SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 387 
DATA DISCRIMINATION PREVENTION IN CUSTOMER RELATIONSHIP MANAGMENT Pradnya Deshpande1, Rashi2, Sneha Zanzane3 1Bhivarabai Sawant Institute of Technology and Research, Pune University of Pune 2Bhivarabai Sawant Institute of Technology and Research, Pune University of Pune 3Bhivarabai Sawant Institute of Technology and Research, Pune University of Pune Abstract Data mining is a very important technology to derive important data occult in pompous heap of data. However, there is negative social awareness about data mining. It consists of unfairly treating people on the basis of their membership to a specific group. Automated data aggregation and data mining methods is useful in making automated decision such as customer identification and customer development. If partiality in training data sets is such a that regards sensitive attributes like gender, religion, color etc. Then discriminatory issues can arise. To remove this, antidiscrimination methods like discrimination discovery and prevention have been included in data mining. Direct and indirect are the two types of discrimination. When decisions are made based on discriminatory entities then, that discrimination is direct discrimination. When decisions are made based on non-discriminatory entities then that discrimination is indirect discrimination. Indirect discrimination corresponds to biased sensitive issues. Here we proposed discrimination prevention in data mining for customer relationship management. We proposed an enabling system supporting a business strategy for long term, profitable relationships with customers. Our paper is related to one-to-one marketing and loyalty programs. Our paper is related to the discrimination in online shopping system. Location based discrimination and dynamic pricing are the main objectives of our papers. Keywords: Antidiscrimination, direct and indirect discrimination prevention, data mining, dynamic pricing, Apriori algorithm. 
--------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Data mining is the process of extracting information from a set of data and transforming it into a suitable structure for future use. It includes raw analysis step, database and data management aspects. It is largely applied to any pattern of huge data or information processing. Multiple groups in data which can be used to obtain more accurate prediction results by decision support system are identified by data mining step .Data mining is very helpful in extracting important data from a large collection of database. There are six common types of task in data mining [4]. 
Anomaly detection – anomaly detection is the verification of items, events that need further investigation. It is applicable to fraud detection 
Association rule learning –it is used for finding relations between fluctuating variables in huge data sets. 
Clustering –the grouping of identical objects is called clustering. It is used in sequence analysis. 
Classification –process of identifying categories of new objects. It is used in drug discovery and development. 
Regression – it is used to find methods of data with minimum errors. 
Summarization – it gives summary of set of data which include generation of report. 
Discrimination is nothing but unequal treatment that causes harm. Discrimination is of two types: direct and indirect. Direct discrimination can spotted easily .Direct discrimination happens when merit or ability are not the factors for the decision making. Instead of it is based on gender, race, religion or age. Indirect discrimination occurs when an employer impose certain requirements, practices and conditions that has an unfavorable impact on one group or other. With direct discrimination employee can argue that there may be discrimination but that is required for the job. 
Fig.1. Data mining technique
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 388 
Customer relationship management (CRM) is a technology for management of interaction between company and company’s current and future customers. It provides automation in the process. Operational and analytical are the two types of CRM framework. In operational CRM the automation of business process is done and in analytical CRM diagnosis of characteristic and behavior of customer is done. Analytical CRM is useful in better discrimination for an organization to allocate resources to group of customers which might be profitable for organization in future. In this paper we are presenting a methodology for preventing discrimination in customer relationship management for online shopping system. In online shopping website a large collection of data is present. The data contains information about various products of different categories. We cannot analyze them manually; this will cause wastage of time and information. Thus we can use the concept of data mining in this area. In online shopping system there may be possibilities of discrimination among the customers depending on the location. 2. METHODOLOGY The Predreschi et al. was the first to propose the discovery of discriminatory decisions [5] [8]. The inductive part i.e. mining classification and the deductive part i.e. reasoning on them on quantitative measures of discriminations that forms the legal definition of discrimination are the major approaches of it. The antidiscrimination i.e. discrimination prevention in data mining contains the inclusion of patterns which will not cause any discriminatory decisions even though the there is a biased data sets are present. Three methods are used for discrimination prevention: 2.1 Preprocessing: Preprocessing is process of transforming source data. It transforms the data in such a way that discriminatory attributes contained in a source data are removed so that illegal decision rules are removed from the transformed data. After that we can apply any standard algorithm for data mining. The privacy preservation documentation can adapt the hierarchy based generalization and data transformation which are the approaches of the preprocessing. For this [6] , [7] performs the disciplined exaggeration of the training data sets from which classifier can make minimum modifications in the data sets to get fair data. Preprocessing is mostly used when data mining is to be performed by external parties (other than data holders). In the case of online shopping system when the customer places an order then the process of customer authentication is preprocess. 2.2 In-processing: 
The data mining algorithms have to be changed in such a way that there should not be any inequitable rules of decision. For instance, to remove the discrimination from the source data set different technique is given in [9] where nondiscriminatory information is enclosed within the decision trees by providing a different approach for the criteria for splitting and trimming strategy through approach of relabeling the novel leaf[1]. However, in-processing discrimination method must be built on some new unusual data mining algorithms. Here we cannot use standard data mining algorithms. There can be possibility of discrimination in in-processing in the availability of the product according at pin code of the customer. 
2.3 Post-processing: Instead of removing data from source data set or modifying the data mining algorithms, it is more suitable to modify the resulting data mining models. For instance, in [15], for classification rules confidence-altering methods are firmly proposed. Publishing of data sets are not allowed in the postprocessing technique. It only allows publishing the modified data mining models (judgmental publishing). Because of this only data holders can perform data mining. In the order processing, sometimes it may happen that if customer places the order and his/her payment is done the seller can take much time to deliver the product rather than cash on delivery. 
