SlideShare a Scribd company logo
1 of 39
Download to read offline
ISSN: 1694-2507 (Print)
ISSN: 1694-2108 (Online)
International Journal of Computer Science
and Business Informatics
(IJCSBI.ORG)
VOL 17, NO 2
JULY-DECEMBER 2017
Table of Contents VOL 17, NO 2 JULY-DECEMBER 2017
An Adaptive and Real-Time Fraud Detection Algorithm in Online Transactions....................................1
Yiming WU, Siyong CAI
Agronomic Disaster Management using Artificial Intelligence - A Case Study.....................................13
M Sudha
Household Power Optimisation and Monitoring System ...................................................................23
John Batani, Silence Dzambo, Israel Magodi
IJCSBI.ORG
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 1
An Adaptive and Real-Time Fraud
Detection Algorithm in Online
Transactions
John Batani
ICT and Electronics Department
Chinhoyi University of Technology, P.Bag 7724, Chinhoyi, Zimbabwe
ABSTRACT
While the Internet has made it possible to transact electronically and ubiquitously, some
unscrupulous internet users have devised ways of defrauding e-commerce users. Several
solutions have been designed and deployed to try and curb fraud in electronic transactions,
but the news of fraud in e-commerce continues making the headlines globally. It is against
this background that the researcher was motivated to design an adaptive algorithm that can
detect credit card fraud as it occurs (real-time). The solution is based on the use of an
Artificial Neural Network, Hidden Markov Model and a One-Time Password. The
researcher used a synthesised dataset since a real dataset could not be found. The researcher
tested the algorithm, which produced 100 per cent fraud detection rate and 98 per cent
accuracy. The proposed solution can be made a plugin to e-commerce sites for the purposes
of detecting and preventing fraud. The researcher was motivated to undertake this study
after realising that while Zimbabwe is calling for the adoption of e-commerce due to the
prevailing cash crisis, some people still have reservations due to security concerns. Despite,
even in those countries where electronic commerce was adopted a long time ago, security is
still a concern among e-commerce participants. The designed algorithm has a learning
ability so that it can detect new fraud variations as they occur (real-time) and thus terminate
the transaction should it be considered a fraudulent one. The author seeks to restore and
instill confidence in people who transact online using credit cards.
Keywords
Fraud detection, Real-time fraud, Adaptive fraud, E-commerce security, Credit card.
1. INTRODUCTION
The Internet has undoubtedly revolutionized the way we do business today.
The increasing popularity of the Internet world over has seen the widespread
acceptance, usage and adoption of electronic commerce in which transacting
can occur without physical interaction, virtually from anywhere across the
globe. However, an upsurge in electronic transactions has presented an
opportunity for unscrupulous computer users to defraud unsuspecting
victims who transact online. Despite several fraud detection solutions
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 2
having been designed and deployed, cases of fraud in electronic transactions
continue making the headlines globally. This suggests that the current
solutions have some weaknesses that are being taken advantage of by
fraudsters. There is sort of an arms race between online fraudsters and those
engaged in designing anti-fraud solutions, hence the need to come up with
an adaptive solution that detects fraud in real time. A good strategy and the
main goal of banks and industries is timely information on fraudulent
activities [3].
.
1.1 The Research Problem
Despite several attempts having been made to curb online fraud, cases of
people being defrauded online continue making the headlines world over.
Notwithstanding the enormous growth in electronic transactions, there is a
lack of strong security to the high end [3]. The rise in Internet usage and an
upsurge in electronic transactions have seen an increase in cases of online
fraud despite significant efforts by card issuers, merchants and law
enforcement to curb the fraud. Since fraud perpetration techniques are
evolving as technology is evolving, there is a need to come up with an
adaptive solution that also has a capability of detecting fraud in real time.
An early detection of fraud is more significant in terms of cost analysis [3];
hence the need to have real time detection solution.
1.2 Purpose Of The Study
The purpose of this study is to understand the shortcomings of current
online fraud detection systems with the aim of designing and implementing
an adaptive, hybrid and real-time online fraud detection algorithm. The
algorithm should have a learning ability so that it can detect new fraud
variations as they occur and thus terminate the transaction should it be
considered a fraudulent one. The algorithm to be designed is supposed to
restore and instill confidence in people who transact online
1.3 Objectives Of The Study
This study seeks to:
1. design an adaptive fraud detection algorithm that can detect credit
card fraud in real time.
2. implement an adaptive fraud detection algorithm that can detect
fraud in real time.
2. RELATED WORKS
“Fraud can be defined as the illegal usage of any system or good” [2], while
the legal activities can correspondingly be termed legitimate. Therefore,
credit card fraud can be defined as the illegal usage of a credit card to
perform electronic transactions. Fraud detection is a complex computational
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 3
task and there is no system that surely predicts any transaction as fraudulent;
rather the systems predict the likelihood of a transaction being fraudulent
[1]. Basically, there are two types of credit card fraud, that is, counterfeit
fraud and the illegal use of a lost or stolen credit card [2]. Broadly, there are
four types of fraud, namely bankruptcy fraud, theft or counterfeit fraud,
application fraud and behavioural fraud [4]. Several fraud detection
techniques on electronic transactions have been designed, deployed and
applied by various researchers and organisations to reduce further damage
caused by fraud; however, people continue to be defrauded in spite of such
efforts having been made. Despite the existence of numerous fraud detection
technologies, it is not possible to detect fraud while the transaction is in
progress [3], that is, in real time. Some of the fraud detection techniques that
have been implemented include the Hidden Markov Model, decision trees,
neural networks, Bayesian networks and data mining techniques [9].
According to [1], several researches have been done with an emphasis on
data mining and neural networks. [5] applied unsupervised neural networks
in credit card fraud detection. The Hidden Markov Model has previously
been used in credit card fraud detection [10], thus it can be used for credit
card detection. [10] define Hidden Markov Model as a finite set of states,
each of which is associated with a probability distribution. The model only
shows the result and hides the state from the external viewer, thus the states
are „hidden‟ to the outside and hence the name Hidden Markov Model.
Bayesian Networks have also been used in an attempt to detect online fraud
[3]. According to [3], a Naïve Bayesian classifier is an influential
probabilistic method that makes use of class sequence from training class of
prospect instances. Other techniques that have been applied to fraud
detection include self-organizing maps (SOM), K-Nearest Neighbor [3],
Outlier Techniques [6] and also the Boat algorithm. However, regardless of
all such concerted efforts, the news of people being defrauded online
continues making the headlines. This therefore is suggestive that the current
solutions, regardless of them being numerous, have some shortcomings
which are being exploited by online fraudsters. This is therefore what has
prompted the researcher to consider this area as a possible research area.
3. METHODOLOGY
The researcher used the design science research methodology since the
research sought to come up with an artifact. For problem awareness, the
researcher performed document analysis and established that the problem
really exists. The researcher also searched for trends of online fraud in
different presses. Having understood the problem, the researcher proposed
to have a hybrid, adaptive and real-time fraud detection system for credit
card electronic transactions. The researcher then had a tentative design of
the system. The tentative design was then refined, an algorithm designed
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 4
and system development was undertaken. The system was evaluated for
performance using a test data set, the results of which are shown herein.
This research contributes to the detection of online credit card fraud
detection by proposing a solution that is adaptive and real-time. This is
essential as it ensures that fraud is detected as it happens rather than after the
transaction. Moreover, the use of neural networks ensures that the solution
is adaptive, thus keeping abreast with changes in the ways in which online
credit card fraud is perpetrated. This results in improved security of online
transactions, hence, restoring and boosting confidence of credit card users in
transacting electronically using their cards.
3.1 The Proposed Solution
The researcher designed a hybrid and adaptive fraud detection algorithm
that can detect fraud in real time. It has come out from literature that the
current solutions are not real time. Despite the existence of numerous fraud
detection technologies, it is not possible to detect fraud while the transaction
is in progress [3]. Therefore, the researcher designed an algorithm with the
capability of real time fraud detection. The researcher intends to make use
of neural networks, machine learning and other artificial intelligence
approaches in coming up with the intended solution.
3.2 The Flow Chart of the Proposed System
The user first has to be registered on the e-commerce site, and every time
they try to transact on the site, they are authenticated. After successful
authentication on the website, the user can then enter their credit card details
which will also be verified from the bank database. If the entered credit card
details are incorrect or do not exist, the transaction halts, otherwise it
proceeds. If the credit card details exist in the bank database and are correct,
the system generates a One-Time Password (OTP) which is sent to the
registered mobile number of the cardholder. The user is then prompted to
enter the received OTP and if it matches the sent OTP, then the system
extracts the user‟s social profile from the bank database. This social profile
comprises age, income, occupation, and cardholder‟s value of assets. These
social profile parameters will then be classified and assigned weights using
Artificial Neural Networks to generate the cardholder‟s social status. The
system then extracts credit card and bank transactions history and current
balance (financial profile) from the bank database for analysis using the
Hidden Markov Model (HMM). The HMM is used to generate the
cardholder‟s financial status. Bank transactions involve checking the
validity of the card, card holder‟s previous one-year transactions history,
and balance in the account. Credit card transactions history involves credit
card bill payments and spending patterns of the cardholder. The system uses
the cardholder‟s financial status, social status and OTP for fraud detection.
If authentication is successful (user login credentials, credit card details and
OTP) and the transaction has unique features compared to the cardholder‟s
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 5
credit card spending history patterns, the user‟s financial profile is updated
using ANNs and the transaction is processed. However, the transaction must
be within the spending limits of the credit cardholder as stipulated by their
bank. If the transaction has new features and exceeds the cardholder‟s
spending limits, it is flagged as fraudulent and terminated.
The continuous updating of the cardholder‟s financial profile through ANNs
makes the fraud detection system adaptive, while the use of OTP makes it a
real-time fraud detection system. Combining ANNs and the HMM makes
the system a hybrid solution.
Figure 1. System flow chart
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 6
3.3 Algorithm for the Proposed System
Let InT be incoming transaction, PrT be previous transactions and OTP be
one-time password, FrT be fraudulent transaction and LgT be legitimate
transaction
Steps
I. Receive login details
II. If login details are valid Then
a. Send OTP
b. Compare received OTP and sent OTP
i. If received OTP !=sent OTP Then
1. Terminate transaction and End
ii. Else
1. Accept credit card details
2. Authenticate credit card details
3. If credit card details are invalid Then
a. Terminate Transaction & flag it as
suspicious
4. Else
a. Extract cardholder‟s social profile
{name, age, gender, income,
occupation, value of assets}
b. If cardholder name or gender or age
!=user‟s name or gender or age Then
i. Terminate the transaction and
flag it as fraudulent
ii. End
c. Extract cardholder‟s financial profile
{card balance, card transactions
history, card bills history, card
payments history, credit limit}
d. If InT value > credit limit Then
i. Flag InT as fraudulent
ii. End
e. Classify social profile parameters
using ANNs and assign them weights
f. Analyse financial profile using HMM
to generate financial status
g. If InT has new features
i. Update cardholder‟s spending
patterns using ANNs
h. If InT resembles PrT Then
i. InT is LgT
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 7
ii. Commit InT to legitimate
transactions database
iii. LgT + =1
iv. Notify user and bank of the
transaction
v. End
i. Else
i. InT is fraudulent
ii. Record transaction as FrT
iii. FrT += 1
iv. Notify cardholder and bank
v. End
III. Else
a. Terminate transaction
IV. END
Neural Network Algorithm
Let:
InT be incoming transaction
LegT be legal transaction
FrT be fraudulent transaction
SusT be suspicious transaction
MaxOTP_Time be the maximum number of seconds within which a
user is supposed to enter an OTP
Time_Elapsed be time in seconds that has elapsed after an OTP has
been sent and before user has entered the corresponding OTP.
InT_Features{}be a set of features for incoming transaction for
customer
LegT_Features{} be a set of features for legal transaction for
customer
FrT_Features {} be a set of features for fraudulent transactions for
customer
NewFeatures{} be a set of new features from incoming transaction
that do not exist in the current dataset of legal transactions and
fraudulent transactions
Define Variables:
Threshold {user defined variable in the form of a percentage, which
is used to compare similarity between incoming Transaction and
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 8
legal transaction for each customer. It can be between 0 and 1
inclusive, or a percentage}
Step 1: Extract attributes of InT and store them in InT_Features{}
Step 2: Compare InT_Features{} and LegT_Features{}
If similarity >= threshold Then
InT is LegT
Else
InT is SusT
Suspend InT
Send OTP to cardholder‟s mobile number
If Time_Elapsed = MaxOTP_Time Then
InT is FrT
Extract new features from InT and update
FrT_Features{} for customer
Else
InT is LegT
Extract new features from InT and update
LegT_Features{} for customer
End If
End If
4. RESULTS
The results of the system were evaluated in terms of the extent to which it
correctly classified fraudulent transactions. In other words, the system was
mainly evaluated on fraud detection rate. The system was tested using
synthetically generated data since the researcher could not get a real dataset.
However, the data was synthesised in a way that it as much as possible
resembled a real dataset. Herein, a positive is a fraudulent transaction and
conversely, a negative is a legal transaction. Thus, a legal transaction that is
wrongly classified as fraudulent is a false positive; and a fraudulent
transaction that is misclassified as legal is a false negative. Therefore, legal
transactions that are correctly classified as legal are true negatives, and
fraudulent transactions that are correctly classified as fraudulent are true
positives. The system was thus evaluated in line with these parameters.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 9
Table 1. Training Results
No. of
Iterations
No.
of
Trans
action
s
No. of
False
Positiv
es
No. of
True
Positi
ves
No. of
False
Negati
ves
No. of
True
Negati
ves
No. of
Positiv
es
No. of
Negati
ves
50 50 2 25 0 23 25 25
100 50 0 25 0 25 25 25
150 50 1 25 0 24 25 25
Table 2. Testing Results
No. of
Transac
tions
No. of
False
Positives
No. of
True
Positive
s
No. of
False
Negative
s
No. of
True
Negatives
No. of
Positive
s
No. of
Negati
ves
50 1 25 0 24 25 25
From the testing results, the fraud detection rate can thus be calculated using
the formula:
=
=
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 10
Sensitivity is regarded as the most important measure of the effectiveness of
fraud detection systems [8]. This is because losses of money by defrauded
people are a result of fraud detection systems failing to detect fraud. While
this system‟s detection rate was perfect, it should be noted that its
perfectness depends on some factors. Firstly, the system is deployed to work
with electronic commerce transactions on which users are required to
register. The system blocks all transactions which are initiated by users
whose demographic details are different from the cardholder‟s as stored in
the bank‟s database. For a transaction to be successful, the registered details
on the website for the user must match with those for the cardholder, and the
initiator of the transaction must have the cardholder‟s mobile phone to
which an OTP will be sent. If all those conditions are met, a transaction will
sail through even if some of its features are not found in the legal
transactions set for that customer. The new features of an incoming
transaction will then be added to either the legal transactions or fraudulent
transactions features set for the customer, thus making the solution adaptive
or incremental since it has an ability to learn new features associated with
fraud.
The system does not only detect but also prevents fraud by prematurely
terminating any transaction should the user fail to enter the generated OTP
which is sent to their registered mobile phone number via Short Messaging
System (SMS). Consequently, it achieves both credit card detection and
prevention.
In comparison to other systems in existence, the proposed algorithm is
highly effective with 100 per cent fraud detection rate. According to [7], the
most effective credit card fraud detection system, which is the Dempster and
Shafer Theory and Bayesian Learning, has 98 per cent fraud detection rate.
Bayesian and Neural Network, Hidden Markov Model, and Hybridization
of BLAST-SSAHA have fraud detection rates of 77, 70 and 86 percent
respectively [7]. Consequently, the algorithm proposed herein stands out as
the best. In terms of accuracy, the proposed algorithm has a very high
accuracy of 98 per cent. However, [7] do not specify the numerical accuracy
of Dempster and Shafer Theory and Bayesian Learning; Bayesian and
Neural Network; Hidden Markov Model; and Hybridization of BLAST-
SSAHA but simply specify their accuracy as high, medium, medium and
high, respectively.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 11
5. CONCLUSIONS
The proposed solution to fraud detection puts more emphasis on ensuring
customer security in electronic transactions using credit cards. The strengths
of the proposed algorithm include a high accuracy of 98%, a high fraud
detection rate of 100%, ability to learn new fraud variations and new
customer spending patterns (adaptive), and ability to detect and prevent
fraud as it occurs (real-time). While the system has a high fool proof or
fraud detection rate, it should be noted that a customer cannot transact even
if they are the cardholder unless they have their registered mobile phone
number and have registered their details on the website just as they are
captured in the credit card issuer‟s database. The researcher‟s view is that
security matters more than convenience, hence one cannot transact without
their registered mobile number. An OTP is sent to a mobile phone via text
messaging and not by electronic mail (e-mail) since e-mail can be easily
hacked. The other reason for choosing to send an OTP via SMS was that a
recipient is not charged for receiving an SMS in the author‟s country of
residence. Prospective users of this algorithm may also decide to send an
OTP to an e-mail rather than via SMS. The effectiveness of the proposed
algorithm may be compromised if a criminal gets access to the legitimate
cardholder‟s registered phone number, and e-commerce website
authentication credentials.
REFERENCES
[1] Dheepa V. and Dhanapal R., "Analysis of Credit Card Fraud Detection Methods,"
International Journal of Recent Trends in Engineering, vol. 2, no. 3, pp. 126-128,
2009.
[2] Ekrem D. and Hamdi O.M, "Detecting credit card fraud by genetic algorithm and
scatter search," EXPERT SYSTEMS WITH APPLICATIONS, vol. 38, no. 10, pp.
13057-13063, 2011.
[3] Gayathri R. and Malathi A., "Investigation of Data Mining Techniques in Fraud
Detection: Credit Card," International Journal of Computer Applications, vol. 82, no.
9, pp. 12-15, 2013.
[4] Linda D., Hussein A., and Pointon J., "Credit card fraud and detection techniques: a
review," Banks and Bank Systems, vol. IV, no. 2, pp. 57-68, 2009.
[5] Ogwueleka F.N, "Data mining applications in credit card fraud credit card fraud
detection system," Journal of Engineering Science and Technology, vol. 6, no. 3, pp.
311-322, 2011.
[6] Rama K. K and Uma D. D., "Fraud Detection of Credit Card Payment System by
Genetic Algorithm," International Journal of Scientific & Engineering Research, vol.
3, no. 7, pp. 1-6, 2012.
[7] Rana P.J and Baria J., "A Survey on Fraud Detection Techniques in Ecommerce,"
International Journal of Computer Applications, pp. 5-7, 2015.
[8] Seeja K.R and Zareapoor M., "FraudMiner: A Novel Credit Card Fraud Detection
Model Based on Frequent Itemset Mining," Scientific World Journal, vol. 2014, 2014.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 12
[9] Sharma A. and Panigrahi P.K, "A review of financial accounting fraud detection based
on data mining techniques," International Journal of Computer Applications, vol. 39,
no. 1, pp. 37-47, 2012.
[10] Singh A. and Narayan D., "A Survey on Hidden Markov Model for Credit Card Fraud
Detection," International Journal of Engineering and Advanced Technology, vol. 1,
no. 3, pp. 49-52, 2012.
This paper may be cited as:
Batani, J. 2017. An Adaptive and Real-Time Fraud Detection Algorithm in
Online Transactions. International Journal of Computer Science and
Business Informatics, Vol. 17, No. 2, pp. 1-12.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 13
Agronomic Disaster Management
using Artificial Intelligence -
A Case Study
M. Sudha
Associate Professor
School of Information Technology and Engineering
VIT - India
ABSTRACT
Artificial Intelligence has become an essential tool in various hydrological data-driven
forecast scenarios. The existing needs of farm management activities have witnessed the
necessity of an intelligent decision support for strategic planning and implementation. This
case study reports the benefits of application of neural network based short range
precipitation prediction model in agronomic disaster management (ADM). This
investigation describes the benefits of data-driven decision support systems for agronomic
sustainability. Neural Network Architecture emerged recently have heterogeneous network
design thereby suits for solving complex problems. The methodical evaluation conducted
on agronomic disaster management framework designed using rough, genetic and neuro
computing approach reported peak prediction accuracy of 97.21 % while the learning rate
of the network was set to 0.7 for a fixed momentum of 0.5 producing a nominal error rate
of 02.79%.
Keywords
Artificial intelligence, Agronomic disaster management, Daily precipitation prediction,
Data-driven computing.
1. INTRODUCTION
As a recent trend rapid proliferation of computers and developments in the
area of information technology has increased the applications of
computational intelligence in meteorological aspects. Computational
intelligence approach has exposed a significant amendment in the
advancement of new hybrid data-driven techniques in modeling the wide
range of weather data [1], [2], [3] and [4]. Data-driven models are simple to
understand and require no prior experience or expertise. Decision making is
