SlideShare a Scribd company logo
International Journal of Research in Computer Science
eISSN 2249-8265 Volume 2 Issue 2 (2011) pp. 7-14
© White Globe Publications
www.ijorcs.org


     UNIFICATION OF RANDOMIZED ANOMALY IN DECEPTION
     DETECTION USING FUZZY LOGIC UNDER UNCERTAINTY
                                    S.Rajkumar1, V.Narayani2, Dr.S.P.Victor3
             1
              Research Scholar/Bharathiar University, Asst.Prof & Head / CSE, NIET,Coimbatore, India.
                2
                 Research Scholar, Dept. Of Computer Science, St.Xavier’s College, Tirunelveli, India.
          3
            Associate Professor & Head, Dept. Of Computer Science, St.Xavier’s College, Tirunelveli, India.

  Abstract: In the recent era of computer electronic        different types of fuzzifiers. Fuzzification of a real-
communication we are currently facing the critical          valued variable is done with intuition, experience and
impact of Deception which plays its vital role in the       analysis of the set of rules and conditions associated
mode of affecting efficient information sharing system.     with the input data variables. There is no fixed set of
Identifying Deception in any mode of communication          procedures for the fuzzification [6].
is a tedious process without using the proper tool for
detecting those vulnerabilities. This paper deals with      C. Uncertainty
the efficient tools of Deception detection in which            Uncertainty must be taken in a sense radically
combined application implementation is our main             distinct from the familiar notion of risk, from which it
focus rather than with its individuality. We propose a      has never been properly separated. Although the terms
research model which comprises Fuzzy logic,                 are used in various ways among the general public,
Uncertainty and Randomization. This paper deals with        many specialists in decision theory, statistics and other
an experiment which implements the scenario of              quantitative fields have defined uncertainty, risk, and
mixture application with its revealed results. We also      their measurement as follows:
discuss the combined approach rather than with its
individual performance.                                      1. Uncertainty: A state of having limited knowledge
                                                                where it is impossible to exactly describe existing
Keywords: Deception, Detection, Uncertainty, Fuzzy              state or future outcome, more than one possible
logic, Randomness                                               outcome.
                                                             2. Measurement of Uncertainty: A set of possible
                    I. INTRODUCTION                             states or outcomes where probabilities are assigned
    Detection of Deception is useful for managers,              to each possible state or outcome.
employers, and for anyone to use in everyday                 3. Risk: A state of uncertainty where some possible
situations where telling the truth from a lie can help          outcomes have an undesired effect or significant
prevent you from being a victim of fraud/scams and              loss.
other deceptions [1].                                        4. Measurement of Risk: A set of measured
                                                                uncertainties where some possible outcomes are
A. Identifying the Deception                                    losses, and the magnitudes of those losses variables
   Deception detection between relational partners is           [3].
extremely difficult, unless a partner tells a blatant or    D. Randomness:
obvious lie or contradicts something the other partner
knows to be true [5].                                          The Dictionary of Oxford defines 'random' as
                                                            "Having no definite aim or purpose; not sent or guided
B. Fuzzy logic                                              in a particular direction; made, done, occurring, etc.,
                                                            without method or conscious choice; haphazard." This
   Fuzzy logic is the part of artificial intelligence or
                                                            concept of randomness suggests a non-order or non-
machine learning which interprets a human’s actions.
                                                            coherence in a sequence of steps or symbols, such that
Computers can interpret only true or false values but a
                                                            there is no intelligible pattern or combination [8].
human being can reason the degree of truth or degree
of falseness. Fuzzy models interpret the human actions
                                                                     II. PROPOSED RESEARCH MODEL
and are also called intelligent systems [7].
Fuzzification is the process of changing a real scalar         The following figures show the basic and its
value into a fuzzy value. This is achieved with the         expanded form for the proposed model.




                                                                               www.ijorcs.org
Information Sharing System

                                       Test for uncertainty                                       Combining Uncertainty &
                                                                                                       Fuzzy Logic
                 Combining                       Implementing Randomization technique
                Uncertainty &
                Randomization                           Applying Fuzzy Logic
              Combining Randomization
                  & Fuzzy Logic                Combining Uncertainty, Fuzzy Logic and Uncertainty

                                                  Figure1: Basic Proposed Model


                 Actual Datum                                                                            Probable     Legitimacy
                                    Fuzzy Membership Value                       Interviewer

                                       Probableness                                     Level 3          Allocation
                 Predictability
                                                                                 Systematic       Operation Rules Authority
                  Expectation           Allocation
                                                                                 Uncertainty                                        Uncertain
                                                       Randomized Fuzzified
                   Entropy                                 Enviornment                  Level 2      Assumption                     Fuzzified
                                                                                                                                   Enviornment
                Randomization         Assumption                                  Random           Fuzzy-Anomaly Neutrality
                                                                                 Uncertainty
                 Uncertainty          Classification                                    Level 1     Categorization
                                                                                 Interviewee                          Uniformity
                Proposed Datum          Condition                                                        Condition

                                                Figure2: Expanded Proposed Model

          III. RESEARCH METHODOLOGY                                     iii. Probing the assumptions

A. Fuzzified Anomalies for Our Proposed Research                        It is a critical thought of identifying the associations
   Model:                                                            based on assumptions towards a competitor by the
                                                                     corresponding recruiter.
  The interception of fuzzified anomaly in the field of
Recruiters selection process can be analyzed as,                     For example
                                                                                                  Base


                 0 ≤ 𝐶𝐶𝐴𝐴𝐴𝐴𝐴𝐴 (𝑥𝑥) = 𝜇𝜇 𝑡𝑡 (𝑥𝑥) ≤ 1
                                                                                                                             Association
   i. Specify the range of conditions                                                             Platform Independent       Correspondent
                                                                                                  Polymorphism               Application of
Candidate Answer at the time‘t’ holds the membership                 Features of Java             Encapsulation              Base Features
function.                                                                                         Inheritance
   ii. Classification and categorization                                                          Classes and Objects
         Table I: Membership value assignments                                                    Abstractness

           Factor-X               Membership value μt (x)                          Figure3: Association Rules sample
      Fully knowledged*               0.900 to 1.000
                                                                     Recruiter Selection
    Maximized knowledge               0.800 to 0.899
      Desired knowledge               0.700 to 0.799                    Assumption            Deceiver
     Sufficient knowledge             0.600 to 0.699                     =>Association of the following
      Average knowledge               0.500 to 0.599                       ∗ cues identification (verbal and non verbal)
       Partial knowledge              0.400 to 0.499                       ∗ Test mode –self explanation
     Show-off knowledge               0.300 to 0.399
                                                                           ∗ Critical questions
                                                                           ∗ Concentration on each counter output
    Minimized knowledge               0.200 to 0.299
                                                                           ∗ Usage of Ranking / comparison
       Poor knowledge                 0.100 to 0.199
       Null knowledge*                0.000 to 0.099                    iv. Operational rules

* Null and fully knowledge of values 0.000 & 1.000                      If (More Quantified Data) Then
are subject to constraints of Ideal machine.                            If (Gestural Deception) Then
                                                                           If (Verbal DD) Then

                                                                                          www.ijorcs.org
10                                                                                                                            S.Rajkumar, V.Narayani, Dr.S.P.Victor

                                                                                                                                lim 𝑝𝑝 log 𝑝𝑝 = 0
                                                                                                                                𝑝𝑝→0
           If (Non-verbal/modal DD) Then
            If (Contradictory Results) Then
                                                                                                          The proof of this limit can be quickly obtained
                 Deception Detection= true
                                                                                                                                           𝑛𝑛
                                                                                                          applying LHospital’s rule.
                                                                                                                          𝐻𝐻(𝑥𝑥) = − � 𝑝𝑝(𝑥𝑥 𝑖𝑖 ) log 𝑏𝑏 𝑝𝑝( 𝑥𝑥 𝑖𝑖 )
     v. Allocation of Boolean sets
                                    𝑁𝑁 𝑁𝑁