Fig.2. Knowledge discovery process Preprocessing approach is the easiest technique for removing discrimination but it mostly causes important information loss from the source data set. Preprocessing is the technique which solves the problem of direct discrimination. But it causes indirect discrimination in most of the cases. There are some instances like pin code is not acceptable for some websites for delivery of the product, and there can be some instances that are exceptionally associated with the sensitive attributes (e.g. Race) which are responsible for the direct and indirect discrimination. There are two crucial challenges related to discrimination prevention: 
1. The first and important challenge is we should consider both direct and indirect discrimination and not only the direct discrimination. 
2. The next challenge is to search for better settlement between removal of discrimination and quality of the transformed data set and data mining models.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 389 
Even though there are many already proposed techniques which are used for discrimination prevention for above stated methods (preprocessing, in-processing, post processing), discrimination prevention in customer relationship management for online shopping system stays a largely unfamiliar research approach. In this paper we have concentrated on discrimination prevention techniques which are very much useful for customers as well as organizations so that no one should face the discrimination. Here we have proposed our system for the discrimination which is relegated to the online shopping system. After analyzing and interpreting the data sets, the resulting models and correlations may become useful observation and tools for decision. 
Fig. 3: Data processing 3. PLAN OF THIS PAPER 
Here we are trying to discover and remove direct discrimination as well as indirect discrimination. In this paper we have discussed some methods for preprocessing for preventing discrimination in online shopping system. In online shopping system there can be possibility that there is unavailability of product which is requested by the customer at particular pin code provided. We have to check the availability of the product. Here indirect discrimination can happen if the website provides that this particular product is not available for the pin code. This can be prevented by using APRIORI algorithm which is already explained in some paper on discrimination prevention. By using this algorithm we avoid discrimination by providing some other sellers those can deliver the product at that pin code. This will prevent location based indirect discrimination. In some cases it can happen that product requested by customer is not available with the same specifications then instead of directly cancelling the order of the customer we can suggest them the alternatives with either same specification but different seller or with same seller but with some other specifications. 
Apriori algorithm formula applied to check reach-ability of seller 
Conf (pincode->seller) = 풔풖풑풑(풑풊풏풄풐풅풆,풔풆풍풍풆풓) 풔풖풑풑(풑풊풏풄풐풅풆) To check product availability Conf (product->pincode) = 풔풖풑풑(풑풓풐풅풖풄풕,풑풊풏풄풐풅풆) 풔풖풑풑(풑풓풐풅풖풄풕) Discrimination based on user’s reliability is also done. Peoples who can’t receive the product for some reason are blacklisted. Customer suffers from direct discrimination. Price discrimination is common in online shopping. New users get more benefit than the regular ones. In this case dynamic programming is done. Some big name retailers are experimenting with offering different prices and product to different users. The websites like Amazon is using dynamic pricing for price discrimination. If we change our IP address then the price of product differs. If we delete the cache memory then also price differs. When customer registers for the online shopping for the first time then it may happen that customers can provide same data in different ways. For example, pin code provided by the customer can be of two types: the first is pune-14 and second is 411014. Customer can enter any of this kind of pin code as both refer to the same area of the city Pune. But we are not provided the standard way for entering pin code of any one of the kind then there can be time consuming process required which will match the city name with the particular pin code for every time that customer requires the access. 
Fig. 4 Data Mining Model 
This can be avoided by providing standardization the way for entering the pin code. It can also be avoided by transferring the pin code entered by customer in our
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 390 
standard form of database at the time or registration only. The standardization of the database gives us efficient data with less time consumption. 4. CONCLUSION AND FUTURE WORK Peoples do not like to be discriminated because of their location, previous record and price etc., especially when these attributes are used for making decisions about providing them the order. The purpose of this paper is to identify different discrimination occurs in the online shopping system and how we can prevent those direct or indirect discrimination .To achieve this first identify categories where direct or indirect discrimination occurs in decision making process. And second step is to transform data to prevent discrimination .Finally discrimination free online shopping system can be produced without damaging data quality. 
Fig.5. Operating model In future we can work on predicting user behavior, analyze and give suggestions regarding each user and check the reliability of customers. REFERENCES 
[1] Sara Hajian, Josep Domingo-Ferrer, “A Methodology for Direct and Indirect Discrimination Prevention in Data Mining”, VOL. 25, NO. 7, JULY 2013 
[2] E.W.T. Ngai, Li Xiu, D.C.K. Chau, “ Application of data mining techniques in customer relationship management : Aliterature review and clasiification”, Expert System with Application 36 (2009) 2592- 2602 
[3] Che-Wei Chang, Chin-Tsai Lin, Lian-Qing Wang, “Mining the text information to optimizing the customer relationship management“ , Expert System with Application 36 (2009) 1433-1443 
[4] Fayyad, Usama; Piatetsky-Shapiro, Gregory; Smyth, Padhraic (1996). "From Data Mining to Knowledge Discovery in Databases". Retrieved 17 December 2008 
[5] D. Pedreschi, S. Ruggieri, and F. Turini, “Discrimination-Aware Data Mining,” Proc. 14th 
ACM Int’l Conf. Knowledge Discovery and Data Mining”, (KDD ’08), pp. 560-568, 2008 
[6] .F. Kamiran and T. Calders, “Classification without Discrimination,” Proc. IEEE Second Int’l Conf. Computer, Control and Comm. (IC4 ’09), 2009 
[7] .F. Kamiran and T. Calders, “Classification with no Discrimination by Preferential Sampling,” Proc. 19th Machine Learning Conf. Belgium and The Netherlands, 2010. 
[8] S. Ruggieri, D. Pedreschi, and F. Turini, “Data Mining for Discrimination Discovery,” ACM Trans. Knowledge Discovery from Data, vol. 4, no. 2, article 9, 2010. 
[9] T. Calders and S. Verwer, “Three Naive Bayes Approaches for Discrimination-Free Classification,” Data Mining and Knowledge Discovery, vol. 21, no. 2, pp. 277-292, 2010. 
[10] D. Pedreschi, S. Ruggieri, and F. Turini, “Measuring Discrimination in Socially-Sensitive Decision Records,” Proc. Ninth SIAM Data Mining Conf. (SDM ’09), pp. 581-592, 2009.