an execution of an activity that is more or less a human quest. A decision
support system is a computer-based information system that help decision
maker to deal with the problems through direct interaction with data and
analysis model [5]. Soft computing approaches incorporate efficient
computational methodologies stimulated by intrinsic vagueness, intuition
and acquaintance of rational thinking and real world uncertainty. The
intelligent systems designed to handle uncertainty in real life problems
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 14
usually make use of rough set theory, neural network, evolutionary
algorithms, and fuzzy sets approaches [6] and [7] Fuzziness and uncertainty
exist almost everywhere, it is inevitable in atmospheric dynamics.
2. RELATED WORKS
A systematic review was conducted to assess the applicability of data
mining, artificial neural network, fuzzy inference system and evolutionary
approaches in the modeling hydrological forecast. The review of the
presented literature revealed that more often than rare the models have
shown average performance in modeling hydrological predictions when
compared with techniques that employ the concept of assimilating one or
more intelligent approaches. From the following detailed review, it is clear
that there is a necessity of much better hybrid soft computing approach
which can handle weather parameters more intelligently rather than a black
box model. In [8] it has been reported ANN as a superior method for
modeling precipitation forecast scenarios. In [9], ANN has been applied for
modeling daily precipitation forecasting in the Mashhad synoptic station.
In [10] they have applied ANNs to predict the month wise maximum
precipitation, minimum precipitation, average and total cumulative
precipitation during a period of the next four consecutive months. [11]
compared the performance of General Regression Neural Network (GRNN),
ensemble neural network, BPNN, Radial Basis Function Network (RBFN),
GA, MLP and fuzzy clustering for precipitation prediction. [12] applied
ANN models and decision tree algorithm to forecast maximum temperature,
precipitation, evaporation and wind speed at Ibadan city located in Nigeria.
The results concluded ANN as a suitable tool for meteorological
predictions. ANN and Fuzzy Logic (FL) algorithm for forecasting the
stream-flow for the catchment of Savitri River Basin using 20 years (1992–
2011) precipitation and other hydrological data. While comparing both
ANN and FL algorithms the investigation and empirical results reported that
for prediction of hydrological scenarios ANN performance is quite superior
to FL[8].
Assimilating the features of ANN and FIS has attracted the rising attention
of researchers due to the growing requisite of adaptive intelligent systems to
solve the real world requirements [13]. [14] ANFIS models are widely used
in modeling daily precipitation prediction. [15] Developed a Modified
ANFIS for modeling the nonlinear dynamic characteristics of precipitation
events at the Klang River basin; Malaysia. [16] developed two different
models for forecasting weather at two separate regions, Amman airport and
Taipei, China using artificial neural networks and fuzzy logic. The
prediction accuracy achieved by proposed models was satisfactory. [17]
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 15
stated that ANFIS based models developed were configured and evaluated
for six major dams of South Korea having high, medium and low reservoir
capacity. The results showed significant improvement for categorical
precipitation forecast using ANFIS. [18] applied ANFIS for forecasting
drought, the quantitative value of drought indices and the Standardized
Precipitation Index (SPI).
In [6], a neuro-fuzzy model was developed to predict the monthly
precipitation of the Daejeon Station in Korea. Choubin et al. (2014)
developed a neuro-fuzzy model to forecast annual drought conditions in the
Maharlu-Bakhtegan watershed, located in Iran. The study reported neuro-
fuzzy model as a suitable method to analyze the influence of independent
variables on dependent variables in hydrological applications. An ANFIS
model has been applied to forecast of the groundwater level of Bastam Plain
in Iran [19]. [20] Developed ANFIS for modeling long-term streamflow
forecasting in Dez basin, Iran. The results reported ANFIS as a suitable
method for streamflow forecasting, and K-fold cross validation method
could increase the model reliability. [14] Reinstated that the performance of
fuzzy inference system and artificial neural network based soft computing
techniques are better than the L-moments approach used for flood
forecasting. [21] Stated that ANFIS perform groundwater level prediction
more accurately when compared to artificial neural networks and Bayesian
neural networks.
3. CASE STUDY REGION
Western-Ghats region of Tamil Nadu State (Coimbatore zone) in India is the
case study region for the assessment of precipitation prediction. This region
serves as Manchester of South India lying in the extreme western part of
Tamil Nadu This district’s total area covers 746,800 hectares, and 43% of
the region is bound to agricultural cultivation. The cotton, sugarcane, peanut
sorghum, maize, rice, and pulses are the primary crops in this area. The
study region is one of the most important agricultural and industrial areas in
the country. Fast and independent industrial development projects have
caused climatological changes in past years, hence raised necessity to
conduct the assessment of factors influencing the current weather prediction.
4. MATERIALS AND METHODS
The day wise observatory record of eight atmospheric parameters for
precipitation prediction, measured in millimeter (mm), for 29 years from
1984 to 2013. The target sample data set used as input for this study is
represented in Table 1, the dataset having 10,000 records with no missing
values and outliers after pre-processing phase is subject to experimental
evaluation. The decision attribute (Pp) is a binary decision variable, Pp =
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 16
‘no’ denotes no precipitation (rainfall) otherwise if Pp = ‘yes’ indicates
precipitation (rainfall) occurrences. The parameter's values are recorded in
an observatory in the daily basis as per the standard norms.
Table 1. Observatory weather Dataset
Observatory weather
parameters
Units Data type Data
range
Maximum temperature (Max) Celsius Float 27 - 398
Minimum temperature (Min) Celsius Float 2 - 335
Relative humidity 1 (Rh1) Percentage Float 5 - 100
Relative humidity 2 (Rh2) Percentage Float 1- 99
Wind speed (Ws) Km/hrs Float 01 - 227
Solar radiation (Sr) KCalories Float 24-688
Sunshine (Ss) Hrs Float 01-98
Evapotranspiration (Evp) mm Float 01-75
Precipitation prediction (Pp) mm Categorical Yes/no
5. AGRONOMIC DISASTER MANAGEMENT MODEL
The sequentially hybridized artificial intelligence centered precipitation
prediction model consists of input assessment, model training and testing
phase. The model output enable the framing decisions such harvesting,
sowing seeds, spraying pesticides or fertilizers to crops in the cultivated
regions and other decisions such as storage, sale etc. Henceforth this model
is referred as an agronomic disaster management model. A farmer is assisted
to make a strategic decision on the farming activities such as harvesting
early before damage if there is heavy precipitation in the next one or two
days. Similarly farmers can plan for spraying the fertilizers ahead or in later
time based on the environmental factor owing to precipitation.
This decision support system modelled for agronomic disaster management
is mainly designed based on data-driven modeling concept using rough sets
based evolutionary computing and the three layered multi-layered back-
propagation system. The learner is subject to learn the environment during
the training process from the target input and evaluated with set of test data.
The training algorithm uses sigmoid transfer function which is a well-
known suitable neural network activation function. The input data can be
one of the factors that may influence the output of the architecture.
Subsequently, a multi-layered back-propagation multi-layered algorithm
[22] is employed to train the ADM model in more effective way.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 17
The pseudocode of the multi-layered back-propagation algorithm is as
below:
1. Begin
2. Initialize with randomly chosen weights and biases in network;
3. while error is above the threshold, do
4. for each training tuple X in W
5. {
6. for each input layer unit k
7. {
8. for each hidden or output layer unit k
9. {
10.
11. //compute the net input of unit k through previous layer, i
12. for each unit k in the output layer
13. 𝐸𝑟𝑟𝑗 = 𝑂𝑘(1 − 𝑂𝑘) (𝑇𝑘 − 𝑂𝑘)
14. 𝐸𝑟𝑟𝑗 = 𝑂𝑘(1 − 𝑂𝑘) 𝛴𝑗 𝐸𝑟𝑟𝑗 𝑊𝑘𝑗
15. for each weight in network "n"
16. △ 𝑊𝑖𝑘 = (𝑙)𝐸𝑟𝑟𝑘𝑂𝑖)
17. // weight increment
18.
19. // weight update
20. for each bias in network "n"
21.
22. // bias increment
23.
24. } // bias update
25. } }
The proposed system is developed and implemented using Microsoft
NET framework and its process flow is shown in Fig. 2. It consists of
feature reduction stage, training and testing phase. The target data in the
input for selection stage then the proposed system has been trained by
reducts dataset generated using the proposed technique. The complexity of
training the network for given |D| tuples and w weights, each epoch requires
O (|D| x w) time [22].
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 18
Figure 1. Flow design of Agronomic Disaster Management model
5. RESULTS
The learning rate and momentum are set for approximately suitable random
value and adjusted according to attain the desired output. From this
methodical evaluation, the learning rate and momentum is fixed as 0.7 and
0.5 as in Table 2. The comparative evaluation of the various models under
this investigation as projected in Table 3 and Figure 2 evidently reports that
the prediction techniques have substantial improved when trained after
feature reduction and the proposed model acquired high accuracy. The
classification models used for training have shown better results when
trained using the selected list of observatory parameters. The proposed
model outperformed the existing approaches by reporting a nominal error
rate of 2.71 % when compared to other existing classification algorithms.
Random-forest classifier has reported low accuracy of 81.07 % with an
error rate of 19.93 % and revealed the limitation of adopting this classifier
in modeling real-time forecasting. Also, some hidden inferences such has
Task relevant input
data
(1) BP- Perceptron model
(2) Evolutionary Computing
(3) Fuzzy Rule based model
If Accuracy
attained ≥ Peak
accuracy
Obtained error ≤ Desired
error
Yes
Attained Prediction
Accuracy
No
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 19
any classification model utilizing artificial intelligence exhibits better
optimization potential when compared to other learning methods. The
learning potential of a neural network and the benefit of error propagation
strategy of the multi-layered back-propagation learning algorithm have
enabled to attain the desired accuracy. The predictive models were judged
statistically using the percent error of prediction and prediction yields. The
experimental assessment revealed the potential of AI centered precipitation
prediction model for harvesting, sowing seeds, spraying pesticides or
fertilizers to crops over other existing prediction models.
Table 2. Performance evaluation of proposed system for adaptable learning rate
Learning
Rate
Momentum Accuracy
rate
Error
rate
0.1 0.5 93.67% 6.32 %
0.5 0.5 94.17% 5.82%
0.7 0.5 97.21% 2.79%
Table 3. Performance evaluation of Data-driven AMD vs existing models
Parameter Selection Prediction Models Software Accuracy
Exhaustive-forward
selection search
Random-forest
classifier
Weka-tool 81.07 %
Information gain Fuzzy-unordered-
rule-induction
Weka-tool 84.97 %
PSO Bayesian-network
classifier
Weka-tool 89.75 %
Attribute weighting Fuzzy-neural
classifier
Weka-tool 91.79 %
Relative fitness function Proposed -ADM RSES2.0
.NET
97.21
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 20
Figure 2. Precipitation prediction accuracy optimization report
6. CONCLUSIONS
Modeling user interactive agronomic disaster management model to support
farming activities such as harvesting, sowing seeds, spraying patricides or
fertilizer’s to crops utilizing real-time weather data is the primary concern of
this research. Many intelligent techniques are employed in modeling
precipitation forecast scenario. However, most of the techniques are not
dealing with qualitative data. Therefore, this research has evolved input
selection methods that could remove the superfluous parameter. Besides
this, an efficient data-driven intelligent system is designed assimilating
rough set based evolutionary computing and neural network to attain
optimal prediction accuracy. Also, the limitations of the existing data
mining models and the benefits of intelligent techniques in modeling
weather forecast scenario has been reported based on the experimental
outcomes. The proposed ADM achieved an optimal prediction accuracy of
97.21 % with the nominal error rate of 02.79%. The research attained the
intent of developing an ADM with interactive user interface to enable
operators to make regional prediction to support farming decisions.
81.07
84.97
89.75
91.79
97.21
70
75
80
85
90
95
100
Attained Prediction Accuracy (%)
Accuracy (%)
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 21
REFERENCES
[1] Malik, A. and Kumar, A., 2015. Pan evaporation simulation based on daily
meteorological data using soft computing techniques and multiple linear regression.
Water resources management, 29(6), pp.1859-1872.
[2] Sudha, M. and Subbu, K., 2017. Statistical Feature Ranking and Fuzzy Supervised
Learning Approach in Modeling Regional Rainfall Prediction Systems. AGRIS On-line
Papers in Economics and Informatics, 9(2), p.117.
[3] Sudha, M., 2017. Intelligent decision support system based on rough set and fuzzy
logic approach for efficacious precipitation forecast. Decision Science Letters, 6(1),
pp.95-106.
[4] Mohankumar, S. and Balasubramanian, V., 2016. Identifying Effective Features and
Classifiers for Short Term Rainfall Forecast Using Rough Sets Maximum Frequency
Weighted Feature Reduction Technique. CIT. Journal of Computing and Information
Technology, 24(2), pp.181-194.
[5] Sprague Jr, R.H. and Watson, H.J., 1996. Decision support for management. Prentice-
Hall, Inc..
[6] Jeong, C., Shin, J.Y., Kim, T. and Heo, J.H., 2012. Monthly precipitation forecasting
with a neuro-fuzzy model. Water resources management, 26(15), pp.4467-4483.
[7] Pant, L.M. and Ganju, A., 2004. Fuzzy rule-based system for prediction of direct action
avalanches. Current science, 87(1), pp.99-104.
[8] Kothari, M. and Gharde, K.D., 2015. Application of ANN and fuzzy logic algorithms
for streamflow modelling of Savitri catchment. Journal of Earth System Science,
124(5), pp.933-943.
[9] Khalili, N., Khodashenas, S.R., Davary, K., Baygi, M.M. and Karimaldini, F., 2016.
Prediction of rainfall using artificial neural networks for synoptic station of Mashhad: a
case study. Arabian Journal of Geosciences, 9(13), p.624.
[10]Moustris, K.P., Larissi, I.K., Nastos, P.T. and Paliatsos, A.G., 2011. Precipitation
forecast using artificial neural networks in specific regions of Greece. Water resources
management, 25(8), pp.1979-1993.
[11]Narvekar, M. and Fargose, P., 2015. Daily weather forecasting using artificial neural
network. International Journal of Computer Applications, 121(22).
[12]Olaiya, F. and Adeyemo, A.B., 2012. Application of data mining techniques in weather
prediction and climate change studies. International Journal of Information
Engineering and Electronic Business, 4(1), p.51.
[13]Abraham, A., 2001. Neuro fuzzy systems: State-of-the-art modeling techniques.
Connectionist models of neurons, learning processes, and artificial intelligence,
pp.269-276.
[14]Kumar, R., Goel, N.K., Chatterjee, C. and Nayak, P.C., 2015. Regional flood
frequency analysis using soft computing techniques. Water resources management,
29(6), pp.1965-1978.
[15]Akrami, S.A., El-Shafie, A. and Jaafar, O., 2013. Improving rainfall forecasting
efficiency using modified adaptive Neuro-Fuzzy Inference System (MANFIS). Water
resources management, 27(9), pp.3507-3523.
[16]Al-Matarneh, L., Sheta, A., Bani-Ahmad, S., Alshaer, J. and Al-oqily, I., 2014.
Development of temperature-based weather forecasting models using neural networks
and fuzzy logic. International journal of multimedia and ubiquitous engineering,
9(12), pp.343-366.
[17]Awan, J.A. and Bae, D.H., 2014. Improving ANFIS based model for long-term dam
inflow prediction by incorporating monthly rainfall forecasts. Water resources
management, 28(5), pp.1185-1199.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 22
[18]Bacanli, U.G., Firat, M. and Dikbas, F., 2009. Adaptive neuro-fuzzy inference system
for drought forecasting. Stochastic Environmental Research and Risk Assessment,
23(8), pp.1143-1154.
[19]Emamgholizadeh, S., Moslemi, K. and Karami, G., 2014. Prediction the groundwater
level of Bastam plain (Iran) by artificial neural network (ANN) and adaptive neuro-
fuzzy inference system (ANFIS). Water resources management, 28(15), pp.5433-5446.
[20]Esmaeelzadeh, S.R., Adib, A. and Alahdin, S., 2015. Long-term streamflow forecasts
by Adaptive Neuro-Fuzzy Inference System using satellite images and K-fold cross-
validation (Case study: Dez, Iran). KSCE Journal of Civil Engineering, 19(7), p.2298.
[21]Maiti, S. and Tiwari, R.K., 2014. A comparative study of artificial neural networks,
Bayesian neural networks and adaptive neuro-fuzzy inference system in groundwater
level prediction. Environmental earth sciences, 71(7), pp.3147-3160.
[22]Han, J., Pei, J. and Kamber, M., 2011. Data mining: concepts and techniques. Elsevier.
This paper may be cited as:
Sudha, M. 2017. Agronomic Disaster Management using Artificial
Intelligence - A Case Study. International Journal of Computer Science and
Business Informatics, Vol. 17, No. 2, pp. 12-22.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 23
Household Power Optimisation and
Monitoring System
John Batani, Silence Dzambo and Israel Magodi
ICT & Electronics Department
Chinhoyi University of Technology,
P.Bag 7724 Chinhoyi, Zimbabwe
ABSTRACT
Like most of the developing countries, Zimbabwe continues to face critical electricity
shortages. In this paper, the authors present a smart solution for reducing electricity usage
in households while improving comfort levels for the dwellers. The authors developed a
prototype to optimise electricity usage by domestic appliances. In attaining optimal power
usage in households and remote manipulation of household appliances, the researchers
utilized the design science research methodology. The proposed system reduced power
usage and cost of electricity in households by at least 50 per cent. The results benefit the
nation by reducing domestic electricity usage and thus reducing the overall electricity
shortages which may affect the manufacturing and other sectors of the economy. Remote
manipulation of, and communication with the devices by the user are achieved through the
Bluetooth technology and the Global System for Mobile communication. When the user
turns on a stove, the system automatically turns off the fridge to minimise power consumed.
However, the performance of this system may be affected by the performance of the
sensors used. The focus of this paper was to reduce the amount of electricity consumed by
households, thus reducing the overall stress on the national power grid and increasing the
available electricity for industrial use, leading to employment creation. The proposed
system can help in the realization of the UN’s SDGs through ensuring there is adequate
electricity for industrial use, as espoused by SDG 9.
Keywords
Power optimization, Household power saving, Electricity saving, Electricity shortage,
SDGs, IT4D, ICT4D.
1. INTRODUCTION
The importance of electricity in any economy cannot be underestimated
[1,2], hence the need to efficiently use it. Zimbabwe currently has a shortage
of electricity and since 2007 the nation has experienced load shedding due
to inadequate generation of electricity by the national power utility company
[3]. [4]has it that there is generally shortage of electricity globally, and
Zimbabwe is no exception. According to [3] Zimbabwe will continue to
have electricity shortages for upto 8 more years due to the incapacity to
generate sufficient electricity. Several attempts, such as the use of energy
savers, electricity importation and use of alternative, natural power sources
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 24
such as gas and solar, have been made to ease pressure on the insufficient
electricity in Zimbabwe. However, the problem of electricity shortage in
Zimbabwe still persists, and there is a call to everyone to contribute towards
solving the problem [3]. In light of this, the researchers developed a
household power optimization and monitoring system for optimizing the
usage of the inadequate electricity that is currently generated in the country
while not inconveniencing the users.
Africa’s electricity shortage is hugely characterised by continuing power
cuts and a complete deficiency of electricity infrastructure [5]. This has
resulted in negative effects to human and socioeconomic development
across the continent [5]. According to [5], only an average of 40 per cent of
Africans enjoy a consistent electricity supply; while only 69 per cent of the
electrified homes really have electricity that works most or all of the time.
62 per cent of Zimbabwe’s population has access to an electricity grid [5].
[5] claim that only 30 per cent of Zimbabweans have electricity that works
reliably, 26 per cent have electricity that works half the time while 44 per
cent have electricity that either works ocassionally or not at all. Zimbabwe
Electricty Supply Authority (ZESA) is the sole producer, distributor and
seller of electricity. [6] states that the electricity industry in Zimbabwe has
operated as a controlled monolopoly for about five decades. [3] has it that
they will reduce electricity generation from 750MW to 475MW due to
reduced dam levels since most of the electricity in the country in hydro
generated. Zimbabwe has had an 80 per cent urban electrification, 20 per
cent rural electrification, and 41 per cent overall elecrification growth from
1980 to 2007 [7]. An unmatched increasing population and balooning
number of electric appliances has created an electricity shortage in
Zimbabwe, resulting in substantial load shedding [3]. This electricity
shortage is despite several efforts that have been made to increase electricity
supply and reduce electricity consumption in Zimbabwe, including power
importation, use of energy savers and use of alternative energy sources such
as solar and biogas [3]. All over the world, several IT based systems have
been developed in an attempt to reduce excessive power demand, such as
the Green Building in Italy [8]. In Zimbabwe, little has been done to
optimise power usage through the use of ICTs [1]. In 2012 ZESA
introduced pre-paid meters as to enable customers to manage their
electricity bills and encourage them to use electricity wisely. Despite all
these efforts, Zimbabwe still faces electricity shortage [3], hence the need to
come up with a solution for optimisation
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 25
1.1 Problem Statement
There is generally a serious shortage of electricity in the whole world in
general and Zimbabwe in particular [4]. Zimbabwe has a reliable electricity
capacity of the order of 1 320 MW (Megawatts) against a demand of about 2
200 MW [9]. [10] concurs that Zimbabwe is facing critical electricity
shortages due to inadequate electricity generation. Several efforts have been
made in Zimbabwe to reduce electricity consumption and improve
electricity supply. Such efforts include the use of energy savers, electricity
importation and use of alternative, natural power sources such as gas and
solar. However, Zimbabwe continues to face electricity shortages as
evidenced by massive power cuts and load shedding [3]. This has affected
both domestic and industrial consumers; hence the need to come up with a
solution that optimises electricity usage in Zimbabwe.
1.2 Research Objectives
1. To design an automated system that optimises electricity usage in
households.
2. To design an android application that enables remote manipulation
and monitoring of plugged on household electric appliances.
1.3 Significance of the Study
This study seeks to come up with a solution for optimising electricity usage
in households; hence reducing the load on the national grid. Reducing
electricity consumed by households reduces the national demand for
