of payment. With the increase in credit card transactions, there has been a…
Read more

Network Attack detection using machine learning technique

ABSTRACT: –   As the Internet has evolved over time, so has the number of Internet-based attacks. A robust intrusion detection system (IDS) is necessary to ensure the protection of a network. A unique supervised machine learning system is developed to classify network traffic as malicious or benign. A combination of supervised learning algorithms and…
Read more

Fake currency detection

ABSTRACT: –   Machine learning techniques help in creating applications that support fake currency detection through automated systems and algorithms. Machine learning will use pattern recognition and image processing to analyze real-world characteristics. The goal of this work is to develop a paradigm that can be supervised using related set theory and can also be…
Read more

Internet Banking Fraud Detection Using HMM

ABSTRACT: –   Internet banking has their separate account for  customers and is controlled through Banks or retail stores. The purpose of this paper is to hit upon and save you from fraud in case of net banking the usage of Hidden Markov Model algorithm. At the same time, we have attempted to make sure…
Read more

Email Spam Detection

ABSTRACT: –   E-mail communication has grown in popularity in this internet age because it is inexpensive and simple to use for sending messages and sharing important information with others; however, spam messages frequently generate a large number of unwanted messages in users’ inboxes, wasting resources as well as valuable user time; therefore, it is…
Read more

Detecting Data Leaks via SQL Injection Prevention on an E-Commerce

ABSTRACT: –   All of us are surrounded by technology. So much information and millions of files are being shared all across the Internet over web applications. Online payments and Internet banking have also become so common recently. Web-based applications store crucial information from users in databases. The database in the backend is integrated with…
Read more

Customer segmentation with machine learning and k-means

ABSTRACT: –   In the process of designing and implementing an effective target-marketing strategy in the grocery retail industry, the importance of appropriate market segmentation is confirmed. In this industry, customer purchasing behavior needs to be acknowledged not only in specific products but also in the interactions among the whole range of products. As a…
Read more

DETECTING HIGH RISK TAXPAYERS USING DATA MINING TECHNIQUES

ABSTRACT:-              Taxpayer means as the name refers to a person or organization who wants to pay a specific amount or tax to the government on its income. Risk refers to loss of anything, but look at from the angle of government tax its a avoid of paying tax on time. Sometimes, On purpose…
Read more

A MACHINE LEARNING FRAMEWORK FOR DOMAIN GENERATION ALGORITHM (DGA) BASED MALWARE DETECTION

 ABSTRACT:- Attackers usually use a Command and Control (C2) server to manipulate the communication. In order to perform an attack, threat actors often employ a Domain Generation Algorithm (DGA), which can allow malware to communicate with C2 by generating a variety of network locations. Traditional malware control methods, such as blacklisting, are insufficient to handle…
Read more