More Related Content

What's hot

Applying Classification Technique using DID3 Algorithm to improve Decision Su...
Applying Classification Technique using DID3 Algorithm to improve Decision Su...Applying Classification Technique using DID3 Algorithm to improve Decision Su...
Applying Classification Technique using DID3 Algorithm to improve Decision Su...
IJMER
 
A Data Quality Model for Asset Management in Engineering Organisations
A Data Quality Model for Asset Management in Engineering OrganisationsA Data Quality Model for Asset Management in Engineering Organisations
A Data Quality Model for Asset Management in Engineering Organisations
Cyrus Sorab
 
AUTO-CDD: automatic cleaning dirty data using machine learning techniques
AUTO-CDD: automatic cleaning dirty data using machine learning techniquesAUTO-CDD: automatic cleaning dirty data using machine learning techniques
AUTO-CDD: automatic cleaning dirty data using machine learning techniques
TELKOMNIKA JOURNAL
 
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User BehaviorIRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET Journal
 
Business Analytics Unit III: Developing analytical talent
Business Analytics Unit III: Developing analytical talentBusiness Analytics Unit III: Developing analytical talent
Business Analytics Unit III: Developing analytical talent
Rani Channamma University, Sangolli Rayanna First Grade Constituent College, Belagavi
 
Quality Assurance in Knowledge Data Warehouse
Quality Assurance in Knowledge Data WarehouseQuality Assurance in Knowledge Data Warehouse
Quality Assurance in Knowledge Data Warehouse
Universitas Pembangunan Panca Budi
 
Harmonized scheme for data mining technique to progress decision support syst...
Harmonized scheme for data mining technique to progress decision support syst...Harmonized scheme for data mining technique to progress decision support syst...
Harmonized scheme for data mining technique to progress decision support syst...
eSAT Publishing House
 
Unsupervised Learning for Credit Card Fraud Detection
Unsupervised Learning for Credit Card Fraud DetectionUnsupervised Learning for Credit Card Fraud Detection
Unsupervised Learning for Credit Card Fraud Detection
IRJET Journal
 
IRJET- A Review of Data Cleaning and its Current Approaches
IRJET- A Review of Data Cleaning and its Current ApproachesIRJET- A Review of Data Cleaning and its Current Approaches
IRJET- A Review of Data Cleaning and its Current Approaches
IRJET Journal
 
IRJET- Survey of Estimation of Crop Yield using Agriculture Data
IRJET- Survey of Estimation of Crop Yield using Agriculture DataIRJET- Survey of Estimation of Crop Yield using Agriculture Data
IRJET- Survey of Estimation of Crop Yield using Agriculture Data
IRJET Journal
 
Comparison Between WEKA and Salford System in Data Mining Software
Comparison Between WEKA and Salford System in Data Mining SoftwareComparison Between WEKA and Salford System in Data Mining Software
Comparison Between WEKA and Salford System in Data Mining Software
Universitas Pembangunan Panca Budi
 
Correlation of artificial neural network classification and nfrs attribute fi...
Correlation of artificial neural network classification and nfrs attribute fi...Correlation of artificial neural network classification and nfrs attribute fi...
Correlation of artificial neural network classification and nfrs attribute fi...
eSAT Journals
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
JOSEPH FRANCIS
 
A survey on discrimination deterrence in data mining
A survey on discrimination deterrence in data miningA survey on discrimination deterrence in data mining
A survey on discrimination deterrence in data mining
eSAT Journals
 
Mining Social Media Data for Understanding Drugs Usage
Mining Social Media Data for Understanding Drugs  UsageMining Social Media Data for Understanding Drugs  Usage
Mining Social Media Data for Understanding Drugs Usage
IRJET Journal
 
A comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan dataA comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan dataIAEME Publication
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
Augmentation of Customer’s Profile Dataset Using Genetic Algorithm
Augmentation of Customer’s Profile Dataset Using Genetic AlgorithmAugmentation of Customer’s Profile Dataset Using Genetic Algorithm
Augmentation of Customer’s Profile Dataset Using Genetic Algorithm
RSIS International
 
Software Bug Detection Algorithm using Data mining Techniques
Software Bug Detection Algorithm using Data mining TechniquesSoftware Bug Detection Algorithm using Data mining Techniques
Software Bug Detection Algorithm using Data mining Techniques
AM Publications
 
Concept of information
Concept of informationConcept of information
Concept of information
reeta nagari
 

What's hot (20)

Applying Classification Technique using DID3 Algorithm to improve Decision Su...
Applying Classification Technique using DID3 Algorithm to improve Decision Su...Applying Classification Technique using DID3 Algorithm to improve Decision Su...
Applying Classification Technique using DID3 Algorithm to improve Decision Su...
 