electricity and may save the country foreign currency in reducing electricity
imports. Moreover, if domestic electricity consumption is reduced, it
increases the amount of electricity available for industrial use, which in turn
may improve employment creation. According to [11], every single
occupation in the manufacturing sector generates more than two million
occupations in other sectors, hence it is important to ensure that the
manufacturing sector is sufficiently powered. In addition to power usage
optimisation, the study also seeks to reduce electricity bills for household
consumers
2. RELATED WORKS
Power optimization refers to reducing the amount of power consumed by
devices (such as home appliances, while preserving their functionality)
through designing automation tools that minimise power wastage [12]. A
well designed monitoring system should be capable of maintaining preset
environmental conditions in the building [13]. Various solutions for energy
saving in households using smart technology have been proposed and
developed. Most approaches in literature for energy saving in households
focus on lowering the power consumed by heating, ventilation and air
conditioning (HVAC) appliances, such as the household heating systems
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 26
[14], air-conditioning [15] or both of them [16]. [17] further identified
lighting and home appliances as two more areas to be incorporated in energy
management features to minimize the domestic energy waste. Other power
optimisation solutions indirectly attend to lowering the power consumed by
such (HVAC) devices by providing improved monitoring and controlling
options for the devices, which will in turn result in power consumption
being lowered [18]. The majority of such solutions employ a wide range of
sensors for measuring humidity and temperature, the data from which are
processed by fuzzy controllers [14].
[8] designed an automated power management system called the
GreenBuilding. This system used sensors to intelligently monitor power
usage and automatically control the behaviour of devices in a building. The
system provides a dashboard through which a user can view power
consumption statistics by each appliance [8]. The Arduino platform was
used in designing the network of sensors. Although GreenBuilding allows
the user to view reports based of power consumptions, it does not send
notifications/alerts to the user through the phone pertaining electric
appliance consumption or status notifications. Moreover, once
GreenBuilding is installed, it does not allow users to create their own modes
based on their own priority preferences on appliances.
The Smart Grid is another power optimisation solution which is an
amalgamation of communication and electric infrastructure through IT in
the current electrical networks to boost efficiency [19]. This system can
control daily used household devices according to user defined tariff rates
for each particular device, thus reducing electricity costs to the consumer
and reducing pressure on the grid [20].
[21] designed a simple system for remotely controlling and monitoring
lights, using the Global System for Mobile Communication for long range
communication and Bluetooth technology for short range communication.
The system sought to reduce electricity consumed by household devices
through the use of infrared sensor. Apart from reducing electricity usage, the
system also notified users of any irregular situations (like high temperatures
and intrusions) through Short Messaging System or Bluetooth technology.
Upon receiving a notification on a mobile phone the user initiates
appropriate action which will be implemented by the system [21]. The use
of Bluetooth for communication reduces costs since communication via
Bluetooth is not charged. However, the system is inefficient in
circumstances that require high real-time data transfer. It also does not
operate in various modes once it is started off, leaving the user with little
room to make some options on the usage level of the system. Moreover, the
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 27
system does not prioritise electricity usage on different household
appliances based on the available power.
[22] developed a Smart Power Saving System in smart homes for
controlling appliances with the aim of saving power. The system comprises
two modules namely fingerprint electronic door-locking and electricity
saving. It uses GSM for interaction between the microcontroller and the
phone. A user scans their fingerprint on the door-lock and if it matches, the
electricity saving module will be turned on. The electricity saving sub-unit
controls household electric devices in the home in response to the relative
conditions from different sensors installed in the room. Fan and lights are
switched on/off in response to the temperature and light intensity inside the
home [22]. However, the module had a narrow scope in terms of monitoring
and controlling electricity usage. This is evidenced by the system’s target on
small household appliances specifically fan and lights whilst larger
appliances with higher consumption were excluded such as stoves and
fridges. The biometric module in the system added unnecessary costs as far
as the power saving was concerned. The biometric module was more into
security than power saving.
Artificial Intelligent-based systems have also been proposed for power
usage optimization. These learn about the behavior of an inhabitant in a
smart house to self-adjust the system so that it can be independent and easy
to personalize [23]. Of late, several of such Artificial Intelligent methods for
recognizing user activities using supervised learning in a smart home have
been published [24]. The main disadvantage of such systems though is that
they need prior labeled data for training the algorithms. Manually
representing human behavior data in line with event sensor readings takes a
lot of time and is monotonous and makes the system less scalable [25].
Furthermore, it is highly impractical in reality that all further inhabitant
activities will be similar with training data, thus making such systems more
suitable only for the homes for which they were designed [26]. [6]
implemented a home automation system using Arduino and Android, but
their focus was more on smart homes and the comfort associated with them
rather than power saving.
3. METHODOLOGY
The design science research methodology (Improvement Research) was
adopted for this research. The approach focuses on creation, invention or
design of some new artifacts, while deriving or obtaining suggestions to
solving the problem from current knowledge or theory base for the problem
domain [27]. Figure 1 shows the architecture of the proposed system.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 28
Figure 1. System Architecture
Current sensors are connected to AC power source to which home
appliances are connected. The current sensors communicate with Arduino
which in turn is interfaced with the GSM module. A user can interact with
the system through an Android application. For example, if an appliance is
turned on, say a fan, a current sensor will send information to the Arduino
which will communicate with the GSM module, and a user will be notified
either via SMS or Bluetooth in the form of a system status. A user can also
turn on or off appliances remotely via an Android application through the
GSM module, Arduino and a relay action will be sent to the AC power
source. This means a user can turn on or off any appliance in the home from
anywhere. When power is restored after a power cut, the user will be
automatically notified and shown all appliances that will be on at that time
so that the user can decide which ones to turn off, thus eliminating
unnecessary power wastages. Temperature, motion and light sensors will
provide values to the Arduino, and depending on the rules set and values
read it will send appropriate relay actions to the power source. The system
also generates graphical electricity consumption reports, showing which
appliances consumed how much electricity per given period.
Sensors
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 29
START
Initialise sensors,
GSM and LCD
Read motion sensor
status
Motion
detected?
Read temperature
sensor value
Read light
intensity sensor
value
Temperature
sensor value<set
point?
Light sensor
value> set
value?
Turn off fan via relay
Notify user (SMS)
YES
Turn off light via relay
Notify user (SMS)
YES
Turn OFF lights and
fan if ON
NO
NO
NO
Delay for
5 minutes
Delay for 10
seconds
Figure 2. System Flow Chart
The motion sensor is used to check whether there is anyone in the house. If
there is no one yet lights and/ or fan is on, the system will automatically turn
them off. The assumption is someone might have forgotten to switch them
off before leaving the room. The system will check again whether there is
anyone in the room after ten seconds. This ten seconds delay can be set to
another value as determined by the user in line with their requirements. If
motion is detected, the system checks whether there is enough light intensity
and heat as determined by the user. If light intensity is too low, lights will
automatically be turned on. Conversely, if light intensity is too high, lights
will be automatically turned off. The fan will also be turned on if
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 30
temperature is higher than a user set value and will be turned off if
temperature rises to a maximum desirable value. When 5 minutes have
elapsed, the system will check again whether there is anyone in the room by
reading a motion sensor status. This iterates as long as the system is up and
running.
The Algorithm
START
Let:
MaxTemp be the maximum room temperature before fan automatically
turns on
MinTemp be the minimum room temperature before fan automatically t
urns off
MaxLight be the maximum room light intensity before lights
automatically turn off
MinLight be the minimum light intensity before lights automatically
turn on
Note: User sets custom values to MaxTemp, MinTemp, MaxLight and
MinLight according to their preferences.
Steps:
I. Initialise sensors, GSM and LCD
II. Read motion sensor status
a. If motion is detected
i. Read temperature sensor value
1. If temperature sensor value < MinTemp Then
a. Turn off fan and notify user on mobile
phone
b. Delay for 5 minutes and goto to step I
2. Else if temperature sensor value> MaxTemp
Then
a. Turn on fan and notify user
3. Else delay for 6 seconds and goto step II.a.i.
4. End if
ii. Read light intensity sensor value
1. If light intensity > MaxLight Then
a. Turn off lights
2. Else if light intensity < MinLight Then
a. Turn on lights and notify user
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 31
3. Else delay for 6 seconds and goto step I.a.ii.
b. Else
i. Delay for 5 minutes
ii. Goto step II
End If
III. If stove is turned ON Then
a. If fridge is ON Then
i. Automatically turn OFF fridge and notify user
ii. End If
b. End If
IV. If user turns stove OFF Then
a. If fridge is OFF Then
i. Automatically turn ON the fridge and notify user
ii. End If
b. End If
The system was implemented using the Java Programming language, which
was used to link the user interface and the SQLite database. In addition to
Java code, XML was used to create the interfaces for the android
application. Eclipse Indigo IDE was used to implement the application. The
Android SDK and ADT were also used. The researchers created, compiled,
debugged and deployed the android application from the Eclipse IDE using
the android ADT. The Android SDK was integrated into the Eclipse IDE to
help create and test the system during different iterations of the application.
SQLite was used for the database.
The following hardware components are required in the development of the
prototype and testing of the prototype: Arduino UNO (R3), GSM Module
with an unlocked SIM card, 4 Channel 5 volt Relay, Connecting wires,
Bread board, 16x2 LCD, Power supply, An Android mobile phone for
hosting the user application, Sensors (PIR motion sensor, ACS712 current
sensor, LM35 temperature sensor and LDR light intensity sensor), and
Resistors. Android Studio, Arduino Development Tool, Eclipse IDE and
Proteus must also be installed on the development computer.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 32
4. RESULTS
The system was evaluated in terms of its ability to optimise power usage by
domestic appliances. While a prototype was developed and tested using a
fan, light bulb, stove and water heater as the household appliances, its
effectiveness in terms of power consumption optimisation was measured for
the light bulb only. The researchers calculated light bulb power
consumption over 24 hours for best and worst cases. The researchers then
ran a 24 hours long experiment using the same light bulb on a prototype of
the proposed system. The results of these experiments are shown in Table 1.
The results indicate a significant drop in power usage when using the
system being proposed herein. Monthly figures are derived from the average
daily figures obtained from the experiments. The light bulb used was a
230V, 100W bulb which consumes 0.1 kW per hour.
Table 1. Power Consumption Comparison for a light bulb before and after installation
of the system
The worst case scenario is when an appliance remains on for the whole day
and night. Given that the bulb used consumed 0.1kW per hour, if left on for
24 hours it will consume 2.4kW. This worst case scenario is only possible if
no power optimisation system is implemented. In this experiment, the
researchers defined the best case as the case when consumption time is at
least 12 hours but less than 24 hours per day. Taking the lower bound of 12
and upper bound of 24 hours per day and calculating the average of the two,
it gives 18 hours as the best case scenario’s hours when the light will be on
per day. The assumption is that the user will be turning the lights on and off
when necessary. For 18 hours at a consumption of 0.1 kW per hour, the light
bulb will consume 1.8kW per day. The optimal case is was when the power
Before Installation After
Installation
Worst
Case
Best
Case
Optimal Case
Appliance:
light bulb
Average hourly
consumption (kW)
0.1 0.1 0.1
Maximum total
consumption time
(Hours)
24 18 12
Maximum total
consumption (kW)
2.4 1.8 1.2
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 33
optimisation system was used. Under this case, lights were only on for 12
hours per day, when it was dark, and hence consumed 1.2kW.
Table 2. Comparisons of Power Consumption Costs
The researchers used Equation 1 for calculating electricity cost savings as a
percentage:
𝐸𝐶𝑆𝑃 =
𝐸𝐶𝐵𝐼−𝐸𝐶𝐴𝐼 ∗100
𝐸𝐶𝐵𝐼
... .… Equation 1
Where
ECSP = Electricity Cost Savings as a percentage,
ECBI = Electricity Cost Before Installation of the system,
ECAI = Electricity Cost After Installation of the system
Cost savings were calculated for both the worst and best case scenarios
using Equation 1. For the worst case scenario:
𝐸𝐶𝑆𝑃 =
𝐸𝐶𝐵𝐼 − 𝐸𝐶𝐴𝐼 ∗ 100
𝐸𝐶𝐵𝐼
Before Installation After
Installation
Worst
Case
Best
Case
Optimal Case
Appliance:
light bulb
Average hourly
consumption (kW)
0.1 0.1 0.1
Maximum total
consumption time
(Hours)
24 18 12
Maximum total
consumption (kW)
2.4 1.8 1.2
Cost per kW per hour
(US$)
0.09 0.09 0.09
Estimated total cost per
day (US $)
0.216 0.162 0.108
Estimated total cost per
month (US $)
6.48 4.86 3.24
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 34
=
$(6.48 − 3.24) ∗ 100
$6.48
∴ 𝑬𝑪𝑺𝑷 = 𝟓𝟎%
For the best case scenario:
𝐸𝐶𝑆𝑃 =
𝐸𝐶𝐵𝐼 − 𝐸𝐶𝐴𝐼 ∗ 100
𝐸𝐶𝐵𝐼
=
$ 4.86 − 3.24 ∗ 100
$4.86
∴ 𝑬𝑪𝑺𝑷 = 𝟑𝟑 𝟏
𝟑 %
Cost of electricity is directly proportional to usage, hence reducing
electricity consumption results in reduced cost of electricity to domestic
electricity consumers. In terms of percentages, reduction in cost is equal to
reduction in the amount of power consumed. The results indicate that
implementing the household power optimisation and monitoring system
resulted in cost saving of 33.3 per cent and 50 per cent for the best and
worst case scenarios respectively. Consequently, it means the amount of
power consumed was reduced by the same margins. The system resulted in
optimal power usage and thus reduced demand for electricity. Apart from
power usage optimisation, the system improves comfort levels for users as
they remotely monitor and control their household devices. The ability of
users to monitor and control household electric devices from a distance is
also useful for people living with disabilities as they can control and
monitor appliances in the home without having to physically move around
to power switches which are usually mounted on different points on the
walls of houses.
A number of authors who have been engaged in making smart homes
systems concentrated more on improving the comfort for inhabitants than
electricity saving. [28], [29] and [30] have focused more on automation with
little inclination towards power saving, hence they did not state how much
could be saved by implementing their systems. While some of the systems
resulted in electricity savings the researchers did not quantify the electricity
savings; thus providing no comparison basis. [14] claim that their system
reduced electricity consumption by domestic heating but did not state by
how much.
5. CONCLUSIONS
The Household Power Optimisation and Monitoring System proposed
herein focused mainly on reducing the amount of electricity consumed by
households and hence reducing stress on the national power grid. The
results of the system indicate that the system can reduce power consumption
in households by up to 50 per cent. This 50 per cent reduction in electricity
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 35
consumed translates to 50 per cent savings in electricity costs to households.
It is important to save electricity since electrical power is scarce in
developing countries like Zimbabwe [11]. Saving electricity in households
increases the amount of electricity available for industrial use, which in turn
increases employment creation. [11] claims that every single occupation in
the manufacturing sector generates more than two million occupations in
other sectors of the economy, hence it is imperative to make sure that there
is enough electricity for the manufacturing industry. The system also has
other benefits of convenience and comfort since users can remotely
manipulate appliances on their phones. This feature makes this system an
inclusive solution as it also helps people living with disabilities to
manipulate appliances on their own without having to move around to
different power switch points around the home to power on or off
appliances. However, the system could be improved by incorporating voice
commands to control appliances. It could also be improved by adding a
functionality of predicting future consumption of an appliance based on past
and present consumption patterns. The system is designed on the
assumptions that supply of electricity is always less than demand; the users
are not using the available electricity optimally and all policies pertaining
electrical usage are held constant. The performance of this system depends
on the performance of the sensors. Moreover, remote manipulation of
electric gadgets will depend on the availability of network, hence remote
manipulation and monitoring may not work if there is no network coverage,
unless the user is within the Bluetooth range. The focus of the study is to
optimise power usage in households only.
6. REFERENCES
[1] Nyasha Kaseke, "Journal of Business Management & Social Sciences Research,"
Emergence Of Electricity Crisis In Zimbabwe, Reform Response And Cost
Implications, vol. 2, no. 10, pp. 1-16, October 2013.
[2] Tichaona Chifamba. (2011) Commercial Farmers Union of Zimbabwe Web site.
[Online]. http://www.cfuzim.org/index.php/newspaper-articles-2/zesa/2516-
continuing-power-shortages-cripple-zimbabwe-economy
[3] ZESA. (2013, January) ZESA Holdings Web site. [Online].
http://www.zesa.co.zw/index.php/component/k2/item/17-why-do-we-have-load-
shedding?
[4] Tom Chuma. (2012, Oct.) A case study of zimbabwe. [Online].
https://leadpanafricansession.files.wordpress.com/2012/11/zimbabwe-case-
study1.doc
[5] Abel Oyuke, Halley Peter Penar, and Brian Howard, "Off-grid or 'off-on':Lack of
access, unreliable electricity supply still plague majority of Africans," Afrobarometer
Dispatch, vol. 6, no. 75, pp. 1-26, March 2016.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 36
[6] S.E. Mangwengwende, "Increasing Electricity Access While Ensuring Financial
Viabilityy: A Perspective form the African Electricity Industry," in Global Network
on Energy For Suatinable Development (GNESD), Nairobi, 2005.
[7] Central Statistics Office, "Power Statistics in Zimbabwe," Power Statistics in
Zimbabwe, 2008.
[8] Giuseppe Anastasi, Francesco Corucci, and Francesco Marcelloni, "An Intelligent
System for Electrical Energy Management in Buildings," in 11th International
Conference on Intelligent Systems Design and Applications, 2012.
[9] Allan Shirichena. (2014) http://www.technomag.co.zw. [Online].
http://www.technomag.co.zw/2014/11/04/zimbabwes-energy-crisis-demand-supply-
imbalance/#stash.
[10] Phillimon Mhlanga. (2014) Financial Gazzette. [Online].
http://www.financialgazette.co.zw/zim-faces-unprecedented-power-crisis/
[11] The United Nations. (2016, August) The United Nations Web site. [Online].
http://www.un.org/sustainabledevelopment/wp-content/uploads/2016/08/9_Why-it-
Matters_Goal-9_Industry_1p.pdf
[12] Jan M Rabaey, Anantha Chandrakasan, and Borivoje Nikolic, Digital Integrated
Circuits, 2nd ed., 2002.
[13] University of Kentucky. (2014) KENTUCKY POULTRY ENERGY EFFICIENCY
PROJECT. [Online].
http://www2.ca.uky.edu/poultryprofitability/Production_manual/Chapter11_Monitori
ng_and_control_systems/Chapter11_overview_of_systems.html
[14] J. Villar, E. de la Cal, and J Sedano, "A fuzzy logic based efficient energy saving
approach for domestic heating systems.," Integrated Computer-Aided Engineering,
vol. 15, pp. 1-9, 2009.
[15] Y. He, "Energy saving of central air-conditioning and control system:," Energy
saving of central air-conditioning and control system: Case study: Nanchang
Hongkelong Supermarket., vol. 1, p. 12, 2010.
[16] M. Nowak and A. Urbaniak, "Utilization of intelligent control algorithms for thermal
comfort optimization and energy saving.," in 2011 12th IEEE Control Conference,
2011.
[17] E. Inji, I. Attia, and P Hamdy, "Energy Saving Through Smart Home.," Energy
Saving Through Smart Home., vol. 2, pp. 22-34, 2011.
[18] M. Jahn, "The Energy Aware Smart Home.," The Energy Aware Smart Home., pp. 1-
9, 2010.
[19] Borlase, Smart Grids: Infrastructure, Technology and Solutions, CRC Press, Ed.:
Taylor and Francis Group, 2012.
[20] S.P.S. Gill, "Smart Power Monitoring System Using," Sixth International Conference
on Sensing Technology, p. 1, 2012.
[21] Vini Madan, "GSM-Bluetooth based Remote Monitoring and Control System with
Automatic Light Controller," International Journal of Computer Applications, p. 1,
2012.
International Journal of Computer Science and Business Informatics
IJCSBI.ORG
ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 37
[22] M, S Madhu, M Gangadhar, and G, C Sanjaya, "ARM Based Smart Power Saving
System for Home Automation," International Journal of Computer Science and
Information Technologies, Vol. 5 (3), pp. 2910-2913, 2014.
[23] Bengio Roux, "Deep belief networks are compact," Neural Computation, vol. 22, no.
8, p. 192, 2010.
[24] F., Rokach, L., Shapira, B., Ricci, Recommender Systems Handbook. Boston, MA:
Springer US, 2011.
[25] Hyong-Euk Lee and Young-Min Kim, From Smart Home to Smart Care, G Giroux &
H Pigot (Eds), Ed.: IOS Press, 2005.
[26] D. Cook, "A method for mining and monitoring human activity patterns in home-
based health monitoring systems.," ACM Transactions on Intelligent Systems, vol. 4,
p. 9, 2013.
[27] C.S Peirce, Collected Papers of Charles Sanders Peirce, C and Weiss , P. Eds
Harshorne, Ed. Cambrigdge: Havard University Press, 1985.
[28] Poonam B. Patil, Rupali.R Patil, Swati V. Patil, and Avadhoot R. Telepatil, "Home
Automation System Using Android and Arduino Board," International Journal of
Innovative Research in Science, Engineering and Technology, vol. 5, no. 4, pp. 5076-
5082, April 2016.
[29] M.L Sharma, Kumar Sachin, and Mehta Nipuri, "SMART HOME SYSTEM USING
IOT," International Research Journal of Engineering and Technology, vol. 4, no. 11,
pp. 1108-1112, November 2017.
[30] P Sushma and M.J Roopa, "Wi-Fi Based Home Automation System Using Androis &
Arduino Platform," International Journal for Research in Applied Science and
Engineering, vol. 5, no. VI, pp. 942-945, June 2017.
This paper may be cited as:
Batani, J., Dzambo, S. and Magodi, I., 2017. Household Power Optimisation
and Monitoring System. International Journal of Computer Science and
Business Informatics, Vol. 17, No. 2, pp. 23-37.