       𝐴𝐴𝐴𝐴 𝐴𝐴 𝐴𝐴 𝐴𝐴(𝑥𝑥) = 𝜋𝜋 � �𝛼𝛼 𝑖𝑖 (𝑥𝑥)𝛽𝛽𝑖𝑖 (𝑥𝑥)�
                                                                                                                                         𝑖𝑖=1




                                 𝑖𝑖=1 𝑗𝑗 =1
                                                                                                          C. Randomness-Entropy for Our Proposed Research
                                               𝑁𝑁    𝑁𝑁

                                    + 𝜋𝜋 � �𝛼𝛼 𝑖𝑖 (𝑥𝑥)𝛾𝛾𝑖𝑖 (𝑥𝑥)� /2𝑁𝑁
                                                                                                             Model:
                                                                                                          ii) Las vegas Algorithm
                                            𝑖𝑖=1 𝑘𝑘=1                                                        Las Vegas algorithm is a randomized algorithm that
                                                                                                          always gives correct results; that is, it always produces
N = Number of testing components/ Questions                                                               the correct result or it informs about the failure. The
αi = Assumption for an candidate with an initial setting                                                  usual definition of a Las Vegas algorithm includes the
of α1(x) =1 as a deceiver                                                                                 restriction that the expected run time always be finite,
βj = Non verbal communication                                                                             when the expectation is carried out over the space of
γk = verbal communication                                                                                 random information, or entropy, used in the algorithm.
0 <= Alloc(x) = μt (x) <= 1                                                                               The complexity class of decision problems that have
                                                                                                          Las Vegas algorithms with expected polynomial
Where Alloc(x) =1 represents deceiver and Alloc(x) =
                                                                                                          runtime is ZPP.(Zero-error Probabilistic Polynomial
0 represents non deceiver.
                                                                                                          Time) It turns out that

                                                                                                                               𝑍𝑍𝑍𝑍𝑍𝑍 = 𝑅𝑅𝑅𝑅 � 𝑅𝑅𝑅𝑅 −1
     vi. Statistical probability
    Deceivers most probably use the recurrence
strategic tokens during their responses.      Let us                                                      class. RP-Randomized Polynomial complexity class
consider the collection of sentences CR(s) consisting                                                     and its inverse as CO-(RP) or RP-1 which is intimately
of a sequence of N words such as (r1, r2, …, rN), then                                                    connected with the way Las Vegas algorithms are
the probability for the occurrence of CR(s) can be                                                        sometimes constructed. Namely the class RP is

                                         𝑁𝑁
computed as                                                                                               randomized polynomial time consists of all decision

                    𝑃𝑃(𝐶𝐶 𝑅𝑅 (𝑠𝑠) = 𝜋𝜋 𝑃𝑃 (𝑟𝑟𝑖𝑖 /𝑟𝑟𝑖𝑖−𝑛𝑛+1 , … . , 𝑟𝑟𝑖𝑖−1 )
                                                                                                          problems for which a randomized polynomial-time

                                      𝑖𝑖 = 1
                                                                                                          algorithm exists that always answers correctly when
                                                                                                          the correct answer is "no", but is allowed to be wrong
where 𝑃𝑃(𝑟𝑟𝑖𝑖 /𝑟𝑟𝑖𝑖−𝑛𝑛+1 , … . , 𝑟𝑟𝑖𝑖−1 ) = frequency (𝑟𝑟𝑖𝑖−𝑛𝑛+1 , … . , 𝑟𝑟𝑖𝑖 ) /
                                                                                                          with a certain probability bounded away from one
frequency (𝑟𝑟𝑖𝑖−𝑛𝑛+1 , … . , 𝑟𝑟𝑖𝑖−1 )
                                                                                                          when the answer is "yes". Thus Las vegas plays its
                                                                                                          vital role in decision making.
B. Randomness-Entropy for Our Proposed Research                                                           D. Random Uncertainty Evaluation for Our Proposed
   Model:                                                                                                    Research Model
   Shannon denoted the entropy H of a discrete                                                               The uncertainty has a probabilistic basis and

                                  𝐻𝐻(𝑋𝑋) = 𝐸𝐸(𝐼𝐼(𝑋𝑋))
random variable X with possible values {x1, ..., xn} as,                                                  reflects incomplete knowledge of the quantity. All
                                                                                                          measurements are subject to uncertainty and a
                                                                                                          measured value is only complete if it is accompanied
    Here E is the expected value, and I is                                                                by a statement of the associated uncertainty .The
the Information content of X. I(X) is itself a random                                                     output quantity denoted by Z is often related to input
variable.    If p denotes   the    probability    mass                                                    quantities denoted by X1, X2,…,XN in which the true
function of X then the entropy can explicitly be written                                                  values of X1, X2,…,XN are unknown. Then the
as.                                                                                                       uncertainty measurement function Z(x) = f(X1, X2, …,
                                                            1
              𝑛𝑛                      𝑛𝑛                                   𝑛𝑛

  𝐻𝐻(𝑥𝑥) = � 𝑝𝑝(𝑥𝑥 𝑖𝑖 )𝐼𝐼(𝑥𝑥 𝑖𝑖 ) = � 𝑝𝑝(𝑥𝑥 𝑖𝑖 ) log 𝑏𝑏              = − � 𝑝𝑝(𝑥𝑥 𝑖𝑖 ) log 𝑏𝑏 𝑝𝑝(𝑥𝑥 𝑖𝑖 )
                                                                                                          XN) Consider estimates X1, X2, …, XN respectively
                                                          𝑝𝑝(𝑥𝑥 𝑖𝑖 )                                      towards X1, X2,…, XN based on certificates, reports,
             𝑖𝑖=1                   𝑖𝑖=1                                  𝑖𝑖=1
                                                                                                          references, alarms and assumptions.     Each Xi ~
   where b is the base of the logarithm used. Common                                                      prob. Distribution
values of b are 2, Euler's number e, and 10, and the
unit of entropy is bit for b = 2, nat for b = e, and dit (or                                                 X1 _        Z(x) = X1+X2
digit) for b = 10.[3]                                                                                        X2 __ _

   In the case of pi = 0 for some i, the value of the
corresponding summand 0 logb 0 is taken to be 0,
which is consistent with the limit:

                                                                                                                              www.ijorcs.org
10                                                                                  S.Rajkumar, V.Narayani, Dr.S.P.Victor

   The standard uncertainty value for Z(xi) can be              Dissatisfied: F-0.5,E-0.75,D-0.99,C to A->1.0
approximated as standard deviation for prob(xi)
                                                                Nullified: E -0.5,D-0.75,C-0.99,B to A ->1.0
                   Table 2: Probability Rating
                                                               iii. Explicit / Easier Questionnaire
                         Knowledge
      Interval          Rating for a             Prob.          Expert: J-0.75 I -0.99 H-A -> 1.0
                          candidate                             Above average: I-0.75,H-0.99,G-A->1.0
        0 – 10            NULL-A             0.0 to 0.1
                                                                Average:H-0.75,G-0.99,F-A->1.0
       11 – 20            POOR-B             0.1 to 0.2
      21 - 30         MINIMIZED-C            0.2 to 0.3         Below average:G-0.75,F-0.99,E-A->1.0
      31 - 40          SHOW-OFF-D            0.3 to 0.4         Dissatisfied: F-0.75,E-0.99,D-A->1.0
      41 - 50           PARTIAL-E            0.4 to 0.5         Nullified: E-0.75,D-0.99,C-A->1.0
       51 – 60         AVERAGE-F             0.5 to 0.6
       61 – 70        SUFFICIENT-G           0.6 to 0.7
                                                                                    IV. EXPERIMENT
       71 – 80          DESIRED-H            0.7 to 0.8
       81 – 90        MAXIMIZED-I            0.8 to 0.9            The research methodology is a combination or a
                                                                fusion of Uncertainty, Fuzziness and Randomized
      91 – 100           FULLY-J             0.9 to 1.0
                                                                nature. We want to test the integrity with various
                                                                application domains for evaluation and comparison.
i. Standard / Critical Questionnaire                            The Domain needed for the focusing are as follows,
Expert–.25,I–.5,H-.75,G–.99,F to A – 1.0
                                                                1. Matrimonial Centre/Site.
Above AVG–I-.25,H-.5,G-.75,F–.99,E to A – 1.0                   2. Spam Mail
                                                                3. Jobsite.
Average–H-.25,G–.5,F-0.75, E-0.99, Dto A – 1.0
                                                                4. Social Network.
Below AVG–G-.25,F-.5,E-.75,D-.99,Cto A – 1.0                    5. SMS system.
                                                                6. Advertisements.
Dissatisfied– F-.25,E–.5,D-.75,C-.99,Bto A – 1.0
Nullified–E-0.25, D-0.5, C-0.75 ,B – 0.99 ,A-1.0                DOMAIN 1: Matrimonial Centre / Site