A Data Quality Model for Asset Management in Engineering Organisations
A Data Quality Model for Asset Management in Engineering OrganisationsA Data Quality Model for Asset Management in Engineering Organisations
A Data Quality Model for Asset Management in Engineering Organisations
 
AUTO-CDD: automatic cleaning dirty data using machine learning techniques
AUTO-CDD: automatic cleaning dirty data using machine learning techniquesAUTO-CDD: automatic cleaning dirty data using machine learning techniques
AUTO-CDD: automatic cleaning dirty data using machine learning techniques
 
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User BehaviorIRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
 
Business Analytics Unit III: Developing analytical talent
Business Analytics Unit III: Developing analytical talentBusiness Analytics Unit III: Developing analytical talent
Business Analytics Unit III: Developing analytical talent
 
Quality Assurance in Knowledge Data Warehouse
Quality Assurance in Knowledge Data WarehouseQuality Assurance in Knowledge Data Warehouse
Quality Assurance in Knowledge Data Warehouse
 
Harmonized scheme for data mining technique to progress decision support syst...
Harmonized scheme for data mining technique to progress decision support syst...Harmonized scheme for data mining technique to progress decision support syst...
Harmonized scheme for data mining technique to progress decision support syst...
 
Unsupervised Learning for Credit Card Fraud Detection
Unsupervised Learning for Credit Card Fraud DetectionUnsupervised Learning for Credit Card Fraud Detection
Unsupervised Learning for Credit Card Fraud Detection
 
IRJET- A Review of Data Cleaning and its Current Approaches
IRJET- A Review of Data Cleaning and its Current ApproachesIRJET- A Review of Data Cleaning and its Current Approaches
IRJET- A Review of Data Cleaning and its Current Approaches
 
IRJET- Survey of Estimation of Crop Yield using Agriculture Data
IRJET- Survey of Estimation of Crop Yield using Agriculture DataIRJET- Survey of Estimation of Crop Yield using Agriculture Data
IRJET- Survey of Estimation of Crop Yield using Agriculture Data
 
Comparison Between WEKA and Salford System in Data Mining Software
Comparison Between WEKA and Salford System in Data Mining SoftwareComparison Between WEKA and Salford System in Data Mining Software
Comparison Between WEKA and Salford System in Data Mining Software
 
Correlation of artificial neural network classification and nfrs attribute fi...
Correlation of artificial neural network classification and nfrs attribute fi...Correlation of artificial neural network classification and nfrs attribute fi...
Correlation of artificial neural network classification and nfrs attribute fi...
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
A survey on discrimination deterrence in data mining
A survey on discrimination deterrence in data miningA survey on discrimination deterrence in data mining
A survey on discrimination deterrence in data mining
 
Mining Social Media Data for Understanding Drugs Usage
Mining Social Media Data for Understanding Drugs  UsageMining Social Media Data for Understanding Drugs  Usage
Mining Social Media Data for Understanding Drugs Usage
 
A comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan dataA comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan data
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Augmentation of Customer’s Profile Dataset Using Genetic Algorithm
Augmentation of Customer’s Profile Dataset Using Genetic AlgorithmAugmentation of Customer’s Profile Dataset Using Genetic Algorithm
Augmentation of Customer’s Profile Dataset Using Genetic Algorithm
 
Software Bug Detection Algorithm using Data mining Techniques
Software Bug Detection Algorithm using Data mining TechniquesSoftware Bug Detection Algorithm using Data mining Techniques
Software Bug Detection Algorithm using Data mining Techniques
 
Concept of information
Concept of informationConcept of information
Concept of information
 

Viewers also liked

Investigation of behaviour of 3 degrees of freedom
Investigation of behaviour of 3 degrees of freedomInvestigation of behaviour of 3 degrees of freedom
Investigation of behaviour of 3 degrees of freedomeSAT Publishing House
 
Characterization of reusable software components for better reuse
Characterization of reusable software components for better reuseCharacterization of reusable software components for better reuse
Characterization of reusable software components for better reuse
eSAT Publishing House
 
Scalable and efficient cluster based framework for
Scalable and efficient cluster based framework forScalable and efficient cluster based framework for
Scalable and efficient cluster based framework for
eSAT Publishing House
 
Modelling of fuzzy logic controller for variablestep
Modelling of fuzzy logic controller for variablestepModelling of fuzzy logic controller for variablestep
Modelling of fuzzy logic controller for variablestep
eSAT Publishing House
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms network
eSAT Publishing House
 
Screening of antibacterial and cytotoxic activity of extracts from epidermis ...
Screening of antibacterial and cytotoxic activity of extracts from epidermis ...Screening of antibacterial and cytotoxic activity of extracts from epidermis ...
Screening of antibacterial and cytotoxic activity of extracts from epidermis ...
eSAT Publishing House
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol in
eSAT Publishing House
 
Performance of blended corrosion inhibitors for reinforced concrete
Performance of blended corrosion inhibitors for reinforced concretePerformance of blended corrosion inhibitors for reinforced concrete
Performance of blended corrosion inhibitors for reinforced concrete
eSAT Publishing House
 
Exposure to elevated temperatures and cooled under different regimes – a stud...
Exposure to elevated temperatures and cooled under different regimes – a stud...Exposure to elevated temperatures and cooled under different regimes – a stud...
Exposure to elevated temperatures and cooled under different regimes – a stud...
eSAT Publishing House
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
eSAT Publishing House
 