More Related Content

What's hot

Online Payment Fraud Detection with Azure Machine Learning
Online Payment Fraud Detection with Azure Machine LearningOnline Payment Fraud Detection with Azure Machine Learning
Online Payment Fraud Detection with Azure Machine LearningStefano Tempesta
 
Internet Banking Perception
Internet Banking PerceptionInternet Banking Perception
Internet Banking PerceptionVivek Kumar
 
Internet Banking in Malaysia
Internet Banking in MalaysiaInternet Banking in Malaysia
Internet Banking in Malaysiayun6098
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...IJARIIT
 
IRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking ApplicationIRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking ApplicationIRJET Journal
 
Disruptive technologies - Session 2 - Blockchain smart_contracts
Disruptive technologies - Session 2 - Blockchain smart_contractsDisruptive technologies - Session 2 - Blockchain smart_contracts
Disruptive technologies - Session 2 - Blockchain smart_contractsBohitesh Misra, PMP
 
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent TransactionIRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent TransactionIRJET Journal
 
Fraud Detection using Data Mining Project
Fraud Detection using Data Mining ProjectFraud Detection using Data Mining Project
Fraud Detection using Data Mining ProjectAlbert Kennedy III
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...Eswar Publications
 
credit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractcredit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractVenkat Projects
 
E-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsE-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsSartha Gupta
 
Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...Francesca Lazzeri, PhD
 
Internet banking
Internet bankingInternet banking
Internet bankingMahendran S
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentVarsha Mali
 
Divisible Transferable Anonymous Electronic Cash System for General Use
Divisible Transferable Anonymous Electronic Cash System for General UseDivisible Transferable Anonymous Electronic Cash System for General Use
Divisible Transferable Anonymous Electronic Cash System for General UseIJERD Editor
 
A Survey on Crypto Currencies
A Survey on Crypto CurrenciesA Survey on Crypto Currencies
A Survey on Crypto Currenciesidescitation
 

What's hot (20)

Online Payment Fraud Detection with Azure Machine Learning
Online Payment Fraud Detection with Azure Machine LearningOnline Payment Fraud Detection with Azure Machine Learning
Online Payment Fraud Detection with Azure Machine Learning
 
Internet Banking Perception
Internet Banking PerceptionInternet Banking Perception
Internet Banking Perception
 
Internet banking-of-sbi
Internet banking-of-sbiInternet banking-of-sbi
Internet banking-of-sbi
 
Internet Banking in Malaysia
Internet Banking in MalaysiaInternet Banking in Malaysia
Internet Banking in Malaysia
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
IRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking ApplicationIRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking Application
 
Disruptive technologies - Session 2 - Blockchain smart_contracts
Disruptive technologies - Session 2 - Blockchain smart_contractsDisruptive technologies - Session 2 - Blockchain smart_contracts
Disruptive technologies - Session 2 - Blockchain smart_contracts
 
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent TransactionIRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
 
Fraud Detection using Data Mining Project
Fraud Detection using Data Mining ProjectFraud Detection using Data Mining Project
Fraud Detection using Data Mining Project
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 
credit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractcredit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstract
 
E-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsE-banking FOR CLASS 10 students
E-banking FOR CLASS 10 students
 
E banking in india
E banking in indiaE banking in india
E banking in india
 
Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...
 