ii. Optimal / Normal Questionnaire                                 Referring a qwer centre at Tirunelveli district,
                                                                Tamilnadu, India .A sample of 60 profiles is taken and
Expert: J-0.5 ,I-0.75, H-0.99, G to A -> 1.0                    the results are in Table 3.
Above AVG: I-0.5,H-0.75,G-0.99, F to A->1.0                        Fuzzy classification implementation derives several
Average:H-0.5,G-0.75,F-0.99, E to A->1.0                        components Such as Name, Parent, Image, DOB,Job
                                                                Description, Salary, Marital status, qualification, extra
Below AVG: G-0.5,F-0.75,E-0.99,D to A->1.0                      curricular activities etc. Based on Uncertainty
                                                                measurements we focus on the key factors as follows,
                                          Table-3: Matrimonial Profile Assessment
                         Deception Possibilities          Using Uncertainty    Using Fuzzification    Using Randomness
     Deception
                      (Expected/ Warnedby owner)             Evaluation            Evaluation             Evaluation
 Image                           >80 %                         49/60                   9/11                  2/2
 DOB                              >70%                         38/60                  18/22                  4/4
 Job Description                  >80%                         39/60                  18/21                  3/3
 Salary                           >90%                         52/60                   6/8                   2/2
 Marital status                   >20%                         52/60                   8/8                   Nil
 Qualification                    >50%                         25/60                  30/35                  5/5


DOMAIN 2: Spam Mail                                             Online commercial, subscription, Entertainment,
                                                                Sympathy, donation, softwares, marketing etc. Based
   We took a sample of 100 mails. Fuzzy                         on Uncertainty measurements and randomized datum
classification implementation derives         several           analysis we focuses on the key factors as follows,
components Such as Attraction, Affection, Intimation,




                                                                                    www.ijorcs.org
10                                                                                     S.Rajkumar, V.Narayani, Dr.S.P.Victor

                                               Table-4: SPAM MAIL Assessment
                                          Deception                                     Using                Using
                                                            Using Uncertainty
        Deception component              Possibilities                               Fuzzification        Randomness
                                                               Evaluation
                                         (Expected)                                   Evaluation           Evaluation
     Prize/Lottery/Travel trip               11                    1/11                  0/11                  -
     Friend Invitation                       13                    1/13                  0/13                  -
     Love/Marriage/Sex                       12                    2/12                  0/12                  -
     E-shopping                               8                     3/8                   0/8                  -
     Magazines/Club/Subscription              4                     1/4                   0/4                  -
     Movie/Songs/Video/File                   6                     1/6                   0/6                  -
     downloads
     Help self/Others/Sympathy                3                    1/3                    1/3                 0/3
     Charity/Welfare/Disaster                 3                    2/3                    1/3                 0/3
     donation
     Games/Play or Download                   6                    5/6                    0/6                   -
     Advertisements/Marketing                 21                  10/21                  5/21                 0/21
                                                    Genuine Mails: 13/100
DOMAIN 3: Job Site                                               salary, Expertise, skills, reasons for quit the past job,
                                                                 organizing capability etc. Based on Uncertainty
   We collected some data from ABCD Softech ltd
                                                                 measurements and randomized datum analysis we
coimbatore-software company where we used HR
                                                                 focuses on the key factors and implementing the
manager datum for our research purpose. Fuzzy
                                                                 Fuzzy, Uncertainty and randomness evaluation as
classification  implementation   derives   several
                                                                 follows,
components Such as Qualification, Experience, Past
                                             Table-5: JOB SITE Profile Assessment
                                 Deception Possibilities   Using Uncertainty Using Fuzzification        Using Randomness
     Deception component
                              (Expected / Warned by owner)    Evaluation         Evaluation                 Evaluation
Qualification                             >60%                  63/100             32/63                      32/32
Experience                                >90%                  91/100             15/91                      15/15
Drawn salary                              >80%                  86/100             40/86                      30/40
Expertise                                 >75%                  72/100             21/72                      21/21
Reasons for quit prior Job                >90%                  95/100             80/95                      60/80
                                   Genuineness in jobsite datum is of 5 % in all the aspects.

DOMAIN 4: Social Network                                         Fuzzy classification implementation derives several
                                                                 components such as Qualification, Experience, Age,
   Here the datum are organized from 10 of my well
                                                                 Sex, Location etc. Based on Uncertainty measurements
known friends circle,10 of my third party relation
                                                                 and randomized datum analysis we focuses on the key
circle,10 of random sample of asdf engg college
                                                                 factors and implementing the Fuzzy, Uncertainty and
students with initial awareness of our research concept.
                                                                 randomness evaluation as follows,
                                         Table-6: Social Network Profile Assessment
                             Deception Possibilities     Using Uncertainty        Using Fuzzification   Using Randomness
 Deception component
                                  (Expected)                Evaluation                Evaluation            Evaluation
 Age                                 >90 %                      17/30                    9/17                   6/9
 Sex                                 >75%                       5/30                      3/5                   3/3
 Location                            >90 %                      6/30                      3/6                   3/3
 Job& Qualification                  >90 %                      13/30                    4/13                   4/4
 Name                                >95 %                      28/30                    14/28                14/14

DOMAIN 5: SMS-Short Messaging Service                            classification  implementation    derives    several
                                                                 components Such as Message length, frequency and
    Here the datum are organized from our mobile, well
                                                                 type etc. Based on Uncertainty measurements and
known friends circle, third party relation circle,
                                                                 randomized datum analysis we focuses on the key
random sample of asdf engg college students with
                                                                 factors and implementing the Fuzzy, Uncertainty and
initial awareness of our research concept. Fuzzy
                                                                 randomness evaluation as follows,


                                                                                      www.ijorcs.org
12                                                                                    S.Rajkumar, V.Narayani, Dr.S.P.Victor

                                            Table-7: SMS Strategies Assessment
                             Deception Possibilities            Using Uncertainty Using Fuzzification Using Randomness
 Deception component
                          (Expected/Warned by owner)               Evaluation        Evaluation           Evaluation
 Message Frequency              Often/Rare/Normal                    OK                     OK                OK
 Message length                    Short maximum                      ----                  OK                OK
 Message Sender
                                      Forbidden                      OK                     OK                 ----
 Age/Sex/Location
                             Interruption/Interception/
 Message Type                                                        OK                     OK                OK
                             Modification/ Fabrication
                            Fallacy/Attraction/Threat/
 Message Motive             Trap/ Emotional/Sensitive/                ---                   OK                OK
                                   Informative
 Message Multimedia
                            Audio/ Image/ Video/ Text                OK                     OK                ------
 content
                           Regional/Good English/Lazy
 Message Language                                                    OK                     OK                OK
                                     typist
 Message Time               Day/Night/Midday/Midnight                OK                     ----              OK
 Message                         Standard Format/
                                                                     OK                     OK                OK
 Model/Prototype              Predefined/Customized
 Message Mobile
                                   Internal/External                 OK                     OK                OK
 Network

                                     OK- represents deception identification possibility.