A comparative study of physical attacks on wireless sensor networks
A comparative study of physical attacks on wireless sensor networksA comparative study of physical attacks on wireless sensor networks
A comparative study of physical attacks on wireless sensor networks
eSAT Publishing House
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learning
eSAT Publishing House
 
A comparative flow analysis of naca 6409 and naca 4412 aerofoil
A comparative flow analysis of naca 6409 and naca 4412 aerofoilA comparative flow analysis of naca 6409 and naca 4412 aerofoil
A comparative flow analysis of naca 6409 and naca 4412 aerofoil
eSAT Publishing House
 
Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...
eSAT Publishing House
 
Insect inspired hexapod robot for terrain navigation
Insect inspired hexapod robot for terrain navigationInsect inspired hexapod robot for terrain navigation
Insect inspired hexapod robot for terrain navigation
eSAT Publishing House
 
Removal of chromium (vi) by activated carbon derived from mangifera indica
Removal of chromium (vi) by activated carbon derived from mangifera indicaRemoval of chromium (vi) by activated carbon derived from mangifera indica
Removal of chromium (vi) by activated carbon derived from mangifera indica
eSAT Publishing House
 
An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...
eSAT Publishing House
 
Intelligent computing techniques on medical image segmentation and analysis a...
Intelligent computing techniques on medical image segmentation and analysis a...Intelligent computing techniques on medical image segmentation and analysis a...
Intelligent computing techniques on medical image segmentation and analysis a...
eSAT Publishing House
 
Hybrid web caching framework for reduction of web
Hybrid web caching framework for reduction of webHybrid web caching framework for reduction of web
Hybrid web caching framework for reduction of web
eSAT Publishing House
 
Exposure hazard analysis in cement fiber sheet
Exposure hazard analysis in cement fiber sheetExposure hazard analysis in cement fiber sheet
Exposure hazard analysis in cement fiber sheet
eSAT Publishing House
 

Viewers also liked (20)

Investigation of behaviour of 3 degrees of freedom
Investigation of behaviour of 3 degrees of freedomInvestigation of behaviour of 3 degrees of freedom
Investigation of behaviour of 3 degrees of freedom
 
Characterization of reusable software components for better reuse
Characterization of reusable software components for better reuseCharacterization of reusable software components for better reuse
Characterization of reusable software components for better reuse
 
Scalable and efficient cluster based framework for
Scalable and efficient cluster based framework forScalable and efficient cluster based framework for
Scalable and efficient cluster based framework for
 
Modelling of fuzzy logic controller for variablestep
Modelling of fuzzy logic controller for variablestepModelling of fuzzy logic controller for variablestep
Modelling of fuzzy logic controller for variablestep
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms network
 
Screening of antibacterial and cytotoxic activity of extracts from epidermis ...
Screening of antibacterial and cytotoxic activity of extracts from epidermis ...Screening of antibacterial and cytotoxic activity of extracts from epidermis ...
Screening of antibacterial and cytotoxic activity of extracts from epidermis ...
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol in
 
Performance of blended corrosion inhibitors for reinforced concrete
Performance of blended corrosion inhibitors for reinforced concretePerformance of blended corrosion inhibitors for reinforced concrete
Performance of blended corrosion inhibitors for reinforced concrete
 
Exposure to elevated temperatures and cooled under different regimes – a stud...
Exposure to elevated temperatures and cooled under different regimes – a stud...Exposure to elevated temperatures and cooled under different regimes – a stud...
Exposure to elevated temperatures and cooled under different regimes – a stud...
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
 
A comparative study of physical attacks on wireless sensor networks
A comparative study of physical attacks on wireless sensor networksA comparative study of physical attacks on wireless sensor networks
A comparative study of physical attacks on wireless sensor networks
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learning
 
A comparative flow analysis of naca 6409 and naca 4412 aerofoil
A comparative flow analysis of naca 6409 and naca 4412 aerofoilA comparative flow analysis of naca 6409 and naca 4412 aerofoil
A comparative flow analysis of naca 6409 and naca 4412 aerofoil
 
Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...
 
Insect inspired hexapod robot for terrain navigation
Insect inspired hexapod robot for terrain navigationInsect inspired hexapod robot for terrain navigation
Insect inspired hexapod robot for terrain navigation
 
Removal of chromium (vi) by activated carbon derived from mangifera indica
Removal of chromium (vi) by activated carbon derived from mangifera indicaRemoval of chromium (vi) by activated carbon derived from mangifera indica
Removal of chromium (vi) by activated carbon derived from mangifera indica
 
An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...
 
Intelligent computing techniques on medical image segmentation and analysis a...
Intelligent computing techniques on medical image segmentation and analysis a...Intelligent computing techniques on medical image segmentation and analysis a...
Intelligent computing techniques on medical image segmentation and analysis a...
 