Credit card fraud dection
Credit card fraud dectionCredit card fraud dection
Credit card fraud dection
 
Election System Based on Blockchain Technology
Election System Based on Blockchain TechnologyElection System Based on Blockchain Technology
Election System Based on Blockchain Technology
 
Internet banking
Internet bankingInternet banking
Internet banking
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Divisible Transferable Anonymous Electronic Cash System for General Use
Divisible Transferable Anonymous Electronic Cash System for General UseDivisible Transferable Anonymous Electronic Cash System for General Use
Divisible Transferable Anonymous Electronic Cash System for General Use
 
A Survey on Crypto Currencies
A Survey on Crypto CurrenciesA Survey on Crypto Currencies
A Survey on Crypto Currencies
 

Similar to Vol 17 No 2 - July-December 2017

A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...IRJET Journal
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
 
Credit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyCredit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyIJMER
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET Journal
 
Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud Detectionijtsrd
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSIRJET Journal
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Online Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningOnline Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningIRJET Journal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Analysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionAnalysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionIOSR Journals
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesIJSRD
 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...IRJET Journal
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionIRJET Journal
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
Fingerpay
FingerpayFingerpay
FingerpayAnand B
 
A rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detectionA rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detectionIJECEIAES
 
White paper Real Time Transaction Analysis and fraudulent transaction detecti...
White paper Real Time Transaction Analysis and fraudulent transaction detecti...White paper Real Time Transaction Analysis and fraudulent transaction detecti...
White paper Real Time Transaction Analysis and fraudulent transaction detecti...Ajay Alex
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning TechniquesIRJET Journal
 

Similar to Vol 17 No 2 - July-December 2017 (20)

A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
 
Credit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyCredit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A Survey
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud Detection
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Online Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningOnline Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine Learning
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
J017216164
J017216164J017216164
J017216164
 
Analysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionAnalysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud Detection
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud Detection
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
West2016
West2016West2016
West2016
 
Fingerpay
FingerpayFingerpay
Fingerpay
 
A rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detectionA rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detection
 
White paper Real Time Transaction Analysis and fraudulent transaction detecti...
White paper Real Time Transaction Analysis and fraudulent transaction detecti...White paper Real Time Transaction Analysis and fraudulent transaction detecti...
White paper Real Time Transaction Analysis and fraudulent transaction detecti...
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
 

More from ijcsbi

Vol 17 No 1 - January June 2017
Vol 17 No 1 - January June 2017Vol 17 No 1 - January June 2017
Vol 17 No 1 - January June 2017ijcsbi
 
Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016ijcsbi
 
Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016ijcsbi
 
Vol 15 No 6 - November 2015
Vol 15 No 6 - November 2015Vol 15 No 6 - November 2015
Vol 15 No 6 - November 2015ijcsbi
 
Vol 15 No 5 - September 2015
Vol 15 No 5 - September 2015Vol 15 No 5 - September 2015
Vol 15 No 5 - September 2015ijcsbi
 
Vol 15 No 4 - July 2015
Vol 15 No 4 - July 2015Vol 15 No 4 - July 2015
Vol 15 No 4 - July 2015ijcsbi
 
Vol 15 No 3 - May 2015
Vol 15 No 3 - May 2015Vol 15 No 3 - May 2015
Vol 15 No 3 - May 2015ijcsbi
 
Vol 15 No 2 - March 2015
Vol 15 No 2 - March 2015Vol 15 No 2 - March 2015
Vol 15 No 2 - March 2015ijcsbi
 
Vol 15 No 1 - January 2015
Vol 15 No 1 - January 2015Vol 15 No 1 - January 2015
Vol 15 No 1 - January 2015ijcsbi
 
Vol 14 No 3 - November 2014
Vol 14 No 3 - November 2014Vol 14 No 3 - November 2014
Vol 14 No 3 - November 2014ijcsbi
 
Vol 14 No 2 - September 2014
Vol 14 No 2 - September 2014Vol 14 No 2 - September 2014
Vol 14 No 2 - September 2014ijcsbi
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014ijcsbi
 
Vol 13 No 1 - May 2014
Vol 13 No 1 - May 2014Vol 13 No 1 - May 2014
Vol 13 No 1 - May 2014ijcsbi
 
Vol 12 No 1 - April 2014
Vol 12 No 1 - April 2014Vol 12 No 1 - April 2014
Vol 12 No 1 - April 2014ijcsbi
 
Vol 11 No 1 - March 2014
Vol 11 No 1 - March 2014Vol 11 No 1 - March 2014
Vol 11 No 1 - March 2014ijcsbi
 
Vol 10 No 1 - February 2014
Vol 10 No 1 - February 2014Vol 10 No 1 - February 2014
Vol 10 No 1 - February 2014ijcsbi
 
Vol 9 No 1 - January 2014
Vol 9 No 1 - January 2014Vol 9 No 1 - January 2014
Vol 9 No 1 - January 2014ijcsbi
 
Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013ijcsbi
 
Vol 7 No 1 - November 2013
Vol 7 No 1 - November 2013Vol 7 No 1 - November 2013
Vol 7 No 1 - November 2013ijcsbi
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013ijcsbi
 

More from ijcsbi (20)

Vol 17 No 1 - January June 2017
Vol 17 No 1 - January June 2017Vol 17 No 1 - January June 2017
Vol 17 No 1 - January June 2017
 
Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016
 
Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016Vol 16 No 1 - January-June 2016
Vol 16 No 1 - January-June 2016
 
Vol 15 No 6 - November 2015
Vol 15 No 6 - November 2015Vol 15 No 6 - November 2015
Vol 15 No 6 - November 2015
 
Vol 15 No 5 - September 2015
Vol 15 No 5 - September 2015Vol 15 No 5 - September 2015
Vol 15 No 5 - September 2015
 
Vol 15 No 4 - July 2015
Vol 15 No 4 - July 2015Vol 15 No 4 - July 2015
Vol 15 No 4 - July 2015
 
Vol 15 No 3 - May 2015
Vol 15 No 3 - May 2015Vol 15 No 3 - May 2015
Vol 15 No 3 - May 2015
 
Vol 15 No 2 - March 2015
Vol 15 No 2 - March 2015Vol 15 No 2 - March 2015
Vol 15 No 2 - March 2015
 
Vol 15 No 1 - January 2015
Vol 15 No 1 - January 2015Vol 15 No 1 - January 2015
Vol 15 No 1 - January 2015
 
Vol 14 No 3 - November 2014
Vol 14 No 3 - November 2014Vol 14 No 3 - November 2014
Vol 14 No 3 - November 2014
 
Vol 14 No 2 - September 2014
Vol 14 No 2 - September 2014Vol 14 No 2 - September 2014
Vol 14 No 2 - September 2014
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014
 
Vol 13 No 1 - May 2014
Vol 13 No 1 - May 2014Vol 13 No 1 - May 2014
Vol 13 No 1 - May 2014
 
Vol 12 No 1 - April 2014
Vol 12 No 1 - April 2014Vol 12 No 1 - April 2014
Vol 12 No 1 - April 2014
 
Vol 11 No 1 - March 2014
Vol 11 No 1 - March 2014Vol 11 No 1 - March 2014
Vol 11 No 1 - March 2014
 
Vol 10 No 1 - February 2014
Vol 10 No 1 - February 2014Vol 10 No 1 - February 2014
Vol 10 No 1 - February 2014
 
Vol 9 No 1 - January 2014
Vol 9 No 1 - January 2014Vol 9 No 1 - January 2014
Vol 9 No 1 - January 2014
 
Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013
 
Vol 7 No 1 - November 2013
Vol 7 No 1 - November 2013Vol 7 No 1 - November 2013
Vol 7 No 1 - November 2013
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Vol 17 No 2 - July-December 2017