DOMAIN 6: Advertisements                                          Advt type, Mode, Pitch, Motive, categorization etc.
                                                                  Based on Uncertainty measurements and randomized
  In this domain the datum are organized from our
                                                                  datum analysis we focuses on the key factors and
TV, Internet, and Newspapers etc. Fuzzy classification
                                                                  implementing the Fuzzy, Uncertainty and randomness
implementation derives several components Such as
                                                                  evaluation as follows,
                                             Table-8: Advertisement Assessment
                                      Deception Possibilities           Using              Using              Using
      Deception component             (Expected/Warned by             Uncertainty       Fuzzification      Randomness
                                             owner)                   Evaluation         Evaluation         Evaluation
 Events/Exhibition/Park                       20 %                           5%             10%                5%
 Consumer-Products                            30 %                            5%            20%                5%
 Medicines & Cosmetics                        70 %                           30%            30%               10%
 Land/Real-estate related                     90 %                           20%            60%               10%
 Medicine-Private/Secret disease               90 %                          15%               65%             10%
 cures
 Travel & tourism                              20 %                           5%               10%              5%
 Education related                             50 %                          10%               30%             10%
 Food Related                                  20 %                           4%               10%              6%
 Cloth Related                                 30 %                          10%               12%              8%
 Government sectors Related                     3%                            1%                1%              1%

                                                                  deception detection. At first we applied the
          V. RESULTS AND DISCUSSIONS
                                                                  Randomness towards the Matrimonial site, spam mail,
   Our experiment comprises three levels and seven                jobsite, social network, and short messaging service
stages which are revealed as follows,                             and advertisement domains. It identifies the least
   At Level-1 we applied the concept of Fuzziness,                deception detections but filtering the fair sided datum
Uncertainty and Randomness towards several                        from our spool of research items. Second we applied
domains; we faced lot of diverging factors which leads            the Uncertainty tools for identifying the deception
us to unpredictable characteristics for identifying the           detection towards Matrimonial site, spam mail, jobsite,


                                                                                     www.ijorcs.org
Unification of Randomized Anomaly in Deception Detection using Fuzzy Logic under Uncertainty                         13

social network, and short messaging service and              implementation to towards the Matrimonial site, spam
advertisement domains. It provides us tolerable              mail, jobsite, social network, short messaging service
detections of deception; third we applied the Fuzziness      and advertisement domains. Here Randomness &
concept for identifying the deception detection towards      uncertainty produces 50% to 60 % efficiency,
Matrimonial site, Spam mail, jobsite, social network,        Randomness & Fuzziness produces 61% to 75 %
and short messaging service and advertisement                Fuzziness & uncertainty produces 76% to 90% for
domains.                                                     detecting deceptions.
   Then at Level -2 we implement the mixture of two             Then at Level-3 we implement the Full-fledged
components at a time such that the output filtering          combination of Randomness, Uncertainty and
results of first component will be the input for the         Fuzziness to towards the Matrimonial site, spam mail,
second component, taking Randomness & Uncertainty,           jobsite, social network, and short messaging service
Randomness & Fuzziness and Fuzziness &                       and advertisement domains. It produces more than 95
Uncertainty are the three stages for this level of           % efficiency in detecting deceptions successfully.
                                           Table-9: Performance Assessment
                                                     Matrimonial     Spam                Social             Advertise-
 Level   Stage             Success Rate                                       Jobsite               SMS
                                                        Site         Mail               Network               ment
           1     Randomness                            20 %          18 %      26 %      31 %       24 %      18 %
   1       2     Uncertainty                           35 %          36 %      32 %      36 %       34 %      30 %
           3     Fuzziness                             45 %          44 %      48 %      46 %       43 %      40 %
           1     Randomness & Uncertainty              56 %          53 %      53 %      52 %       57 %      56 %
   2       2     Randomness & Fuzziness                68 %          71 %      66 %      67 %       63 %      66 %
           3     Fuzziness & Uncertainty               79 %          86 %      83 %      87 %       86 %      90 %
                 Randomness, Uncertainty and
   3       1                                            93 %          92 %     94 %       93 %      96 %      96 %
                 Fuzziness

                    VI. CONCLUSION                           deceptive keywords. In future we will try with experts
                                                             in this same area. We suggested this technique for the
    Deception detection is an art or a fashion which
                                                             police department to use it in their deep core
itself act as a separate course in our new trends of life.
                                                             investigations for deception detection.
We consider three major concepts of decision making
components such as fuzzy logic, Uncertainty and                  Deception is always availabe as an vital part in our
Randomness for our implementation strategies to              daily life. But individuals and organizations need not
towards the Matrimonial site, spam mail, jobsite,            to be powerless to detect its use against them. This
social network, and short messaging service and              paper reflects our computational effort in identifying
advertisement domains. We implement the strategies           Deception in its deep core. In future we will
individually, then taking two at time and finally with       implement the mixture of Neuro fuzzy, Genetic
all the three components and identifies several results.     algorithm,Automata theory and NP-Completeness with
All the components mixture produces excellent results        its deep impact.
than taking two at a time moreover taking two at a
time is better than applying in its individual nature. In                        VII. REFERENCES
This research paper we acquire several information
                                                               [1] Alan Ryan -Professional liars - Truth-Telling, Lying
concepts, modality which leads us to vast science of               and Self-Deception Social Research, Fall, 1996.
deception detection. So we include the facts which
                                                               [2] Bond,c.,F. “A world of lies: the global deception
relates to our concept are identified for processing in
                                                                   research    team”,    JournalofCrossculturePsychology
our research.                                                      2006Vol.37(1)60-74.
   Media plays a vital role in detecting the deceptions.       [3] Burgoon, J.K., and Qin,T. “The Dynamic Nature of
Direct communication mode can be analyzed with the                 Deceptive Verbal Communication”. Journal of
gestures feeling the waves of opponent in an                       Language and Social Psychology, 2006, vol25(1), 1-22.
exact/accurate mode, whereas video conference can be           [4] Gupta, Bina (1995). Perceiving in Advaita Vedanta:
handled with proper care [4].The repetitive plays                  Epistemological Analysis and Interpretation . Delhi:
varying the speed of presentation analysis is an                   Motilal Banarsidass. pp. 197. ISBN 81-208-1296-4.
additional skill present in video conference while             [5] Pennebaker,J.W,Mehl,M.R.&Niederhoffer,K.
audio chat focuses on the pitch stress and pause time              ”Psychological aspects of natural language use: our
gaps of communication response as its primary factors              words, ourselves”. Annual Review of Psychology,
                                                                   2003, 54,547-577
[2]. SMS or Email is blind folded in detecting
deceptions. Subjects in our case ABCD students are             [6] Steve Woznaik,L.Simon, 2002. “The art of deception:
unaware of few technically advanced psychometric                   controlling the human element of security”. Wiley; 1
                                                                   edition.


                                                                                 www.ijorcs.org
14                                                        S.Rajkumar, V.Narayani, Dr.S.P.Victor

[7] Whissell,C., Fournier,M.,Pelland,R., Weir, D.,&
    Makaree,K. ”A comparison of Classfiifcation methods
    for predicting deception in computer-mediated
    communication”. Journal of Management Information
    systems, 2004,139-165.
[8] Zuckerman, M.,DePaulo, B.M. and Rosenthal,
    R.”Verbal and Nonverbal Communication of
    Deception”. In L.Berkowitz(Ed)(1981) .




                                                          www.ijorcs.org

More Related Content

What's hot

EEG Based Classification of Emotions with CNN and RNN
EEG Based Classification of Emotions with CNN and RNNEEG Based Classification of Emotions with CNN and RNN
EEG Based Classification of Emotions with CNN and RNN
ijtsrd
 
T4 Introduction to the modelling and verification of, and reasoning about mul...
T4 Introduction to the modelling and verification of, and reasoning about mul...T4 Introduction to the modelling and verification of, and reasoning about mul...
T4 Introduction to the modelling and verification of, and reasoning about mul...
EASSS 2012
 
IRJET- Facial Emotion Detection using Convolutional Neural Network
IRJET- Facial Emotion Detection using Convolutional Neural NetworkIRJET- Facial Emotion Detection using Convolutional Neural Network
IRJET- Facial Emotion Detection using Convolutional Neural Network
IRJET Journal
 
Neural mechanisms of decision making - emotion vs. cognition
Neural mechanisms of decision making - emotion vs. cognitionNeural mechanisms of decision making - emotion vs. cognition
Neural mechanisms of decision making - emotion vs. cognition
Kyongsik Yun
 