Hybrid web caching framework for reduction of web
Hybrid web caching framework for reduction of webHybrid web caching framework for reduction of web
Hybrid web caching framework for reduction of web
 
Exposure hazard analysis in cement fiber sheet
Exposure hazard analysis in cement fiber sheetExposure hazard analysis in cement fiber sheet
Exposure hazard analysis in cement fiber sheet
 

Similar to Data discrimination prevention in customer relationship managment

Study of Data Mining Methods and its Applications
Study of  Data Mining Methods and its ApplicationsStudy of  Data Mining Methods and its Applications
Study of Data Mining Methods and its Applications
IRJET Journal
 
An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...
eSAT Journals
 
Ijcet 06 07_004
Ijcet 06 07_004Ijcet 06 07_004
Ijcet 06 07_004
IAEME Publication
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
IRJET Journal
 
Study of Privacy Discrimination and Prevention in Data Mining
Study of Privacy Discrimination and Prevention in Data MiningStudy of Privacy Discrimination and Prevention in Data Mining
Study of Privacy Discrimination and Prevention in Data Mining
IRJET Journal
 
IRJET- Medical Data Mining
IRJET- Medical Data MiningIRJET- Medical Data Mining
IRJET- Medical Data Mining
IRJET Journal
 
Final review m score
Final review m scoreFinal review m score
Final review m scoreazhar4010
 
Data Mining in Telecommunication Industry
Data Mining in Telecommunication IndustryData Mining in Telecommunication Industry
Data Mining in Telecommunication Industry
ijsrd.com
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud Detection
IRJET Journal
 
IRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom Industry
IRJET Journal
 
Lecture 3 Data Mining.pptx power points for graduates
Lecture 3 Data Mining.pptx power points for graduatesLecture 3 Data Mining.pptx power points for graduates
Lecture 3 Data Mining.pptx power points for graduates
Josephmwanika
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
IJECEIAES
 
Safeguarding Data Privacy by Placing Multi-level Access Restrictions
Safeguarding Data Privacy by Placing Multi-level Access RestrictionsSafeguarding Data Privacy by Placing Multi-level Access Restrictions
Safeguarding Data Privacy by Placing Multi-level Access Restrictions
rahulmonikasharma
 
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
IRJET Journal
 
Smart Health Guide App
Smart Health Guide AppSmart Health Guide App
Smart Health Guide App
IRJET Journal
 
Data Mining Applications And Feature Scope Survey
Data Mining Applications And Feature Scope SurveyData Mining Applications And Feature Scope Survey
Data Mining Applications And Feature Scope Survey
NIET Journal of Engineering & Technology (NIETJET)
 
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
IRJET Journal
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applicationsSubrat Swain
 

Similar to Data discrimination prevention in customer relationship managment (20)

Study of Data Mining Methods and its Applications
Study of  Data Mining Methods and its ApplicationsStudy of  Data Mining Methods and its Applications
Study of Data Mining Methods and its Applications
 
An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...An efficient data pre processing frame work for loan credibility prediction s...
An efficient data pre processing frame work for loan credibility prediction s...
 
Ijcet 06 07_004
Ijcet 06 07_004Ijcet 06 07_004
Ijcet 06 07_004
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
 
Study of Privacy Discrimination and Prevention in Data Mining
Study of Privacy Discrimination and Prevention in Data MiningStudy of Privacy Discrimination and Prevention in Data Mining
Study of Privacy Discrimination and Prevention in Data Mining
 
IRJET- Medical Data Mining
IRJET- Medical Data MiningIRJET- Medical Data Mining
IRJET- Medical Data Mining
 
Unit 4 Advanced Data Analytics
Unit 4 Advanced Data AnalyticsUnit 4 Advanced Data Analytics
Unit 4 Advanced Data Analytics
 
Final review m score
Final review m scoreFinal review m score
Final review m score
 
Data Mining in Telecommunication Industry
Data Mining in Telecommunication IndustryData Mining in Telecommunication Industry
Data Mining in Telecommunication Industry
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud Detection
 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
 
IRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom IndustryIRJET - Customer Churn Analysis in Telecom Industry
IRJET - Customer Churn Analysis in Telecom Industry
 
Lecture 3 Data Mining.pptx power points for graduates
Lecture 3 Data Mining.pptx power points for graduatesLecture 3 Data Mining.pptx power points for graduates
Lecture 3 Data Mining.pptx power points for graduates
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
 
Safeguarding Data Privacy by Placing Multi-level Access Restrictions
Safeguarding Data Privacy by Placing Multi-level Access RestrictionsSafeguarding Data Privacy by Placing Multi-level Access Restrictions
Safeguarding Data Privacy by Placing Multi-level Access Restrictions
 
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...A Survey on Features and Techniques Description for Privacy of Sensitive Info...
A Survey on Features and Techniques Description for Privacy of Sensitive Info...
 
Smart Health Guide App
Smart Health Guide AppSmart Health Guide App
Smart Health Guide App
 
Data Mining Applications And Feature Scope Survey
Data Mining Applications And Feature Scope SurveyData Mining Applications And Feature Scope Survey
Data Mining Applications And Feature Scope Survey
 
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 

Recently uploaded (20)