  • 1. ISSN: 1694-2507 (Print) ISSN: 1694-2108 (Online) International Journal of Computer Science and Business Informatics (IJCSBI.ORG) VOL 17, NO 2 JULY-DECEMBER 2017
  • 2. Table of Contents VOL 17, NO 2 JULY-DECEMBER 2017 An Adaptive and Real-Time Fraud Detection Algorithm in Online Transactions....................................1 Yiming WU, Siyong CAI Agronomic Disaster Management using Artificial Intelligence - A Case Study.....................................13 M Sudha Household Power Optimisation and Monitoring System ...................................................................23 John Batani, Silence Dzambo, Israel Magodi IJCSBI.ORG
  • 3. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 1 An Adaptive and Real-Time Fraud Detection Algorithm in Online Transactions John Batani ICT and Electronics Department Chinhoyi University of Technology, P.Bag 7724, Chinhoyi, Zimbabwe ABSTRACT While the Internet has made it possible to transact electronically and ubiquitously, some unscrupulous internet users have devised ways of defrauding e-commerce users. Several solutions have been designed and deployed to try and curb fraud in electronic transactions, but the news of fraud in e-commerce continues making the headlines globally. It is against this background that the researcher was motivated to design an adaptive algorithm that can detect credit card fraud as it occurs (real-time). The solution is based on the use of an Artificial Neural Network, Hidden Markov Model and a One-Time Password. The researcher used a synthesised dataset since a real dataset could not be found. The researcher tested the algorithm, which produced 100 per cent fraud detection rate and 98 per cent accuracy. The proposed solution can be made a plugin to e-commerce sites for the purposes of detecting and preventing fraud. The researcher was motivated to undertake this study after realising that while Zimbabwe is calling for the adoption of e-commerce due to the prevailing cash crisis, some people still have reservations due to security concerns. Despite, even in those countries where electronic commerce was adopted a long time ago, security is still a concern among e-commerce participants. The designed algorithm has a learning ability so that it can detect new fraud variations as they occur (real-time) and thus terminate the transaction should it be considered a fraudulent one. The author seeks to restore and instill confidence in people who transact online using credit cards. Keywords Fraud detection, Real-time fraud, Adaptive fraud, E-commerce security, Credit card. 1. INTRODUCTION The Internet has undoubtedly revolutionized the way we do business today. The increasing popularity of the Internet world over has seen the widespread acceptance, usage and adoption of electronic commerce in which transacting can occur without physical interaction, virtually from anywhere across the globe. However, an upsurge in electronic transactions has presented an opportunity for unscrupulous computer users to defraud unsuspecting victims who transact online. Despite several fraud detection solutions
  • 4. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 2 having been designed and deployed, cases of fraud in electronic transactions continue making the headlines globally. This suggests that the current solutions have some weaknesses that are being taken advantage of by fraudsters. There is sort of an arms race between online fraudsters and those engaged in designing anti-fraud solutions, hence the need to come up with an adaptive solution that detects fraud in real time. A good strategy and the main goal of banks and industries is timely information on fraudulent activities [3]. . 1.1 The Research Problem Despite several attempts having been made to curb online fraud, cases of people being defrauded online continue making the headlines world over. Notwithstanding the enormous growth in electronic transactions, there is a lack of strong security to the high end [3]. The rise in Internet usage and an upsurge in electronic transactions have seen an increase in cases of online fraud despite significant efforts by card issuers, merchants and law enforcement to curb the fraud. Since fraud perpetration techniques are evolving as technology is evolving, there is a need to come up with an adaptive solution that also has a capability of detecting fraud in real time. An early detection of fraud is more significant in terms of cost analysis [3]; hence the need to have real time detection solution. 1.2 Purpose Of The Study The purpose of this study is to understand the shortcomings of current online fraud detection systems with the aim of designing and implementing an adaptive, hybrid and real-time online fraud detection algorithm. The algorithm should have a learning ability so that it can detect new fraud variations as they occur and thus terminate the transaction should it be considered a fraudulent one. The algorithm to be designed is supposed to restore and instill confidence in people who transact online 1.3 Objectives Of The Study This study seeks to: 1. design an adaptive fraud detection algorithm that can detect credit card fraud in real time. 2. implement an adaptive fraud detection algorithm that can detect fraud in real time. 2. RELATED WORKS “Fraud can be defined as the illegal usage of any system or good” [2], while the legal activities can correspondingly be termed legitimate. Therefore, credit card fraud can be defined as the illegal usage of a credit card to perform electronic transactions. Fraud detection is a complex computational
  • 5. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 3 task and there is no system that surely predicts any transaction as fraudulent; rather the systems predict the likelihood of a transaction being fraudulent [1]. Basically, there are two types of credit card fraud, that is, counterfeit fraud and the illegal use of a lost or stolen credit card [2]. Broadly, there are four types of fraud, namely bankruptcy fraud, theft or counterfeit fraud, application fraud and behavioural fraud [4]. Several fraud detection techniques on electronic transactions have been designed, deployed and applied by various researchers and organisations to reduce further damage caused by fraud; however, people continue to be defrauded in spite of such efforts having been made. Despite the existence of numerous fraud detection technologies, it is not possible to detect fraud while the transaction is in progress [3], that is, in real time. Some of the fraud detection techniques that have been implemented include the Hidden Markov Model, decision trees, neural networks, Bayesian networks and data mining techniques [9]. According to [1], several researches have been done with an emphasis on data mining and neural networks. [5] applied unsupervised neural networks in credit card fraud detection. The Hidden Markov Model has previously been used in credit card fraud detection [10], thus it can be used for credit card detection. [10] define Hidden Markov Model as a finite set of states, each of which is associated with a probability distribution. The model only shows the result and hides the state from the external viewer, thus the states are „hidden‟ to the outside and hence the name Hidden Markov Model. Bayesian Networks have also been used in an attempt to detect online fraud [3]. According to [3], a Naïve Bayesian classifier is an influential probabilistic method that makes use of class sequence from training class of prospect instances. Other techniques that have been applied to fraud detection include self-organizing maps (SOM), K-Nearest Neighbor [3], Outlier Techniques [6] and also the Boat algorithm. However, regardless of all such concerted efforts, the news of people being defrauded online continues making the headlines. This therefore is suggestive that the current solutions, regardless of them being numerous, have some shortcomings which are being exploited by online fraudsters. This is therefore what has prompted the researcher to consider this area as a possible research area. 3. METHODOLOGY The researcher used the design science research methodology since the research sought to come up with an artifact. For problem awareness, the researcher performed document analysis and established that the problem really exists. The researcher also searched for trends of online fraud in different presses. Having understood the problem, the researcher proposed to have a hybrid, adaptive and real-time fraud detection system for credit card electronic transactions. The researcher then had a tentative design of the system. The tentative design was then refined, an algorithm designed
  • 6. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 4 and system development was undertaken. The system was evaluated for performance using a test data set, the results of which are shown herein. This research contributes to the detection of online credit card fraud detection by proposing a solution that is adaptive and real-time. This is essential as it ensures that fraud is detected as it happens rather than after the transaction. Moreover, the use of neural networks ensures that the solution is adaptive, thus keeping abreast with changes in the ways in which online credit card fraud is perpetrated. This results in improved security of online transactions, hence, restoring and boosting confidence of credit card users in transacting electronically using their cards. 3.1 The Proposed Solution The researcher designed a hybrid and adaptive fraud detection algorithm that can detect fraud in real time. It has come out from literature that the current solutions are not real time. Despite the existence of numerous fraud detection technologies, it is not possible to detect fraud while the transaction is in progress [3]. Therefore, the researcher designed an algorithm with the capability of real time fraud detection. The researcher intends to make use of neural networks, machine learning and other artificial intelligence approaches in coming up with the intended solution. 3.2 The Flow Chart of the Proposed System The user first has to be registered on the e-commerce site, and every time they try to transact on the site, they are authenticated. After successful authentication on the website, the user can then enter their credit card details which will also be verified from the bank database. If the entered credit card details are incorrect or do not exist, the transaction halts, otherwise it proceeds. If the credit card details exist in the bank database and are correct, the system generates a One-Time Password (OTP) which is sent to the registered mobile number of the cardholder. The user is then prompted to enter the received OTP and if it matches the sent OTP, then the system extracts the user‟s social profile from the bank database. This social profile comprises age, income, occupation, and cardholder‟s value of assets. These social profile parameters will then be classified and assigned weights using Artificial Neural Networks to generate the cardholder‟s social status. The system then extracts credit card and bank transactions history and current balance (financial profile) from the bank database for analysis using the Hidden Markov Model (HMM). The HMM is used to generate the cardholder‟s financial status. Bank transactions involve checking the validity of the card, card holder‟s previous one-year transactions history, and balance in the account. Credit card transactions history involves credit card bill payments and spending patterns of the cardholder. The system uses the cardholder‟s financial status, social status and OTP for fraud detection. If authentication is successful (user login credentials, credit card details and OTP) and the transaction has unique features compared to the cardholder‟s
  • 7. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 5 credit card spending history patterns, the user‟s financial profile is updated using ANNs and the transaction is processed. However, the transaction must be within the spending limits of the credit cardholder as stipulated by their bank. If the transaction has new features and exceeds the cardholder‟s spending limits, it is flagged as fraudulent and terminated. The continuous updating of the cardholder‟s financial profile through ANNs makes the fraud detection system adaptive, while the use of OTP makes it a real-time fraud detection system. Combining ANNs and the HMM makes the system a hybrid solution. Figure 1. System flow chart
  • 8. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 6 3.3 Algorithm for the Proposed System Let InT be incoming transaction, PrT be previous transactions and OTP be one-time password, FrT be fraudulent transaction and LgT be legitimate transaction Steps I. Receive login details II. If login details are valid Then a. Send OTP b. Compare received OTP and sent OTP i. If received OTP !=sent OTP Then 1. Terminate transaction and End ii. Else 1. Accept credit card details 2. Authenticate credit card details 3. If credit card details are invalid Then a. Terminate Transaction & flag it as suspicious 4. Else a. Extract cardholder‟s social profile {name, age, gender, income, occupation, value of assets} b. If cardholder name or gender or age !=user‟s name or gender or age Then i. Terminate the transaction and flag it as fraudulent ii. End c. Extract cardholder‟s financial profile {card balance, card transactions history, card bills history, card payments history, credit limit} d. If InT value > credit limit Then i. Flag InT as fraudulent ii. End e. Classify social profile parameters using ANNs and assign them weights f. Analyse financial profile using HMM to generate financial status g. If InT has new features i. Update cardholder‟s spending patterns using ANNs h. If InT resembles PrT Then i. InT is LgT
  • 9. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 7 ii. Commit InT to legitimate transactions database iii. LgT + =1 iv. Notify user and bank of the transaction v. End i. Else i. InT is fraudulent ii. Record transaction as FrT iii. FrT += 1 iv. Notify cardholder and bank v. End III. Else a. Terminate transaction IV. END Neural Network Algorithm Let: InT be incoming transaction LegT be legal transaction FrT be fraudulent transaction SusT be suspicious transaction MaxOTP_Time be the maximum number of seconds within which a user is supposed to enter an OTP Time_Elapsed be time in seconds that has elapsed after an OTP has been sent and before user has entered the corresponding OTP. InT_Features{}be a set of features for incoming transaction for customer LegT_Features{} be a set of features for legal transaction for customer FrT_Features {} be a set of features for fraudulent transactions for customer NewFeatures{} be a set of new features from incoming transaction that do not exist in the current dataset of legal transactions and fraudulent transactions Define Variables: Threshold {user defined variable in the form of a percentage, which is used to compare similarity between incoming Transaction and
  • 10. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 8 legal transaction for each customer. It can be between 0 and 1 inclusive, or a percentage} Step 1: Extract attributes of InT and store them in InT_Features{} Step 2: Compare InT_Features{} and LegT_Features{} If similarity >= threshold Then InT is LegT Else InT is SusT Suspend InT Send OTP to cardholder‟s mobile number If Time_Elapsed = MaxOTP_Time Then InT is FrT Extract new features from InT and update FrT_Features{} for customer Else InT is LegT Extract new features from InT and update LegT_Features{} for customer End If End If 4. RESULTS The results of the system were evaluated in terms of the extent to which it correctly classified fraudulent transactions. In other words, the system was mainly evaluated on fraud detection rate. The system was tested using synthetically generated data since the researcher could not get a real dataset. However, the data was synthesised in a way that it as much as possible resembled a real dataset. Herein, a positive is a fraudulent transaction and conversely, a negative is a legal transaction. Thus, a legal transaction that is wrongly classified as fraudulent is a false positive; and a fraudulent transaction that is misclassified as legal is a false negative. Therefore, legal transactions that are correctly classified as legal are true negatives, and fraudulent transactions that are correctly classified as fraudulent are true positives. The system was thus evaluated in line with these parameters.
  • 11. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 9 Table 1. Training Results No. of Iterations No. of Trans action s No. of False Positiv es No. of True Positi ves No. of False Negati ves No. of True Negati ves No. of Positiv es No. of Negati ves 50 50 2 25 0 23 25 25 100 50 0 25 0 25 25 25 150 50 1 25 0 24 25 25 Table 2. Testing Results No. of Transac tions No. of False Positives No. of True Positive s No. of False Negative s No. of True Negatives No. of Positive s No. of Negati ves 50 1 25 0 24 25 25 From the testing results, the fraud detection rate can thus be calculated using the formula: = =
  • 12. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 10 Sensitivity is regarded as the most important measure of the effectiveness of fraud detection systems [8]. This is because losses of money by defrauded people are a result of fraud detection systems failing to detect fraud. While this system‟s detection rate was perfect, it should be noted that its perfectness depends on some factors. Firstly, the system is deployed to work with electronic commerce transactions on which users are required to register. The system blocks all transactions which are initiated by users whose demographic details are different from the cardholder‟s as stored in the bank‟s database. For a transaction to be successful, the registered details on the website for the user must match with those for the cardholder, and the initiator of the transaction must have the cardholder‟s mobile phone to which an OTP will be sent. If all those conditions are met, a transaction will sail through even if some of its features are not found in the legal transactions set for that customer. The new features of an incoming transaction will then be added to either the legal transactions or fraudulent transactions features set for the customer, thus making the solution adaptive or incremental since it has an ability to learn new features associated with fraud. The system does not only detect but also prevents fraud by prematurely terminating any transaction should the user fail to enter the generated OTP which is sent to their registered mobile phone number via Short Messaging System (SMS). Consequently, it achieves both credit card detection and prevention. In comparison to other systems in existence, the proposed algorithm is highly effective with 100 per cent fraud detection rate. According to [7], the most effective credit card fraud detection system, which is the Dempster and Shafer Theory and Bayesian Learning, has 98 per cent fraud detection rate. Bayesian and Neural Network, Hidden Markov Model, and Hybridization of BLAST-SSAHA have fraud detection rates of 77, 70 and 86 percent respectively [7]. Consequently, the algorithm proposed herein stands out as the best. In terms of accuracy, the proposed algorithm has a very high accuracy of 98 per cent. However, [7] do not specify the numerical accuracy of Dempster and Shafer Theory and Bayesian Learning; Bayesian and Neural Network; Hidden Markov Model; and Hybridization of BLAST- SSAHA but simply specify their accuracy as high, medium, medium and high, respectively.
  • 13. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 11 5. CONCLUSIONS The proposed solution to fraud detection puts more emphasis on ensuring customer security in electronic transactions using credit cards. The strengths of the proposed algorithm include a high accuracy of 98%, a high fraud detection rate of 100%, ability to learn new fraud variations and new customer spending patterns (adaptive), and ability to detect and prevent fraud as it occurs (real-time). While the system has a high fool proof or fraud detection rate, it should be noted that a customer cannot transact even if they are the cardholder unless they have their registered mobile phone number and have registered their details on the website just as they are captured in the credit card issuer‟s database. The researcher‟s view is that security matters more than convenience, hence one cannot transact without their registered mobile number. An OTP is sent to a mobile phone via text messaging and not by electronic mail (e-mail) since e-mail can be easily hacked. The other reason for choosing to send an OTP via SMS was that a recipient is not charged for receiving an SMS in the author‟s country of residence. Prospective users of this algorithm may also decide to send an OTP to an e-mail rather than via SMS. The effectiveness of the proposed algorithm may be compromised if a criminal gets access to the legitimate cardholder‟s registered phone number, and e-commerce website authentication credentials. REFERENCES [1] Dheepa V. and Dhanapal R., "Analysis of Credit Card Fraud Detection Methods," International Journal of Recent Trends in Engineering, vol. 2, no. 3, pp. 126-128, 2009. [2] Ekrem D. and Hamdi O.M, "Detecting credit card fraud by genetic algorithm and scatter search," EXPERT SYSTEMS WITH APPLICATIONS, vol. 38, no. 10, pp. 13057-13063, 2011. [3] Gayathri R. and Malathi A., "Investigation of Data Mining Techniques in Fraud Detection: Credit Card," International Journal of Computer Applications, vol. 82, no. 9, pp. 12-15, 2013. [4] Linda D., Hussein A., and Pointon J., "Credit card fraud and detection techniques: a review," Banks and Bank Systems, vol. IV, no. 2, pp. 57-68, 2009. [5] Ogwueleka F.N, "Data mining applications in credit card fraud credit card fraud detection system," Journal of Engineering Science and Technology, vol. 6, no. 3, pp. 311-322, 2011. [6] Rama K. K and Uma D. D., "Fraud Detection of Credit Card Payment System by Genetic Algorithm," International Journal of Scientific & Engineering Research, vol. 3, no. 7, pp. 1-6, 2012. [7] Rana P.J and Baria J., "A Survey on Fraud Detection Techniques in Ecommerce," International Journal of Computer Applications, pp. 5-7, 2015. [8] Seeja K.R and Zareapoor M., "FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining," Scientific World Journal, vol. 2014, 2014.
  • 14. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 12 [9] Sharma A. and Panigrahi P.K, "A review of financial accounting fraud detection based on data mining techniques," International Journal of Computer Applications, vol. 39, no. 1, pp. 37-47, 2012. [10] Singh A. and Narayan D., "A Survey on Hidden Markov Model for Credit Card Fraud Detection," International Journal of Engineering and Advanced Technology, vol. 1, no. 3, pp. 49-52, 2012. This paper may be cited as: Batani, J. 2017. An Adaptive and Real-Time Fraud Detection Algorithm in Online Transactions. International Journal of Computer Science and Business Informatics, Vol. 17, No. 2, pp. 1-12.
  • 15. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 13 Agronomic Disaster Management using Artificial Intelligence - A Case Study M. Sudha Associate Professor School of Information Technology and Engineering VIT - India ABSTRACT Artificial Intelligence has become an essential tool in various hydrological data-driven forecast scenarios. The existing needs of farm management activities have witnessed the necessity of an intelligent decision support for strategic planning and implementation. This case study reports the benefits of application of neural network based short range precipitation prediction model in agronomic disaster management (ADM). This investigation describes the benefits of data-driven decision support systems for agronomic sustainability. Neural Network Architecture emerged recently have heterogeneous network design thereby suits for solving complex problems. The methodical evaluation conducted on agronomic disaster management framework designed using rough, genetic and neuro computing approach reported peak prediction accuracy of 97.21 % while the learning rate of the network was set to 0.7 for a fixed momentum of 0.5 producing a nominal error rate of 02.79%. Keywords Artificial intelligence, Agronomic disaster management, Daily precipitation prediction, Data-driven computing. 1. INTRODUCTION As a recent trend rapid proliferation of computers and developments in the area of information technology has increased the applications of computational intelligence in meteorological aspects. Computational intelligence approach has exposed a significant amendment in the advancement of new hybrid data-driven techniques in modeling the wide range of weather data [1], [2], [3] and [4]. Data-driven models are simple to understand and require no prior experience or expertise. Decision making is an execution of an activity that is more or less a human quest. A decision support system is a computer-based information system that help decision maker to deal with the problems through direct interaction with data and analysis model [5]. Soft computing approaches incorporate efficient computational methodologies stimulated by intrinsic vagueness, intuition and acquaintance of rational thinking and real world uncertainty. The intelligent systems designed to handle uncertainty in real life problems