Intelligence test
Intelligence testIntelligence test
Lecture2 - Machine Learning
Lecture2 - Machine LearningLecture2 - Machine Learning
Lecture2 - Machine Learning
Albert Orriols-Puig
 
Software Agent Oriented Programming
Software Agent Oriented Programming Software Agent Oriented Programming
Software Agent Oriented Programming
JayabalanRajalakshmi
 
HIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCS
HIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCSHIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCS
HIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCS
Albert Orriols-Puig
 
Substructrual surrogates for learning decomposable classification problems: i...
Substructrual surrogates for learning decomposable classification problems: i...Substructrual surrogates for learning decomposable classification problems: i...
Substructrual surrogates for learning decomposable classification problems: i...
kknsastry
 
Final review nopause
Final review nopauseFinal review nopause
Final review nopause
j4tang
 
Modeling XCS in class imbalances: Population sizing and parameter settings
Modeling XCS in class imbalances: Population sizing and parameter settingsModeling XCS in class imbalances: Population sizing and parameter settings
Modeling XCS in class imbalances: Population sizing and parameter settings
kknsastry
 
Chapter6.doc
Chapter6.docChapter6.doc
Chapter6.doc
butest
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
researchinventy
 
Intro tofuzzysystemsnuralnetsgeneticalgorithms
Intro tofuzzysystemsnuralnetsgeneticalgorithmsIntro tofuzzysystemsnuralnetsgeneticalgorithms
Intro tofuzzysystemsnuralnetsgeneticalgorithms
elkhayatyazid
 

What's hot (14)

EEG Based Classification of Emotions with CNN and RNN
EEG Based Classification of Emotions with CNN and RNNEEG Based Classification of Emotions with CNN and RNN
EEG Based Classification of Emotions with CNN and RNN
 
T4 Introduction to the modelling and verification of, and reasoning about mul...
T4 Introduction to the modelling and verification of, and reasoning about mul...T4 Introduction to the modelling and verification of, and reasoning about mul...
T4 Introduction to the modelling and verification of, and reasoning about mul...
 
IRJET- Facial Emotion Detection using Convolutional Neural Network
IRJET- Facial Emotion Detection using Convolutional Neural NetworkIRJET- Facial Emotion Detection using Convolutional Neural Network
IRJET- Facial Emotion Detection using Convolutional Neural Network
 
Neural mechanisms of decision making - emotion vs. cognition
Neural mechanisms of decision making - emotion vs. cognitionNeural mechanisms of decision making - emotion vs. cognition
Neural mechanisms of decision making - emotion vs. cognition
 
Intelligence test
Intelligence testIntelligence test
Intelligence test
 
Lecture2 - Machine Learning
Lecture2 - Machine LearningLecture2 - Machine Learning
Lecture2 - Machine Learning
 
Software Agent Oriented Programming
Software Agent Oriented Programming Software Agent Oriented Programming
Software Agent Oriented Programming
 
HIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCS
HIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCSHIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCS
HIS'2008: New Crossover Operator for Evolutionary Rule Discovery in XCS
 
Substructrual surrogates for learning decomposable classification problems: i...
Substructrual surrogates for learning decomposable classification problems: i...Substructrual surrogates for learning decomposable classification problems: i...
Substructrual surrogates for learning decomposable classification problems: i...
 
Final review nopause
Final review nopauseFinal review nopause
Final review nopause
 
Modeling XCS in class imbalances: Population sizing and parameter settings
Modeling XCS in class imbalances: Population sizing and parameter settingsModeling XCS in class imbalances: Population sizing and parameter settings
Modeling XCS in class imbalances: Population sizing and parameter settings
 
Chapter6.doc
Chapter6.docChapter6.doc
Chapter6.doc
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Intro tofuzzysystemsnuralnetsgeneticalgorithms
Intro tofuzzysystemsnuralnetsgeneticalgorithmsIntro tofuzzysystemsnuralnetsgeneticalgorithms
Intro tofuzzysystemsnuralnetsgeneticalgorithms
 

Similar to Unification Of Randomized Anomaly In Deception Detection Using Fuzzy Logic Under Uncertainty

Intelligent Agent Perception
Intelligent Agent PerceptionIntelligent Agent Perception
Intelligent Agent Perception
Molly Maymar
 
Dave snowden practice without sound theory will not scale
Dave snowden   practice without sound theory will not scaleDave snowden   practice without sound theory will not scale
Dave snowden practice without sound theory will not scale
AGILEMinds
 
AI CHAPTER 7.pdf
AI CHAPTER 7.pdfAI CHAPTER 7.pdf
AI CHAPTER 7.pdf
VatsalAgola
 
Neuroecon Seminar Pres
Neuroecon Seminar PresNeuroecon Seminar Pres
Neuroecon Seminar Pres
tkvaran
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
IOSR Journals
 
P017129296
P017129296P017129296
P017129296
IOSR Journals
 
Studying the Impact of Ubiquitous Monitoring Technology on Office Worker Beha...
Studying the Impact of Ubiquitous Monitoring Technology on Office Worker Beha...Studying the Impact of Ubiquitous Monitoring Technology on Office Worker Beha...
Studying the Impact of Ubiquitous Monitoring Technology on Office Worker Beha...
sipcworkshop
 
Kiran computer
Kiran computerKiran computer
Kiran computer
Kiran Gohil
 
Secure360 on Risk
Secure360 on RiskSecure360 on Risk
Secure360 on Risk
Alexander Hutton
 
Data Mining In Support Of Fraud Management
Data Mining In Support Of Fraud ManagementData Mining In Support Of Fraud Management
Data Mining In Support Of Fraud Management
Scattareggia
 
Data mining in support of fraud management
Data mining in support of fraud managementData mining in support of fraud management
Data mining in support of fraud management
Stefano Maria De' Rossi
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage Detection
IOSR Journals
 
Exploring the role of DSA in Zero Knowledge Proof
Exploring the role of DSA in Zero Knowledge ProofExploring the role of DSA in Zero Knowledge Proof
Exploring the role of DSA in Zero Knowledge Proof
22f2000330
 
In sequence Polemical Pertinence via Soft Enumerating Repertoire
In sequence Polemical Pertinence via Soft Enumerating RepertoireIn sequence Polemical Pertinence via Soft Enumerating Repertoire
In sequence Polemical Pertinence via Soft Enumerating Repertoire
IRJET Journal
 
IRJET-In sequence Polemical Pertinence via Soft Enumerating Repertoire
IRJET-In sequence Polemical Pertinence via Soft Enumerating RepertoireIRJET-In sequence Polemical Pertinence via Soft Enumerating Repertoire
IRJET-In sequence Polemical Pertinence via Soft Enumerating Repertoire
IRJET Journal
 
Skin Infection Detection using Dempster-Shafer Theory
Skin Infection Detection using Dempster-Shafer TheorySkin Infection Detection using Dempster-Shafer Theory
Skin Infection Detection using Dempster-Shafer Theory
Andino Maseleno
 
A Vague Sense Classifier for Detecting Vague Definitions in Ontologies
A Vague Sense Classifier for Detecting Vague Definitions in OntologiesA Vague Sense Classifier for Detecting Vague Definitions in Ontologies
A Vague Sense Classifier for Detecting Vague Definitions in Ontologies
Panos Alexopoulos
 
lecture1423723637.pdf
lecture1423723637.pdflecture1423723637.pdf
lecture1423723637.pdf
BalkrishanJindal4
 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
Nisha Jain
 
SURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHOD
SURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHODSURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHOD
SURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHOD
IJCI JOURNAL
 

Similar to Unification Of Randomized Anomaly In Deception Detection Using Fuzzy Logic Under Uncertainty (20)

Intelligent Agent Perception
Intelligent Agent PerceptionIntelligent Agent Perception
Intelligent Agent Perception
 
Dave snowden practice without sound theory will not scale
Dave snowden   practice without sound theory will not scaleDave snowden   practice without sound theory will not scale
Dave snowden practice without sound theory will not scale
 
AI CHAPTER 7.pdf
AI CHAPTER 7.pdfAI CHAPTER 7.pdf
AI CHAPTER 7.pdf
 
Neuroecon Seminar Pres
Neuroecon Seminar PresNeuroecon Seminar Pres
Neuroecon Seminar Pres
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
 
P017129296
P017129296P017129296
P017129296
 
Studying the Impact of Ubiquitous Monitoring Technology on Office Worker Beha...
Studying the Impact of Ubiquitous Monitoring Technology on Office Worker Beha...Studying the Impact of Ubiquitous Monitoring Technology on Office Worker Beha...
Studying the Impact of Ubiquitous Monitoring Technology on Office Worker Beha...
 