space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 

Data discrimination prevention in customer relationship managment

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 387 DATA DISCRIMINATION PREVENTION IN CUSTOMER RELATIONSHIP MANAGMENT Pradnya Deshpande1, Rashi2, Sneha Zanzane3 1Bhivarabai Sawant Institute of Technology and Research, Pune University of Pune 2Bhivarabai Sawant Institute of Technology and Research, Pune University of Pune 3Bhivarabai Sawant Institute of Technology and Research, Pune University of Pune Abstract Data mining is a very important technology to derive important data occult in pompous heap of data. However, there is negative social awareness about data mining. It consists of unfairly treating people on the basis of their membership to a specific group. Automated data aggregation and data mining methods is useful in making automated decision such as customer identification and customer development. If partiality in training data sets is such a that regards sensitive attributes like gender, religion, color etc. Then discriminatory issues can arise. To remove this, antidiscrimination methods like discrimination discovery and prevention have been included in data mining. Direct and indirect are the two types of discrimination. When decisions are made based on discriminatory entities then, that discrimination is direct discrimination. When decisions are made based on non-discriminatory entities then that discrimination is indirect discrimination. Indirect discrimination corresponds to biased sensitive issues. Here we proposed discrimination prevention in data mining for customer relationship management. We proposed an enabling system supporting a business strategy for long term, profitable relationships with customers. Our paper is related to one-to-one marketing and loyalty programs. Our paper is related to the discrimination in online shopping system. Location based discrimination and dynamic pricing are the main objectives of our papers. Keywords: Antidiscrimination, direct and indirect discrimination prevention, data mining, dynamic pricing, Apriori algorithm. --------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Data mining is the process of extracting information from a set of data and transforming it into a suitable structure for future use. It includes raw analysis step, database and data management aspects. It is largely applied to any pattern of huge data or information processing. Multiple groups in data which can be used to obtain more accurate prediction results by decision support system are identified by data mining step .Data mining is very helpful in extracting important data from a large collection of database. There are six common types of task in data mining [4]. Anomaly detection – anomaly detection is the verification of items, events that need further investigation. It is applicable to fraud detection Association rule learning –it is used for finding relations between fluctuating variables in huge data sets. Clustering –the grouping of identical objects is called clustering. It is used in sequence analysis. Classification –process of identifying categories of new objects. It is used in drug discovery and development. Regression – it is used to find methods of data with minimum errors. Summarization – it gives summary of set of data which include generation of report. Discrimination is nothing but unequal treatment that causes harm. Discrimination is of two types: direct and indirect. Direct discrimination can spotted easily .Direct discrimination happens when merit or ability are not the factors for the decision making. Instead of it is based on gender, race, religion or age. Indirect discrimination occurs when an employer impose certain requirements, practices and conditions that has an unfavorable impact on one group or other. With direct discrimination employee can argue that there may be discrimination but that is required for the job. Fig.1. Data mining technique
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 388 Customer relationship management (CRM) is a technology for management of interaction between company and company’s current and future customers. It provides automation in the process. Operational and analytical are the two types of CRM framework. In operational CRM the automation of business process is done and in analytical CRM diagnosis of characteristic and behavior of customer is done. Analytical CRM is useful in better discrimination for an organization to allocate resources to group of customers which might be profitable for organization in future. In this paper we are presenting a methodology for preventing discrimination in customer relationship management for online shopping system. In online shopping website a large collection of data is present. The data contains information about various products of different categories. We cannot analyze them manually; this will cause wastage of time and information. Thus we can use the concept of data mining in this area. In online shopping system there may be possibilities of discrimination among the customers depending on the location. 2. METHODOLOGY The Predreschi et al. was the first to propose the discovery of discriminatory decisions [5] [8]. The inductive part i.e. mining classification and the deductive part i.e. reasoning on them on quantitative measures of discriminations that forms the legal definition of discrimination are the major approaches of it. The antidiscrimination i.e. discrimination prevention in data mining contains the inclusion of patterns which will not cause any discriminatory decisions even though the there is a biased data sets are present. Three methods are used for discrimination prevention: 2.1 Preprocessing: Preprocessing is process of transforming source data. It transforms the data in such a way that discriminatory attributes contained in a source data are removed so that illegal decision rules are removed from the transformed data. After that we can apply any standard algorithm for data mining. The privacy preservation documentation can adapt the hierarchy based generalization and data transformation which are the approaches of the preprocessing. For this [6] , [7] performs the disciplined exaggeration of the training data sets from which classifier can make minimum modifications in the data sets to get fair data. Preprocessing is mostly used when data mining is to be performed by external parties (other than data holders). In the case of online shopping system when the customer places an order then the process of customer authentication is preprocess. 2.2 In-processing: The data mining algorithms have to be changed in such a way that there should not be any inequitable rules of decision. For instance, to remove the discrimination from the source data set different technique is given in [9] where nondiscriminatory information is enclosed within the decision trees by providing a different approach for the criteria for splitting and trimming strategy through approach of relabeling the novel leaf[1]. However, in-processing discrimination method must be built on some new unusual data mining algorithms. Here we cannot use standard data mining algorithms. There can be possibility of discrimination in in-processing in the availability of the product according at pin code of the customer. 