  • 16. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 14 usually make use of rough set theory, neural network, evolutionary algorithms, and fuzzy sets approaches [6] and [7] Fuzziness and uncertainty exist almost everywhere, it is inevitable in atmospheric dynamics. 2. RELATED WORKS A systematic review was conducted to assess the applicability of data mining, artificial neural network, fuzzy inference system and evolutionary approaches in the modeling hydrological forecast. The review of the presented literature revealed that more often than rare the models have shown average performance in modeling hydrological predictions when compared with techniques that employ the concept of assimilating one or more intelligent approaches. From the following detailed review, it is clear that there is a necessity of much better hybrid soft computing approach which can handle weather parameters more intelligently rather than a black box model. In [8] it has been reported ANN as a superior method for modeling precipitation forecast scenarios. In [9], ANN has been applied for modeling daily precipitation forecasting in the Mashhad synoptic station. In [10] they have applied ANNs to predict the month wise maximum precipitation, minimum precipitation, average and total cumulative precipitation during a period of the next four consecutive months. [11] compared the performance of General Regression Neural Network (GRNN), ensemble neural network, BPNN, Radial Basis Function Network (RBFN), GA, MLP and fuzzy clustering for precipitation prediction. [12] applied ANN models and decision tree algorithm to forecast maximum temperature, precipitation, evaporation and wind speed at Ibadan city located in Nigeria. The results concluded ANN as a suitable tool for meteorological predictions. ANN and Fuzzy Logic (FL) algorithm for forecasting the stream-flow for the catchment of Savitri River Basin using 20 years (1992– 2011) precipitation and other hydrological data. While comparing both ANN and FL algorithms the investigation and empirical results reported that for prediction of hydrological scenarios ANN performance is quite superior to FL[8]. Assimilating the features of ANN and FIS has attracted the rising attention of researchers due to the growing requisite of adaptive intelligent systems to solve the real world requirements [13]. [14] ANFIS models are widely used in modeling daily precipitation prediction. [15] Developed a Modified ANFIS for modeling the nonlinear dynamic characteristics of precipitation events at the Klang River basin; Malaysia. [16] developed two different models for forecasting weather at two separate regions, Amman airport and Taipei, China using artificial neural networks and fuzzy logic. The prediction accuracy achieved by proposed models was satisfactory. [17]
  • 17. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 15 stated that ANFIS based models developed were configured and evaluated for six major dams of South Korea having high, medium and low reservoir capacity. The results showed significant improvement for categorical precipitation forecast using ANFIS. [18] applied ANFIS for forecasting drought, the quantitative value of drought indices and the Standardized Precipitation Index (SPI). In [6], a neuro-fuzzy model was developed to predict the monthly precipitation of the Daejeon Station in Korea. Choubin et al. (2014) developed a neuro-fuzzy model to forecast annual drought conditions in the Maharlu-Bakhtegan watershed, located in Iran. The study reported neuro- fuzzy model as a suitable method to analyze the influence of independent variables on dependent variables in hydrological applications. An ANFIS model has been applied to forecast of the groundwater level of Bastam Plain in Iran [19]. [20] Developed ANFIS for modeling long-term streamflow forecasting in Dez basin, Iran. The results reported ANFIS as a suitable method for streamflow forecasting, and K-fold cross validation method could increase the model reliability. [14] Reinstated that the performance of fuzzy inference system and artificial neural network based soft computing techniques are better than the L-moments approach used for flood forecasting. [21] Stated that ANFIS perform groundwater level prediction more accurately when compared to artificial neural networks and Bayesian neural networks. 3. CASE STUDY REGION Western-Ghats region of Tamil Nadu State (Coimbatore zone) in India is the case study region for the assessment of precipitation prediction. This region serves as Manchester of South India lying in the extreme western part of Tamil Nadu This district’s total area covers 746,800 hectares, and 43% of the region is bound to agricultural cultivation. The cotton, sugarcane, peanut sorghum, maize, rice, and pulses are the primary crops in this area. The study region is one of the most important agricultural and industrial areas in the country. Fast and independent industrial development projects have caused climatological changes in past years, hence raised necessity to conduct the assessment of factors influencing the current weather prediction. 4. MATERIALS AND METHODS The day wise observatory record of eight atmospheric parameters for precipitation prediction, measured in millimeter (mm), for 29 years from 1984 to 2013. The target sample data set used as input for this study is represented in Table 1, the dataset having 10,000 records with no missing values and outliers after pre-processing phase is subject to experimental evaluation. The decision attribute (Pp) is a binary decision variable, Pp =
  • 18. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 16 ‘no’ denotes no precipitation (rainfall) otherwise if Pp = ‘yes’ indicates precipitation (rainfall) occurrences. The parameter's values are recorded in an observatory in the daily basis as per the standard norms. Table 1. Observatory weather Dataset Observatory weather parameters Units Data type Data range Maximum temperature (Max) Celsius Float 27 - 398 Minimum temperature (Min) Celsius Float 2 - 335 Relative humidity 1 (Rh1) Percentage Float 5 - 100 Relative humidity 2 (Rh2) Percentage Float 1- 99 Wind speed (Ws) Km/hrs Float 01 - 227 Solar radiation (Sr) KCalories Float 24-688 Sunshine (Ss) Hrs Float 01-98 Evapotranspiration (Evp) mm Float 01-75 Precipitation prediction (Pp) mm Categorical Yes/no 5. AGRONOMIC DISASTER MANAGEMENT MODEL The sequentially hybridized artificial intelligence centered precipitation prediction model consists of input assessment, model training and testing phase. The model output enable the framing decisions such harvesting, sowing seeds, spraying pesticides or fertilizers to crops in the cultivated regions and other decisions such as storage, sale etc. Henceforth this model is referred as an agronomic disaster management model. A farmer is assisted to make a strategic decision on the farming activities such as harvesting early before damage if there is heavy precipitation in the next one or two days. Similarly farmers can plan for spraying the fertilizers ahead or in later time based on the environmental factor owing to precipitation. This decision support system modelled for agronomic disaster management is mainly designed based on data-driven modeling concept using rough sets based evolutionary computing and the three layered multi-layered back- propagation system. The learner is subject to learn the environment during the training process from the target input and evaluated with set of test data. The training algorithm uses sigmoid transfer function which is a well- known suitable neural network activation function. The input data can be one of the factors that may influence the output of the architecture. Subsequently, a multi-layered back-propagation multi-layered algorithm [22] is employed to train the ADM model in more effective way.
  • 19. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 17 The pseudocode of the multi-layered back-propagation algorithm is as below: 1. Begin 2. Initialize with randomly chosen weights and biases in network; 3. while error is above the threshold, do 4. for each training tuple X in W 5. { 6. for each input layer unit k 7. { 8. for each hidden or output layer unit k 9. { 10. 11. //compute the net input of unit k through previous layer, i 12. for each unit k in the output layer 13. 𝐸𝑟𝑟𝑗 = 𝑂𝑘(1 − 𝑂𝑘) (𝑇𝑘 − 𝑂𝑘) 14. 𝐸𝑟𝑟𝑗 = 𝑂𝑘(1 − 𝑂𝑘) 𝛴𝑗 𝐸𝑟𝑟𝑗 𝑊𝑘𝑗 15. for each weight in network "n" 16. △ 𝑊𝑖𝑘 = (𝑙)𝐸𝑟𝑟𝑘𝑂𝑖) 17. // weight increment 18. 19. // weight update 20. for each bias in network "n" 21. 22. // bias increment 23. 24. } // bias update 25. } } The proposed system is developed and implemented using Microsoft NET framework and its process flow is shown in Fig. 2. It consists of feature reduction stage, training and testing phase. The target data in the input for selection stage then the proposed system has been trained by reducts dataset generated using the proposed technique. The complexity of training the network for given |D| tuples and w weights, each epoch requires O (|D| x w) time [22].
  • 20. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 18 Figure 1. Flow design of Agronomic Disaster Management model 5. RESULTS The learning rate and momentum are set for approximately suitable random value and adjusted according to attain the desired output. From this methodical evaluation, the learning rate and momentum is fixed as 0.7 and 0.5 as in Table 2. The comparative evaluation of the various models under this investigation as projected in Table 3 and Figure 2 evidently reports that the prediction techniques have substantial improved when trained after feature reduction and the proposed model acquired high accuracy. The classification models used for training have shown better results when trained using the selected list of observatory parameters. The proposed model outperformed the existing approaches by reporting a nominal error rate of 2.71 % when compared to other existing classification algorithms. Random-forest classifier has reported low accuracy of 81.07 % with an error rate of 19.93 % and revealed the limitation of adopting this classifier in modeling real-time forecasting. Also, some hidden inferences such has Task relevant input data (1) BP- Perceptron model (2) Evolutionary Computing (3) Fuzzy Rule based model If Accuracy attained ≥ Peak accuracy Obtained error ≤ Desired error Yes Attained Prediction Accuracy No
  • 21. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 19 any classification model utilizing artificial intelligence exhibits better optimization potential when compared to other learning methods. The learning potential of a neural network and the benefit of error propagation strategy of the multi-layered back-propagation learning algorithm have enabled to attain the desired accuracy. The predictive models were judged statistically using the percent error of prediction and prediction yields. The experimental assessment revealed the potential of AI centered precipitation prediction model for harvesting, sowing seeds, spraying pesticides or fertilizers to crops over other existing prediction models. Table 2. Performance evaluation of proposed system for adaptable learning rate Learning Rate Momentum Accuracy rate Error rate 0.1 0.5 93.67% 6.32 % 0.5 0.5 94.17% 5.82% 0.7 0.5 97.21% 2.79% Table 3. Performance evaluation of Data-driven AMD vs existing models Parameter Selection Prediction Models Software Accuracy Exhaustive-forward selection search Random-forest classifier Weka-tool 81.07 % Information gain Fuzzy-unordered- rule-induction Weka-tool 84.97 % PSO Bayesian-network classifier Weka-tool 89.75 % Attribute weighting Fuzzy-neural classifier Weka-tool 91.79 % Relative fitness function Proposed -ADM RSES2.0 .NET 97.21
  • 22. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 20 Figure 2. Precipitation prediction accuracy optimization report 6. CONCLUSIONS Modeling user interactive agronomic disaster management model to support farming activities such as harvesting, sowing seeds, spraying patricides or fertilizer’s to crops utilizing real-time weather data is the primary concern of this research. Many intelligent techniques are employed in modeling precipitation forecast scenario. However, most of the techniques are not dealing with qualitative data. Therefore, this research has evolved input selection methods that could remove the superfluous parameter. Besides this, an efficient data-driven intelligent system is designed assimilating rough set based evolutionary computing and neural network to attain optimal prediction accuracy. Also, the limitations of the existing data mining models and the benefits of intelligent techniques in modeling weather forecast scenario has been reported based on the experimental outcomes. The proposed ADM achieved an optimal prediction accuracy of 97.21 % with the nominal error rate of 02.79%. The research attained the intent of developing an ADM with interactive user interface to enable operators to make regional prediction to support farming decisions. 81.07 84.97 89.75 91.79 97.21 70 75 80 85 90 95 100 Attained Prediction Accuracy (%) Accuracy (%)
  • 23. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 21 REFERENCES [1] Malik, A. and Kumar, A., 2015. Pan evaporation simulation based on daily meteorological data using soft computing techniques and multiple linear regression. Water resources management, 29(6), pp.1859-1872. [2] Sudha, M. and Subbu, K., 2017. Statistical Feature Ranking and Fuzzy Supervised Learning Approach in Modeling Regional Rainfall Prediction Systems. AGRIS On-line Papers in Economics and Informatics, 9(2), p.117. [3] Sudha, M., 2017. Intelligent decision support system based on rough set and fuzzy logic approach for efficacious precipitation forecast. Decision Science Letters, 6(1), pp.95-106. [4] Mohankumar, S. and Balasubramanian, V., 2016. Identifying Effective Features and Classifiers for Short Term Rainfall Forecast Using Rough Sets Maximum Frequency Weighted Feature Reduction Technique. CIT. Journal of Computing and Information Technology, 24(2), pp.181-194. [5] Sprague Jr, R.H. and Watson, H.J., 1996. Decision support for management. Prentice- Hall, Inc.. [6] Jeong, C., Shin, J.Y., Kim, T. and Heo, J.H., 2012. Monthly precipitation forecasting with a neuro-fuzzy model. Water resources management, 26(15), pp.4467-4483. [7] Pant, L.M. and Ganju, A., 2004. Fuzzy rule-based system for prediction of direct action avalanches. Current science, 87(1), pp.99-104. [8] Kothari, M. and Gharde, K.D., 2015. Application of ANN and fuzzy logic algorithms for streamflow modelling of Savitri catchment. Journal of Earth System Science, 124(5), pp.933-943. [9] Khalili, N., Khodashenas, S.R., Davary, K., Baygi, M.M. and Karimaldini, F., 2016. Prediction of rainfall using artificial neural networks for synoptic station of Mashhad: a case study. Arabian Journal of Geosciences, 9(13), p.624. [10]Moustris, K.P., Larissi, I.K., Nastos, P.T. and Paliatsos, A.G., 2011. Precipitation forecast using artificial neural networks in specific regions of Greece. Water resources management, 25(8), pp.1979-1993. [11]Narvekar, M. and Fargose, P., 2015. Daily weather forecasting using artificial neural network. International Journal of Computer Applications, 121(22). [12]Olaiya, F. and Adeyemo, A.B., 2012. Application of data mining techniques in weather prediction and climate change studies. International Journal of Information Engineering and Electronic Business, 4(1), p.51. [13]Abraham, A., 2001. Neuro fuzzy systems: State-of-the-art modeling techniques. Connectionist models of neurons, learning processes, and artificial intelligence, pp.269-276. [14]Kumar, R., Goel, N.K., Chatterjee, C. and Nayak, P.C., 2015. Regional flood frequency analysis using soft computing techniques. Water resources management, 29(6), pp.1965-1978. [15]Akrami, S.A., El-Shafie, A. and Jaafar, O., 2013. Improving rainfall forecasting efficiency using modified adaptive Neuro-Fuzzy Inference System (MANFIS). Water resources management, 27(9), pp.3507-3523. [16]Al-Matarneh, L., Sheta, A., Bani-Ahmad, S., Alshaer, J. and Al-oqily, I., 2014. Development of temperature-based weather forecasting models using neural networks and fuzzy logic. International journal of multimedia and ubiquitous engineering, 9(12), pp.343-366. [17]Awan, J.A. and Bae, D.H., 2014. Improving ANFIS based model for long-term dam inflow prediction by incorporating monthly rainfall forecasts. Water resources management, 28(5), pp.1185-1199.
  • 24. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 22 [18]Bacanli, U.G., Firat, M. and Dikbas, F., 2009. Adaptive neuro-fuzzy inference system for drought forecasting. Stochastic Environmental Research and Risk Assessment, 23(8), pp.1143-1154. [19]Emamgholizadeh, S., Moslemi, K. and Karami, G., 2014. Prediction the groundwater level of Bastam plain (Iran) by artificial neural network (ANN) and adaptive neuro- fuzzy inference system (ANFIS). Water resources management, 28(15), pp.5433-5446. [20]Esmaeelzadeh, S.R., Adib, A. and Alahdin, S., 2015. Long-term streamflow forecasts by Adaptive Neuro-Fuzzy Inference System using satellite images and K-fold cross- validation (Case study: Dez, Iran). KSCE Journal of Civil Engineering, 19(7), p.2298. [21]Maiti, S. and Tiwari, R.K., 2014. A comparative study of artificial neural networks, Bayesian neural networks and adaptive neuro-fuzzy inference system in groundwater level prediction. Environmental earth sciences, 71(7), pp.3147-3160. [22]Han, J., Pei, J. and Kamber, M., 2011. Data mining: concepts and techniques. Elsevier. This paper may be cited as: Sudha, M. 2017. Agronomic Disaster Management using Artificial Intelligence - A Case Study. International Journal of Computer Science and Business Informatics, Vol. 17, No. 2, pp. 12-22.
  • 25. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 23 Household Power Optimisation and Monitoring System John Batani, Silence Dzambo and Israel Magodi ICT & Electronics Department Chinhoyi University of Technology, P.Bag 7724 Chinhoyi, Zimbabwe ABSTRACT Like most of the developing countries, Zimbabwe continues to face critical electricity shortages. In this paper, the authors present a smart solution for reducing electricity usage in households while improving comfort levels for the dwellers. The authors developed a prototype to optimise electricity usage by domestic appliances. In attaining optimal power usage in households and remote manipulation of household appliances, the researchers utilized the design science research methodology. The proposed system reduced power usage and cost of electricity in households by at least 50 per cent. The results benefit the nation by reducing domestic electricity usage and thus reducing the overall electricity shortages which may affect the manufacturing and other sectors of the economy. Remote manipulation of, and communication with the devices by the user are achieved through the Bluetooth technology and the Global System for Mobile communication. When the user turns on a stove, the system automatically turns off the fridge to minimise power consumed. However, the performance of this system may be affected by the performance of the sensors used. The focus of this paper was to reduce the amount of electricity consumed by households, thus reducing the overall stress on the national power grid and increasing the available electricity for industrial use, leading to employment creation. The proposed system can help in the realization of the UN’s SDGs through ensuring there is adequate electricity for industrial use, as espoused by SDG 9. Keywords Power optimization, Household power saving, Electricity saving, Electricity shortage, SDGs, IT4D, ICT4D. 1. INTRODUCTION The importance of electricity in any economy cannot be underestimated [1,2], hence the need to efficiently use it. Zimbabwe currently has a shortage of electricity and since 2007 the nation has experienced load shedding due to inadequate generation of electricity by the national power utility company [3]. [4]has it that there is generally shortage of electricity globally, and Zimbabwe is no exception. According to [3] Zimbabwe will continue to have electricity shortages for upto 8 more years due to the incapacity to generate sufficient electricity. Several attempts, such as the use of energy savers, electricity importation and use of alternative, natural power sources
  • 26. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 24 such as gas and solar, have been made to ease pressure on the insufficient electricity in Zimbabwe. However, the problem of electricity shortage in Zimbabwe still persists, and there is a call to everyone to contribute towards solving the problem [3]. In light of this, the researchers developed a household power optimization and monitoring system for optimizing the usage of the inadequate electricity that is currently generated in the country while not inconveniencing the users. Africa’s electricity shortage is hugely characterised by continuing power cuts and a complete deficiency of electricity infrastructure [5]. This has resulted in negative effects to human and socioeconomic development across the continent [5]. According to [5], only an average of 40 per cent of Africans enjoy a consistent electricity supply; while only 69 per cent of the electrified homes really have electricity that works most or all of the time. 62 per cent of Zimbabwe’s population has access to an electricity grid [5]. [5] claim that only 30 per cent of Zimbabweans have electricity that works reliably, 26 per cent have electricity that works half the time while 44 per cent have electricity that either works ocassionally or not at all. Zimbabwe Electricty Supply Authority (ZESA) is the sole producer, distributor and seller of electricity. [6] states that the electricity industry in Zimbabwe has operated as a controlled monolopoly for about five decades. [3] has it that they will reduce electricity generation from 750MW to 475MW due to reduced dam levels since most of the electricity in the country in hydro generated. Zimbabwe has had an 80 per cent urban electrification, 20 per cent rural electrification, and 41 per cent overall elecrification growth from 1980 to 2007 [7]. An unmatched increasing population and balooning number of electric appliances has created an electricity shortage in Zimbabwe, resulting in substantial load shedding [3]. This electricity shortage is despite several efforts that have been made to increase electricity supply and reduce electricity consumption in Zimbabwe, including power importation, use of energy savers and use of alternative energy sources such as solar and biogas [3]. All over the world, several IT based systems have been developed in an attempt to reduce excessive power demand, such as the Green Building in Italy [8]. In Zimbabwe, little has been done to optimise power usage through the use of ICTs [1]. In 2012 ZESA introduced pre-paid meters as to enable customers to manage their electricity bills and encourage them to use electricity wisely. Despite all these efforts, Zimbabwe still faces electricity shortage [3], hence the need to come up with a solution for optimisation
  • 27. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 25 1.1 Problem Statement There is generally a serious shortage of electricity in the whole world in general and Zimbabwe in particular [4]. Zimbabwe has a reliable electricity capacity of the order of 1 320 MW (Megawatts) against a demand of about 2 200 MW [9]. [10] concurs that Zimbabwe is facing critical electricity shortages due to inadequate electricity generation. Several efforts have been made in Zimbabwe to reduce electricity consumption and improve electricity supply. Such efforts include the use of energy savers, electricity importation and use of alternative, natural power sources such as gas and solar. However, Zimbabwe continues to face electricity shortages as evidenced by massive power cuts and load shedding [3]. This has affected both domestic and industrial consumers; hence the need to come up with a solution that optimises electricity usage in Zimbabwe. 1.2 Research Objectives 1. To design an automated system that optimises electricity usage in households. 2. To design an android application that enables remote manipulation and monitoring of plugged on household electric appliances. 1.3 Significance of the Study This study seeks to come up with a solution for optimising electricity usage in households; hence reducing the load on the national grid. Reducing electricity consumed by households reduces the national demand for electricity and may save the country foreign currency in reducing electricity imports. Moreover, if domestic electricity consumption is reduced, it increases the amount of electricity available for industrial use, which in turn may improve employment creation. According to [11], every single occupation in the manufacturing sector generates more than two million occupations in other sectors, hence it is important to ensure that the manufacturing sector is sufficiently powered. In addition to power usage optimisation, the study also seeks to reduce electricity bills for household consumers 2. RELATED WORKS Power optimization refers to reducing the amount of power consumed by devices (such as home appliances, while preserving their functionality) through designing automation tools that minimise power wastage [12]. A well designed monitoring system should be capable of maintaining preset environmental conditions in the building [13]. Various solutions for energy saving in households using smart technology have been proposed and developed. Most approaches in literature for energy saving in households focus on lowering the power consumed by heating, ventilation and air conditioning (HVAC) appliances, such as the household heating systems