Kiran computer
Kiran computerKiran computer
Kiran computer
 
Secure360 on Risk
Secure360 on RiskSecure360 on Risk
Secure360 on Risk
 
Data Mining In Support Of Fraud Management
Data Mining In Support Of Fraud ManagementData Mining In Support Of Fraud Management
Data Mining In Support Of Fraud Management
 
Data mining in support of fraud management
Data mining in support of fraud managementData mining in support of fraud management
Data mining in support of fraud management
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage Detection
 
Exploring the role of DSA in Zero Knowledge Proof
Exploring the role of DSA in Zero Knowledge ProofExploring the role of DSA in Zero Knowledge Proof
Exploring the role of DSA in Zero Knowledge Proof
 
In sequence Polemical Pertinence via Soft Enumerating Repertoire
In sequence Polemical Pertinence via Soft Enumerating RepertoireIn sequence Polemical Pertinence via Soft Enumerating Repertoire
In sequence Polemical Pertinence via Soft Enumerating Repertoire
 
IRJET-In sequence Polemical Pertinence via Soft Enumerating Repertoire
IRJET-In sequence Polemical Pertinence via Soft Enumerating RepertoireIRJET-In sequence Polemical Pertinence via Soft Enumerating Repertoire
IRJET-In sequence Polemical Pertinence via Soft Enumerating Repertoire
 
Skin Infection Detection using Dempster-Shafer Theory
Skin Infection Detection using Dempster-Shafer TheorySkin Infection Detection using Dempster-Shafer Theory
Skin Infection Detection using Dempster-Shafer Theory
 
A Vague Sense Classifier for Detecting Vague Definitions in Ontologies
A Vague Sense Classifier for Detecting Vague Definitions in OntologiesA Vague Sense Classifier for Detecting Vague Definitions in Ontologies
A Vague Sense Classifier for Detecting Vague Definitions in Ontologies
 
lecture1423723637.pdf
lecture1423723637.pdflecture1423723637.pdf
lecture1423723637.pdf
 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
 
SURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHOD
SURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHODSURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHOD
SURVEY PAPER ON OUT LIER DETECTION USING FUZZY LOGIC BASED METHOD
 

More from IJORCS

Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsHelp the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
IJORCS
 
Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4
IJORCS
 
Real-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition SystemReal-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition System
IJORCS
 
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveFPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
IJORCS
 
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
IJORCS
 
Algebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionAlgebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression Function
IJORCS
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
IJORCS
 
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
IJORCS
 
CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2
IJORCS
 
Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1
IJORCS
 
Voice Recognition System using Template Matching
Voice Recognition System using Template MatchingVoice Recognition System using Template Matching
Voice Recognition System using Template Matching
IJORCS
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
IJORCS
 
A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...
IJORCS
 
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
IJORCS
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETs
IJORCS
 
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
IJORCS
 
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemAn Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
IJORCS
 
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
IJORCS
 
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
IJORCS
 
A PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering AlgorithmA PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering Algorithm
IJORCS
 

More from IJORCS (20)

Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsHelp the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
 
Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4
 
Real-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition SystemReal-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition System
 
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveFPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
 
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
 
Algebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionAlgebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression Function
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
 
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
 
CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2
 
Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1
 
Voice Recognition System using Template Matching
Voice Recognition System using Template MatchingVoice Recognition System using Template Matching
Voice Recognition System using Template Matching
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
 
A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...
 
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETs
 
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
 
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemAn Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
 
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
 
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
 
A PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering AlgorithmA PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering Algorithm
 

Recently uploaded

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 

Recently uploaded (20)

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 

Unification Of Randomized Anomaly In Deception Detection Using Fuzzy Logic Under Uncertainty