2.3 Post-processing: Instead of removing data from source data set or modifying the data mining algorithms, it is more suitable to modify the resulting data mining models. For instance, in [15], for classification rules confidence-altering methods are firmly proposed. Publishing of data sets are not allowed in the postprocessing technique. It only allows publishing the modified data mining models (judgmental publishing). Because of this only data holders can perform data mining. In the order processing, sometimes it may happen that if customer places the order and his/her payment is done the seller can take much time to deliver the product rather than cash on delivery. Fig.2. Knowledge discovery process Preprocessing approach is the easiest technique for removing discrimination but it mostly causes important information loss from the source data set. Preprocessing is the technique which solves the problem of direct discrimination. But it causes indirect discrimination in most of the cases. There are some instances like pin code is not acceptable for some websites for delivery of the product, and there can be some instances that are exceptionally associated with the sensitive attributes (e.g. Race) which are responsible for the direct and indirect discrimination. There are two crucial challenges related to discrimination prevention: 1. The first and important challenge is we should consider both direct and indirect discrimination and not only the direct discrimination. 2. The next challenge is to search for better settlement between removal of discrimination and quality of the transformed data set and data mining models.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 389 Even though there are many already proposed techniques which are used for discrimination prevention for above stated methods (preprocessing, in-processing, post processing), discrimination prevention in customer relationship management for online shopping system stays a largely unfamiliar research approach. In this paper we have concentrated on discrimination prevention techniques which are very much useful for customers as well as organizations so that no one should face the discrimination. Here we have proposed our system for the discrimination which is relegated to the online shopping system. After analyzing and interpreting the data sets, the resulting models and correlations may become useful observation and tools for decision. Fig. 3: Data processing 3. PLAN OF THIS PAPER Here we are trying to discover and remove direct discrimination as well as indirect discrimination. In this paper we have discussed some methods for preprocessing for preventing discrimination in online shopping system. In online shopping system there can be possibility that there is unavailability of product which is requested by the customer at particular pin code provided. We have to check the availability of the product. Here indirect discrimination can happen if the website provides that this particular product is not available for the pin code. This can be prevented by using APRIORI algorithm which is already explained in some paper on discrimination prevention. By using this algorithm we avoid discrimination by providing some other sellers those can deliver the product at that pin code. This will prevent location based indirect discrimination. In some cases it can happen that product requested by customer is not available with the same specifications then instead of directly cancelling the order of the customer we can suggest them the alternatives with either same specification but different seller or with same seller but with some other specifications. Apriori algorithm formula applied to check reach-ability of seller Conf (pincode->seller) = 풔풖풑풑(풑풊풏풄풐풅풆,풔풆풍풍풆풓) 풔풖풑풑(풑풊풏풄풐풅풆) To check product availability Conf (product->pincode) = 풔풖풑풑(풑풓풐풅풖풄풕,풑풊풏풄풐풅풆) 풔풖풑풑(풑풓풐풅풖풄풕) Discrimination based on user’s reliability is also done. Peoples who can’t receive the product for some reason are blacklisted. Customer suffers from direct discrimination. Price discrimination is common in online shopping. New users get more benefit than the regular ones. In this case dynamic programming is done. Some big name retailers are experimenting with offering different prices and product to different users. The websites like Amazon is using dynamic pricing for price discrimination. If we change our IP address then the price of product differs. If we delete the cache memory then also price differs. When customer registers for the online shopping for the first time then it may happen that customers can provide same data in different ways. For example, pin code provided by the customer can be of two types: the first is pune-14 and second is 411014. Customer can enter any of this kind of pin code as both refer to the same area of the city Pune. But we are not provided the standard way for entering pin code of any one of the kind then there can be time consuming process required which will match the city name with the particular pin code for every time that customer requires the access. Fig. 4 Data Mining Model This can be avoided by providing standardization the way for entering the pin code. It can also be avoided by transferring the pin code entered by customer in our
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 390 standard form of database at the time or registration only. The standardization of the database gives us efficient data with less time consumption. 4. CONCLUSION AND FUTURE WORK Peoples do not like to be discriminated because of their location, previous record and price etc., especially when these attributes are used for making decisions about providing them the order. The purpose of this paper is to identify different discrimination occurs in the online shopping system and how we can prevent those direct or indirect discrimination .To achieve this first identify categories where direct or indirect discrimination occurs in decision making process. And second step is to transform data to prevent discrimination .Finally discrimination free online shopping system can be produced without damaging data quality. Fig.5. Operating model In future we can work on predicting user behavior, analyze and give suggestions regarding each user and check the reliability of customers. REFERENCES [1] Sara Hajian, Josep Domingo-Ferrer, “A Methodology for Direct and Indirect Discrimination Prevention in Data Mining”, VOL. 25, NO. 7, JULY 2013 [2] E.W.T. Ngai, Li Xiu, D.C.K. Chau, “ Application of data mining techniques in customer relationship management : Aliterature review and clasiification”, Expert System with Application 36 (2009) 2592- 2602 [3] Che-Wei Chang, Chin-Tsai Lin, Lian-Qing Wang, “Mining the text information to optimizing the customer relationship management“ , Expert System with Application 36 (2009) 1433-1443 [4] Fayyad, Usama; Piatetsky-Shapiro, Gregory; Smyth, Padhraic (1996). "From Data Mining to Knowledge Discovery in Databases". Retrieved 17 December 2008 [5] D. Pedreschi, S. Ruggieri, and F. Turini, “Discrimination-Aware Data Mining,” Proc. 14th ACM Int’l Conf. Knowledge Discovery and Data Mining”, (KDD ’08), pp. 560-568, 2008 [6] .F. Kamiran and T. Calders, “Classification without Discrimination,” Proc. IEEE Second Int’l Conf. Computer, Control and Comm. (IC4 ’09), 2009 [7] .F. Kamiran and T. Calders, “Classification with no Discrimination by Preferential Sampling,” Proc. 19th Machine Learning Conf. Belgium and The Netherlands, 2010. [8] S. Ruggieri, D. Pedreschi, and F. Turini, “Data Mining for Discrimination Discovery,” ACM Trans. Knowledge Discovery from Data, vol. 4, no. 2, article 9, 2010. [9] T. Calders and S. Verwer, “Three Naive Bayes Approaches for Discrimination-Free Classification,” Data Mining and Knowledge Discovery, vol. 21, no. 2, pp. 277-292, 2010. [10] D. Pedreschi, S. Ruggieri, and F. Turini, “Measuring Discrimination in Socially-Sensitive Decision Records,” Proc. Ninth SIAM Data Mining Conf. (SDM ’09), pp. 581-592, 2009.