  • 28. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 26 [14], air-conditioning [15] or both of them [16]. [17] further identified lighting and home appliances as two more areas to be incorporated in energy management features to minimize the domestic energy waste. Other power optimisation solutions indirectly attend to lowering the power consumed by such (HVAC) devices by providing improved monitoring and controlling options for the devices, which will in turn result in power consumption being lowered [18]. The majority of such solutions employ a wide range of sensors for measuring humidity and temperature, the data from which are processed by fuzzy controllers [14]. [8] designed an automated power management system called the GreenBuilding. This system used sensors to intelligently monitor power usage and automatically control the behaviour of devices in a building. The system provides a dashboard through which a user can view power consumption statistics by each appliance [8]. The Arduino platform was used in designing the network of sensors. Although GreenBuilding allows the user to view reports based of power consumptions, it does not send notifications/alerts to the user through the phone pertaining electric appliance consumption or status notifications. Moreover, once GreenBuilding is installed, it does not allow users to create their own modes based on their own priority preferences on appliances. The Smart Grid is another power optimisation solution which is an amalgamation of communication and electric infrastructure through IT in the current electrical networks to boost efficiency [19]. This system can control daily used household devices according to user defined tariff rates for each particular device, thus reducing electricity costs to the consumer and reducing pressure on the grid [20]. [21] designed a simple system for remotely controlling and monitoring lights, using the Global System for Mobile Communication for long range communication and Bluetooth technology for short range communication. The system sought to reduce electricity consumed by household devices through the use of infrared sensor. Apart from reducing electricity usage, the system also notified users of any irregular situations (like high temperatures and intrusions) through Short Messaging System or Bluetooth technology. Upon receiving a notification on a mobile phone the user initiates appropriate action which will be implemented by the system [21]. The use of Bluetooth for communication reduces costs since communication via Bluetooth is not charged. However, the system is inefficient in circumstances that require high real-time data transfer. It also does not operate in various modes once it is started off, leaving the user with little room to make some options on the usage level of the system. Moreover, the
  • 29. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 27 system does not prioritise electricity usage on different household appliances based on the available power. [22] developed a Smart Power Saving System in smart homes for controlling appliances with the aim of saving power. The system comprises two modules namely fingerprint electronic door-locking and electricity saving. It uses GSM for interaction between the microcontroller and the phone. A user scans their fingerprint on the door-lock and if it matches, the electricity saving module will be turned on. The electricity saving sub-unit controls household electric devices in the home in response to the relative conditions from different sensors installed in the room. Fan and lights are switched on/off in response to the temperature and light intensity inside the home [22]. However, the module had a narrow scope in terms of monitoring and controlling electricity usage. This is evidenced by the system’s target on small household appliances specifically fan and lights whilst larger appliances with higher consumption were excluded such as stoves and fridges. The biometric module in the system added unnecessary costs as far as the power saving was concerned. The biometric module was more into security than power saving. Artificial Intelligent-based systems have also been proposed for power usage optimization. These learn about the behavior of an inhabitant in a smart house to self-adjust the system so that it can be independent and easy to personalize [23]. Of late, several of such Artificial Intelligent methods for recognizing user activities using supervised learning in a smart home have been published [24]. The main disadvantage of such systems though is that they need prior labeled data for training the algorithms. Manually representing human behavior data in line with event sensor readings takes a lot of time and is monotonous and makes the system less scalable [25]. Furthermore, it is highly impractical in reality that all further inhabitant activities will be similar with training data, thus making such systems more suitable only for the homes for which they were designed [26]. [6] implemented a home automation system using Arduino and Android, but their focus was more on smart homes and the comfort associated with them rather than power saving. 3. METHODOLOGY The design science research methodology (Improvement Research) was adopted for this research. The approach focuses on creation, invention or design of some new artifacts, while deriving or obtaining suggestions to solving the problem from current knowledge or theory base for the problem domain [27]. Figure 1 shows the architecture of the proposed system.
  • 30. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 28 Figure 1. System Architecture Current sensors are connected to AC power source to which home appliances are connected. The current sensors communicate with Arduino which in turn is interfaced with the GSM module. A user can interact with the system through an Android application. For example, if an appliance is turned on, say a fan, a current sensor will send information to the Arduino which will communicate with the GSM module, and a user will be notified either via SMS or Bluetooth in the form of a system status. A user can also turn on or off appliances remotely via an Android application through the GSM module, Arduino and a relay action will be sent to the AC power source. This means a user can turn on or off any appliance in the home from anywhere. When power is restored after a power cut, the user will be automatically notified and shown all appliances that will be on at that time so that the user can decide which ones to turn off, thus eliminating unnecessary power wastages. Temperature, motion and light sensors will provide values to the Arduino, and depending on the rules set and values read it will send appropriate relay actions to the power source. The system also generates graphical electricity consumption reports, showing which appliances consumed how much electricity per given period. Sensors
  • 31. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 29 START Initialise sensors, GSM and LCD Read motion sensor status Motion detected? Read temperature sensor value Read light intensity sensor value Temperature sensor value<set point? Light sensor value> set value? Turn off fan via relay Notify user (SMS) YES Turn off light via relay Notify user (SMS) YES Turn OFF lights and fan if ON NO NO NO Delay for 5 minutes Delay for 10 seconds Figure 2. System Flow Chart The motion sensor is used to check whether there is anyone in the house. If there is no one yet lights and/ or fan is on, the system will automatically turn them off. The assumption is someone might have forgotten to switch them off before leaving the room. The system will check again whether there is anyone in the room after ten seconds. This ten seconds delay can be set to another value as determined by the user in line with their requirements. If motion is detected, the system checks whether there is enough light intensity and heat as determined by the user. If light intensity is too low, lights will automatically be turned on. Conversely, if light intensity is too high, lights will be automatically turned off. The fan will also be turned on if
  • 32. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 30 temperature is higher than a user set value and will be turned off if temperature rises to a maximum desirable value. When 5 minutes have elapsed, the system will check again whether there is anyone in the room by reading a motion sensor status. This iterates as long as the system is up and running. The Algorithm START Let: MaxTemp be the maximum room temperature before fan automatically turns on MinTemp be the minimum room temperature before fan automatically t urns off MaxLight be the maximum room light intensity before lights automatically turn off MinLight be the minimum light intensity before lights automatically turn on Note: User sets custom values to MaxTemp, MinTemp, MaxLight and MinLight according to their preferences. Steps: I. Initialise sensors, GSM and LCD II. Read motion sensor status a. If motion is detected i. Read temperature sensor value 1. If temperature sensor value < MinTemp Then a. Turn off fan and notify user on mobile phone b. Delay for 5 minutes and goto to step I 2. Else if temperature sensor value> MaxTemp Then a. Turn on fan and notify user 3. Else delay for 6 seconds and goto step II.a.i. 4. End if ii. Read light intensity sensor value 1. If light intensity > MaxLight Then a. Turn off lights 2. Else if light intensity < MinLight Then a. Turn on lights and notify user
  • 33. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 31 3. Else delay for 6 seconds and goto step I.a.ii. b. Else i. Delay for 5 minutes ii. Goto step II End If III. If stove is turned ON Then a. If fridge is ON Then i. Automatically turn OFF fridge and notify user ii. End If b. End If IV. If user turns stove OFF Then a. If fridge is OFF Then i. Automatically turn ON the fridge and notify user ii. End If b. End If The system was implemented using the Java Programming language, which was used to link the user interface and the SQLite database. In addition to Java code, XML was used to create the interfaces for the android application. Eclipse Indigo IDE was used to implement the application. The Android SDK and ADT were also used. The researchers created, compiled, debugged and deployed the android application from the Eclipse IDE using the android ADT. The Android SDK was integrated into the Eclipse IDE to help create and test the system during different iterations of the application. SQLite was used for the database. The following hardware components are required in the development of the prototype and testing of the prototype: Arduino UNO (R3), GSM Module with an unlocked SIM card, 4 Channel 5 volt Relay, Connecting wires, Bread board, 16x2 LCD, Power supply, An Android mobile phone for hosting the user application, Sensors (PIR motion sensor, ACS712 current sensor, LM35 temperature sensor and LDR light intensity sensor), and Resistors. Android Studio, Arduino Development Tool, Eclipse IDE and Proteus must also be installed on the development computer.
  • 34. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 32 4. RESULTS The system was evaluated in terms of its ability to optimise power usage by domestic appliances. While a prototype was developed and tested using a fan, light bulb, stove and water heater as the household appliances, its effectiveness in terms of power consumption optimisation was measured for the light bulb only. The researchers calculated light bulb power consumption over 24 hours for best and worst cases. The researchers then ran a 24 hours long experiment using the same light bulb on a prototype of the proposed system. The results of these experiments are shown in Table 1. The results indicate a significant drop in power usage when using the system being proposed herein. Monthly figures are derived from the average daily figures obtained from the experiments. The light bulb used was a 230V, 100W bulb which consumes 0.1 kW per hour. Table 1. Power Consumption Comparison for a light bulb before and after installation of the system The worst case scenario is when an appliance remains on for the whole day and night. Given that the bulb used consumed 0.1kW per hour, if left on for 24 hours it will consume 2.4kW. This worst case scenario is only possible if no power optimisation system is implemented. In this experiment, the researchers defined the best case as the case when consumption time is at least 12 hours but less than 24 hours per day. Taking the lower bound of 12 and upper bound of 24 hours per day and calculating the average of the two, it gives 18 hours as the best case scenario’s hours when the light will be on per day. The assumption is that the user will be turning the lights on and off when necessary. For 18 hours at a consumption of 0.1 kW per hour, the light bulb will consume 1.8kW per day. The optimal case is was when the power Before Installation After Installation Worst Case Best Case Optimal Case Appliance: light bulb Average hourly consumption (kW) 0.1 0.1 0.1 Maximum total consumption time (Hours) 24 18 12 Maximum total consumption (kW) 2.4 1.8 1.2
  • 35. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 33 optimisation system was used. Under this case, lights were only on for 12 hours per day, when it was dark, and hence consumed 1.2kW. Table 2. Comparisons of Power Consumption Costs The researchers used Equation 1 for calculating electricity cost savings as a percentage: 𝐸𝐶𝑆𝑃 = 𝐸𝐶𝐵𝐼−𝐸𝐶𝐴𝐼 ∗100 𝐸𝐶𝐵𝐼 ... .… Equation 1 Where ECSP = Electricity Cost Savings as a percentage, ECBI = Electricity Cost Before Installation of the system, ECAI = Electricity Cost After Installation of the system Cost savings were calculated for both the worst and best case scenarios using Equation 1. For the worst case scenario: 𝐸𝐶𝑆𝑃 = 𝐸𝐶𝐵𝐼 − 𝐸𝐶𝐴𝐼 ∗ 100 𝐸𝐶𝐵𝐼 Before Installation After Installation Worst Case Best Case Optimal Case Appliance: light bulb Average hourly consumption (kW) 0.1 0.1 0.1 Maximum total consumption time (Hours) 24 18 12 Maximum total consumption (kW) 2.4 1.8 1.2 Cost per kW per hour (US$) 0.09 0.09 0.09 Estimated total cost per day (US $) 0.216 0.162 0.108 Estimated total cost per month (US $) 6.48 4.86 3.24
  • 36. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 34 = $(6.48 − 3.24) ∗ 100 $6.48 ∴ 𝑬𝑪𝑺𝑷 = 𝟓𝟎% For the best case scenario: 𝐸𝐶𝑆𝑃 = 𝐸𝐶𝐵𝐼 − 𝐸𝐶𝐴𝐼 ∗ 100 𝐸𝐶𝐵𝐼 = $ 4.86 − 3.24 ∗ 100 $4.86 ∴ 𝑬𝑪𝑺𝑷 = 𝟑𝟑 𝟏 𝟑 % Cost of electricity is directly proportional to usage, hence reducing electricity consumption results in reduced cost of electricity to domestic electricity consumers. In terms of percentages, reduction in cost is equal to reduction in the amount of power consumed. The results indicate that implementing the household power optimisation and monitoring system resulted in cost saving of 33.3 per cent and 50 per cent for the best and worst case scenarios respectively. Consequently, it means the amount of power consumed was reduced by the same margins. The system resulted in optimal power usage and thus reduced demand for electricity. Apart from power usage optimisation, the system improves comfort levels for users as they remotely monitor and control their household devices. The ability of users to monitor and control household electric devices from a distance is also useful for people living with disabilities as they can control and monitor appliances in the home without having to physically move around to power switches which are usually mounted on different points on the walls of houses. A number of authors who have been engaged in making smart homes systems concentrated more on improving the comfort for inhabitants than electricity saving. [28], [29] and [30] have focused more on automation with little inclination towards power saving, hence they did not state how much could be saved by implementing their systems. While some of the systems resulted in electricity savings the researchers did not quantify the electricity savings; thus providing no comparison basis. [14] claim that their system reduced electricity consumption by domestic heating but did not state by how much. 5. CONCLUSIONS The Household Power Optimisation and Monitoring System proposed herein focused mainly on reducing the amount of electricity consumed by households and hence reducing stress on the national power grid. The results of the system indicate that the system can reduce power consumption in households by up to 50 per cent. This 50 per cent reduction in electricity
  • 37. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 35 consumed translates to 50 per cent savings in electricity costs to households. It is important to save electricity since electrical power is scarce in developing countries like Zimbabwe [11]. Saving electricity in households increases the amount of electricity available for industrial use, which in turn increases employment creation. [11] claims that every single occupation in the manufacturing sector generates more than two million occupations in other sectors of the economy, hence it is imperative to make sure that there is enough electricity for the manufacturing industry. The system also has other benefits of convenience and comfort since users can remotely manipulate appliances on their phones. This feature makes this system an inclusive solution as it also helps people living with disabilities to manipulate appliances on their own without having to move around to different power switch points around the home to power on or off appliances. However, the system could be improved by incorporating voice commands to control appliances. It could also be improved by adding a functionality of predicting future consumption of an appliance based on past and present consumption patterns. The system is designed on the assumptions that supply of electricity is always less than demand; the users are not using the available electricity optimally and all policies pertaining electrical usage are held constant. The performance of this system depends on the performance of the sensors. Moreover, remote manipulation of electric gadgets will depend on the availability of network, hence remote manipulation and monitoring may not work if there is no network coverage, unless the user is within the Bluetooth range. The focus of the study is to optimise power usage in households only. 6. REFERENCES [1] Nyasha Kaseke, "Journal of Business Management & Social Sciences Research," Emergence Of Electricity Crisis In Zimbabwe, Reform Response And Cost Implications, vol. 2, no. 10, pp. 1-16, October 2013. [2] Tichaona Chifamba. (2011) Commercial Farmers Union of Zimbabwe Web site. [Online]. http://www.cfuzim.org/index.php/newspaper-articles-2/zesa/2516- continuing-power-shortages-cripple-zimbabwe-economy [3] ZESA. (2013, January) ZESA Holdings Web site. [Online]. http://www.zesa.co.zw/index.php/component/k2/item/17-why-do-we-have-load- shedding? [4] Tom Chuma. (2012, Oct.) A case study of zimbabwe. [Online]. https://leadpanafricansession.files.wordpress.com/2012/11/zimbabwe-case- study1.doc [5] Abel Oyuke, Halley Peter Penar, and Brian Howard, "Off-grid or 'off-on':Lack of access, unreliable electricity supply still plague majority of Africans," Afrobarometer Dispatch, vol. 6, no. 75, pp. 1-26, March 2016.
  • 38. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 36 [6] S.E. Mangwengwende, "Increasing Electricity Access While Ensuring Financial Viabilityy: A Perspective form the African Electricity Industry," in Global Network on Energy For Suatinable Development (GNESD), Nairobi, 2005. [7] Central Statistics Office, "Power Statistics in Zimbabwe," Power Statistics in Zimbabwe, 2008. [8] Giuseppe Anastasi, Francesco Corucci, and Francesco Marcelloni, "An Intelligent System for Electrical Energy Management in Buildings," in 11th International Conference on Intelligent Systems Design and Applications, 2012. [9] Allan Shirichena. (2014) http://www.technomag.co.zw. [Online]. http://www.technomag.co.zw/2014/11/04/zimbabwes-energy-crisis-demand-supply- imbalance/#stash. [10] Phillimon Mhlanga. (2014) Financial Gazzette. [Online]. http://www.financialgazette.co.zw/zim-faces-unprecedented-power-crisis/ [11] The United Nations. (2016, August) The United Nations Web site. [Online]. http://www.un.org/sustainabledevelopment/wp-content/uploads/2016/08/9_Why-it- Matters_Goal-9_Industry_1p.pdf [12] Jan M Rabaey, Anantha Chandrakasan, and Borivoje Nikolic, Digital Integrated Circuits, 2nd ed., 2002. [13] University of Kentucky. (2014) KENTUCKY POULTRY ENERGY EFFICIENCY PROJECT. [Online]. http://www2.ca.uky.edu/poultryprofitability/Production_manual/Chapter11_Monitori ng_and_control_systems/Chapter11_overview_of_systems.html [14] J. Villar, E. de la Cal, and J Sedano, "A fuzzy logic based efficient energy saving approach for domestic heating systems.," Integrated Computer-Aided Engineering, vol. 15, pp. 1-9, 2009. [15] Y. He, "Energy saving of central air-conditioning and control system:," Energy saving of central air-conditioning and control system: Case study: Nanchang Hongkelong Supermarket., vol. 1, p. 12, 2010. [16] M. Nowak and A. Urbaniak, "Utilization of intelligent control algorithms for thermal comfort optimization and energy saving.," in 2011 12th IEEE Control Conference, 2011. [17] E. Inji, I. Attia, and P Hamdy, "Energy Saving Through Smart Home.," Energy Saving Through Smart Home., vol. 2, pp. 22-34, 2011. [18] M. Jahn, "The Energy Aware Smart Home.," The Energy Aware Smart Home., pp. 1- 9, 2010. [19] Borlase, Smart Grids: Infrastructure, Technology and Solutions, CRC Press, Ed.: Taylor and Francis Group, 2012. [20] S.P.S. Gill, "Smart Power Monitoring System Using," Sixth International Conference on Sensing Technology, p. 1, 2012. [21] Vini Madan, "GSM-Bluetooth based Remote Monitoring and Control System with Automatic Light Controller," International Journal of Computer Applications, p. 1, 2012.
  • 39. International Journal of Computer Science and Business Informatics IJCSBI.ORG ISSN: 1694-2108 | Vol. 17, No. 2. JULY-DECEMBER 2017 37 [22] M, S Madhu, M Gangadhar, and G, C Sanjaya, "ARM Based Smart Power Saving System for Home Automation," International Journal of Computer Science and Information Technologies, Vol. 5 (3), pp. 2910-2913, 2014. [23] Bengio Roux, "Deep belief networks are compact," Neural Computation, vol. 22, no. 8, p. 192, 2010. [24] F., Rokach, L., Shapira, B., Ricci, Recommender Systems Handbook. Boston, MA: Springer US, 2011. [25] Hyong-Euk Lee and Young-Min Kim, From Smart Home to Smart Care, G Giroux & H Pigot (Eds), Ed.: IOS Press, 2005. [26] D. Cook, "A method for mining and monitoring human activity patterns in home- based health monitoring systems.," ACM Transactions on Intelligent Systems, vol. 4, p. 9, 2013. [27] C.S Peirce, Collected Papers of Charles Sanders Peirce, C and Weiss , P. Eds Harshorne, Ed. Cambrigdge: Havard University Press, 1985. [28] Poonam B. Patil, Rupali.R Patil, Swati V. Patil, and Avadhoot R. Telepatil, "Home Automation System Using Android and Arduino Board," International Journal of Innovative Research in Science, Engineering and Technology, vol. 5, no. 4, pp. 5076- 5082, April 2016. [29] M.L Sharma, Kumar Sachin, and Mehta Nipuri, "SMART HOME SYSTEM USING IOT," International Research Journal of Engineering and Technology, vol. 4, no. 11, pp. 1108-1112, November 2017. [30] P Sushma and M.J Roopa, "Wi-Fi Based Home Automation System Using Androis & Arduino Platform," International Journal for Research in Applied Science and Engineering, vol. 5, no. VI, pp. 942-945, June 2017. This paper may be cited as: Batani, J., Dzambo, S. and Magodi, I., 2017. Household Power Optimisation and Monitoring System. International Journal of Computer Science and Business Informatics, Vol. 17, No. 2, pp. 23-37.