  • 1. International Journal of Research in Computer Science eISSN 2249-8265 Volume 2 Issue 2 (2011) pp. 7-14 © White Globe Publications www.ijorcs.org UNIFICATION OF RANDOMIZED ANOMALY IN DECEPTION DETECTION USING FUZZY LOGIC UNDER UNCERTAINTY S.Rajkumar1, V.Narayani2, Dr.S.P.Victor3 1 Research Scholar/Bharathiar University, Asst.Prof & Head / CSE, NIET,Coimbatore, India. 2 Research Scholar, Dept. Of Computer Science, St.Xavier’s College, Tirunelveli, India. 3 Associate Professor & Head, Dept. Of Computer Science, St.Xavier’s College, Tirunelveli, India. Abstract: In the recent era of computer electronic different types of fuzzifiers. Fuzzification of a real- communication we are currently facing the critical valued variable is done with intuition, experience and impact of Deception which plays its vital role in the analysis of the set of rules and conditions associated mode of affecting efficient information sharing system. with the input data variables. There is no fixed set of Identifying Deception in any mode of communication procedures for the fuzzification [6]. is a tedious process without using the proper tool for detecting those vulnerabilities. This paper deals with C. Uncertainty the efficient tools of Deception detection in which Uncertainty must be taken in a sense radically combined application implementation is our main distinct from the familiar notion of risk, from which it focus rather than with its individuality. We propose a has never been properly separated. Although the terms research model which comprises Fuzzy logic, are used in various ways among the general public, Uncertainty and Randomization. This paper deals with many specialists in decision theory, statistics and other an experiment which implements the scenario of quantitative fields have defined uncertainty, risk, and mixture application with its revealed results. We also their measurement as follows: discuss the combined approach rather than with its individual performance. 1. Uncertainty: A state of having limited knowledge where it is impossible to exactly describe existing Keywords: Deception, Detection, Uncertainty, Fuzzy state or future outcome, more than one possible logic, Randomness outcome. 2. Measurement of Uncertainty: A set of possible I. INTRODUCTION states or outcomes where probabilities are assigned Detection of Deception is useful for managers, to each possible state or outcome. employers, and for anyone to use in everyday 3. Risk: A state of uncertainty where some possible situations where telling the truth from a lie can help outcomes have an undesired effect or significant prevent you from being a victim of fraud/scams and loss. other deceptions [1]. 4. Measurement of Risk: A set of measured uncertainties where some possible outcomes are A. Identifying the Deception losses, and the magnitudes of those losses variables Deception detection between relational partners is [3]. extremely difficult, unless a partner tells a blatant or D. Randomness: obvious lie or contradicts something the other partner knows to be true [5]. The Dictionary of Oxford defines 'random' as "Having no definite aim or purpose; not sent or guided B. Fuzzy logic in a particular direction; made, done, occurring, etc., without method or conscious choice; haphazard." This Fuzzy logic is the part of artificial intelligence or concept of randomness suggests a non-order or non- machine learning which interprets a human’s actions. coherence in a sequence of steps or symbols, such that Computers can interpret only true or false values but a there is no intelligible pattern or combination [8]. human being can reason the degree of truth or degree of falseness. Fuzzy models interpret the human actions II. PROPOSED RESEARCH MODEL and are also called intelligent systems [7]. Fuzzification is the process of changing a real scalar The following figures show the basic and its value into a fuzzy value. This is achieved with the expanded form for the proposed model. www.ijorcs.org
  • 2. Information Sharing System Test for uncertainty Combining Uncertainty & Fuzzy Logic Combining Implementing Randomization technique Uncertainty & Randomization Applying Fuzzy Logic Combining Randomization & Fuzzy Logic Combining Uncertainty, Fuzzy Logic and Uncertainty Figure1: Basic Proposed Model Actual Datum Probable Legitimacy Fuzzy Membership Value Interviewer Probableness Level 3 Allocation Predictability Systematic Operation Rules Authority Expectation Allocation Uncertainty Uncertain Randomized Fuzzified Entropy Enviornment Level 2 Assumption Fuzzified Enviornment Randomization Assumption Random Fuzzy-Anomaly Neutrality Uncertainty Uncertainty Classification Level 1 Categorization Interviewee Uniformity Proposed Datum Condition Condition Figure2: Expanded Proposed Model III. RESEARCH METHODOLOGY iii. Probing the assumptions A. Fuzzified Anomalies for Our Proposed Research It is a critical thought of identifying the associations Model: based on assumptions towards a competitor by the corresponding recruiter. The interception of fuzzified anomaly in the field of Recruiters selection process can be analyzed as, For example Base 0 ≤ 𝐶𝐶𝐴𝐴𝐴𝐴𝐴𝐴 (𝑥𝑥) = 𝜇𝜇 𝑡𝑡 (𝑥𝑥) ≤ 1 Association i. Specify the range of conditions Platform Independent Correspondent Polymorphism Application of Candidate Answer at the time‘t’ holds the membership Features of Java Encapsulation Base Features function. Inheritance ii. Classification and categorization Classes and Objects Table I: Membership value assignments Abstractness Factor-X Membership value μt (x) Figure3: Association Rules sample Fully knowledged* 0.900 to 1.000 Recruiter Selection Maximized knowledge 0.800 to 0.899 Desired knowledge 0.700 to 0.799 Assumption Deceiver Sufficient knowledge 0.600 to 0.699 =>Association of the following Average knowledge 0.500 to 0.599 ∗ cues identification (verbal and non verbal) Partial knowledge 0.400 to 0.499 ∗ Test mode –self explanation Show-off knowledge 0.300 to 0.399 ∗ Critical questions ∗ Concentration on each counter output Minimized knowledge 0.200 to 0.299 ∗ Usage of Ranking / comparison Poor knowledge 0.100 to 0.199 Null knowledge* 0.000 to 0.099 iv. Operational rules * Null and fully knowledge of values 0.000 & 1.000 If (More Quantified Data) Then are subject to constraints of Ideal machine. If (Gestural Deception) Then If (Verbal DD) Then www.ijorcs.org
  • 3. 10 S.Rajkumar, V.Narayani, Dr.S.P.Victor lim 𝑝𝑝 log 𝑝𝑝 = 0 𝑝𝑝→0 If (Non-verbal/modal DD) Then If (Contradictory Results) Then The proof of this limit can be quickly obtained Deception Detection= true 𝑛𝑛 applying LHospital’s rule. 𝐻𝐻(𝑥𝑥) = − � 𝑝𝑝(𝑥𝑥 𝑖𝑖 ) log 𝑏𝑏 𝑝𝑝( 𝑥𝑥 𝑖𝑖 ) v. Allocation of Boolean sets 𝑁𝑁 𝑁𝑁 𝐴𝐴𝐴𝐴 𝐴𝐴 𝐴𝐴 𝐴𝐴(𝑥𝑥) = 𝜋𝜋 � �𝛼𝛼 𝑖𝑖 (𝑥𝑥)𝛽𝛽𝑖𝑖 (𝑥𝑥)� 𝑖𝑖=1 𝑖𝑖=1 𝑗𝑗 =1 C. Randomness-Entropy for Our Proposed Research 𝑁𝑁 𝑁𝑁 + 𝜋𝜋 � �𝛼𝛼 𝑖𝑖 (𝑥𝑥)𝛾𝛾𝑖𝑖 (𝑥𝑥)� /2𝑁𝑁 Model: ii) Las vegas Algorithm 𝑖𝑖=1 𝑘𝑘=1 Las Vegas algorithm is a randomized algorithm that always gives correct results; that is, it always produces N = Number of testing components/ Questions the correct result or it informs about the failure. The αi = Assumption for an candidate with an initial setting usual definition of a Las Vegas algorithm includes the of α1(x) =1 as a deceiver restriction that the expected run time always be finite, βj = Non verbal communication when the expectation is carried out over the space of γk = verbal communication random information, or entropy, used in the algorithm. 0 <= Alloc(x) = μt (x) <= 1 The complexity class of decision problems that have Las Vegas algorithms with expected polynomial Where Alloc(x) =1 represents deceiver and Alloc(x) = runtime is ZPP.(Zero-error Probabilistic Polynomial 0 represents non deceiver. Time) It turns out that 𝑍𝑍𝑍𝑍𝑍𝑍 = 𝑅𝑅𝑅𝑅 � 𝑅𝑅𝑅𝑅 −1 vi. Statistical probability Deceivers most probably use the recurrence strategic tokens during their responses. Let us class. RP-Randomized Polynomial complexity class consider the collection of sentences CR(s) consisting and its inverse as CO-(RP) or RP-1 which is intimately of a sequence of N words such as (r1, r2, …, rN), then connected with the way Las Vegas algorithms are the probability for the occurrence of CR(s) can be sometimes constructed. Namely the class RP is 𝑁𝑁 computed as randomized polynomial time consists of all decision 𝑃𝑃(𝐶𝐶 𝑅𝑅 (𝑠𝑠) = 𝜋𝜋 𝑃𝑃 (𝑟𝑟𝑖𝑖 /𝑟𝑟𝑖𝑖−𝑛𝑛+1 , … . , 𝑟𝑟𝑖𝑖−1 ) problems for which a randomized polynomial-time 𝑖𝑖 = 1 algorithm exists that always answers correctly when the correct answer is "no", but is allowed to be wrong where 𝑃𝑃(𝑟𝑟𝑖𝑖 /𝑟𝑟𝑖𝑖−𝑛𝑛+1 , … . , 𝑟𝑟𝑖𝑖−1 ) = frequency (𝑟𝑟𝑖𝑖−𝑛𝑛+1 , … . , 𝑟𝑟𝑖𝑖 ) / with a certain probability bounded away from one frequency (𝑟𝑟𝑖𝑖−𝑛𝑛+1 , … . , 𝑟𝑟𝑖𝑖−1 ) when the answer is "yes". Thus Las vegas plays its vital role in decision making. B. Randomness-Entropy for Our Proposed Research D. Random Uncertainty Evaluation for Our Proposed Model: Research Model Shannon denoted the entropy H of a discrete The uncertainty has a probabilistic basis and 𝐻𝐻(𝑋𝑋) = 𝐸𝐸(𝐼𝐼(𝑋𝑋)) random variable X with possible values {x1, ..., xn} as, reflects incomplete knowledge of the quantity. All measurements are subject to uncertainty and a measured value is only complete if it is accompanied Here E is the expected value, and I is by a statement of the associated uncertainty .The the Information content of X. I(X) is itself a random output quantity denoted by Z is often related to input variable. If p denotes the probability mass quantities denoted by X1, X2,…,XN in which the true function of X then the entropy can explicitly be written values of X1, X2,…,XN are unknown. Then the as. uncertainty measurement function Z(x) = f(X1, X2, …, 1 𝑛𝑛 𝑛𝑛 𝑛𝑛 𝐻𝐻(𝑥𝑥) = � 𝑝𝑝(𝑥𝑥 𝑖𝑖 )𝐼𝐼(𝑥𝑥 𝑖𝑖 ) = � 𝑝𝑝(𝑥𝑥 𝑖𝑖 ) log 𝑏𝑏 = − � 𝑝𝑝(𝑥𝑥 𝑖𝑖 ) log 𝑏𝑏 𝑝𝑝(𝑥𝑥 𝑖𝑖 ) XN) Consider estimates X1, X2, …, XN respectively 𝑝𝑝(𝑥𝑥 𝑖𝑖 ) towards X1, X2,…, XN based on certificates, reports, 𝑖𝑖=1 𝑖𝑖=1 𝑖𝑖=1 references, alarms and assumptions. Each Xi ~ where b is the base of the logarithm used. Common prob. Distribution values of b are 2, Euler's number e, and 10, and the unit of entropy is bit for b = 2, nat for b = e, and dit (or X1 _ Z(x) = X1+X2 digit) for b = 10.[3] X2 __ _ In the case of pi = 0 for some i, the value of the corresponding summand 0 logb 0 is taken to be 0, which is consistent with the limit: www.ijorcs.org
  • 4. 10 S.Rajkumar, V.Narayani, Dr.S.P.Victor The standard uncertainty value for Z(xi) can be Dissatisfied: F-0.5,E-0.75,D-0.99,C to A->1.0 approximated as standard deviation for prob(xi) Nullified: E -0.5,D-0.75,C-0.99,B to A ->1.0 Table 2: Probability Rating iii. Explicit / Easier Questionnaire Knowledge Interval Rating for a Prob. Expert: J-0.75 I -0.99 H-A -> 1.0 candidate Above average: I-0.75,H-0.99,G-A->1.0 0 – 10 NULL-A 0.0 to 0.1 Average:H-0.75,G-0.99,F-A->1.0 11 – 20 POOR-B 0.1 to 0.2 21 - 30 MINIMIZED-C 0.2 to 0.3 Below average:G-0.75,F-0.99,E-A->1.0 31 - 40 SHOW-OFF-D 0.3 to 0.4 Dissatisfied: F-0.75,E-0.99,D-A->1.0 41 - 50 PARTIAL-E 0.4 to 0.5 Nullified: E-0.75,D-0.99,C-A->1.0 51 – 60 AVERAGE-F 0.5 to 0.6 61 – 70 SUFFICIENT-G 0.6 to 0.7 IV. EXPERIMENT 71 – 80 DESIRED-H 0.7 to 0.8 81 – 90 MAXIMIZED-I 0.8 to 0.9 The research methodology is a combination or a fusion of Uncertainty, Fuzziness and Randomized 91 – 100 FULLY-J 0.9 to 1.0 nature. We want to test the integrity with various application domains for evaluation and comparison. i. Standard / Critical Questionnaire The Domain needed for the focusing are as follows, Expert–.25,I–.5,H-.75,G–.99,F to A – 1.0 1. Matrimonial Centre/Site. Above AVG–I-.25,H-.5,G-.75,F–.99,E to A – 1.0 2. Spam Mail 3. Jobsite. Average–H-.25,G–.5,F-0.75, E-0.99, Dto A – 1.0 4. Social Network. Below AVG–G-.25,F-.5,E-.75,D-.99,Cto A – 1.0 5. SMS system. 6. Advertisements. Dissatisfied– F-.25,E–.5,D-.75,C-.99,Bto A – 1.0 Nullified–E-0.25, D-0.5, C-0.75 ,B – 0.99 ,A-1.0 DOMAIN 1: Matrimonial Centre / Site ii. Optimal / Normal Questionnaire Referring a qwer centre at Tirunelveli district, Tamilnadu, India .A sample of 60 profiles is taken and Expert: J-0.5 ,I-0.75, H-0.99, G to A -> 1.0 the results are in Table 3. Above AVG: I-0.5,H-0.75,G-0.99, F to A->1.0 Fuzzy classification implementation derives several Average:H-0.5,G-0.75,F-0.99, E to A->1.0 components Such as Name, Parent, Image, DOB,Job Description, Salary, Marital status, qualification, extra Below AVG: G-0.5,F-0.75,E-0.99,D to A->1.0 curricular activities etc. Based on Uncertainty measurements we focus on the key factors as follows, Table-3: Matrimonial Profile Assessment Deception Possibilities Using Uncertainty Using Fuzzification Using Randomness Deception (Expected/ Warnedby owner) Evaluation Evaluation Evaluation Image >80 % 49/60 9/11 2/2 DOB >70% 38/60 18/22 4/4 Job Description >80% 39/60 18/21 3/3 Salary >90% 52/60 6/8 2/2 Marital status >20% 52/60 8/8 Nil Qualification >50% 25/60 30/35 5/5 DOMAIN 2: Spam Mail Online commercial, subscription, Entertainment, Sympathy, donation, softwares, marketing etc. Based We took a sample of 100 mails. Fuzzy on Uncertainty measurements and randomized datum classification implementation derives several analysis we focuses on the key factors as follows, components Such as Attraction, Affection, Intimation, www.ijorcs.org
  • 5. 10 S.Rajkumar, V.Narayani, Dr.S.P.Victor Table-4: SPAM MAIL Assessment Deception Using Using Using Uncertainty Deception component Possibilities Fuzzification Randomness Evaluation (Expected) Evaluation Evaluation Prize/Lottery/Travel trip 11 1/11 0/11 - Friend Invitation 13 1/13 0/13 - Love/Marriage/Sex 12 2/12 0/12 - E-shopping 8 3/8 0/8 - Magazines/Club/Subscription 4 1/4 0/4 - Movie/Songs/Video/File 6 1/6 0/6 - downloads Help self/Others/Sympathy 3 1/3 1/3 0/3 Charity/Welfare/Disaster 3 2/3 1/3 0/3 donation Games/Play or Download 6 5/6 0/6 - Advertisements/Marketing 21 10/21 5/21 0/21 Genuine Mails: 13/100 DOMAIN 3: Job Site salary, Expertise, skills, reasons for quit the past job, organizing capability etc. Based on Uncertainty We collected some data from ABCD Softech ltd measurements and randomized datum analysis we coimbatore-software company where we used HR focuses on the key factors and implementing the manager datum for our research purpose. Fuzzy Fuzzy, Uncertainty and randomness evaluation as classification implementation derives several follows, components Such as Qualification, Experience, Past Table-5: JOB SITE Profile Assessment Deception Possibilities Using Uncertainty Using Fuzzification Using Randomness Deception component (Expected / Warned by owner) Evaluation Evaluation Evaluation Qualification >60% 63/100 32/63 32/32 Experience >90% 91/100 15/91 15/15 Drawn salary >80% 86/100 40/86 30/40 Expertise >75% 72/100 21/72 21/21 Reasons for quit prior Job >90% 95/100 80/95 60/80 Genuineness in jobsite datum is of 5 % in all the aspects. DOMAIN 4: Social Network Fuzzy classification implementation derives several components such as Qualification, Experience, Age, Here the datum are organized from 10 of my well Sex, Location etc. Based on Uncertainty measurements known friends circle,10 of my third party relation and randomized datum analysis we focuses on the key circle,10 of random sample of asdf engg college factors and implementing the Fuzzy, Uncertainty and students with initial awareness of our research concept. randomness evaluation as follows, Table-6: Social Network Profile Assessment Deception Possibilities Using Uncertainty Using Fuzzification Using Randomness Deception component (Expected) Evaluation Evaluation Evaluation Age >90 % 17/30 9/17 6/9 Sex >75% 5/30 3/5 3/3 Location >90 % 6/30 3/6 3/3 Job& Qualification >90 % 13/30 4/13 4/4 Name >95 % 28/30 14/28 14/14 DOMAIN 5: SMS-Short Messaging Service classification implementation derives several components Such as Message length, frequency and Here the datum are organized from our mobile, well type etc. Based on Uncertainty measurements and known friends circle, third party relation circle, randomized datum analysis we focuses on the key random sample of asdf engg college students with factors and implementing the Fuzzy, Uncertainty and initial awareness of our research concept. Fuzzy randomness evaluation as follows, www.ijorcs.org
  • 6. 12 S.Rajkumar, V.Narayani, Dr.S.P.Victor Table-7: SMS Strategies Assessment Deception Possibilities Using Uncertainty Using Fuzzification Using Randomness Deception component (Expected/Warned by owner) Evaluation Evaluation Evaluation Message Frequency Often/Rare/Normal OK OK OK Message length Short maximum ---- OK OK Message Sender Forbidden OK OK ---- Age/Sex/Location Interruption/Interception/ Message Type OK OK OK Modification/ Fabrication Fallacy/Attraction/Threat/ Message Motive Trap/ Emotional/Sensitive/ --- OK OK Informative Message Multimedia Audio/ Image/ Video/ Text OK OK ------ content Regional/Good English/Lazy Message Language OK OK OK typist Message Time Day/Night/Midday/Midnight OK ---- OK Message Standard Format/ OK OK OK Model/Prototype Predefined/Customized Message Mobile Internal/External OK OK OK Network OK- represents deception identification possibility. DOMAIN 6: Advertisements Advt type, Mode, Pitch, Motive, categorization etc. Based on Uncertainty measurements and randomized In this domain the datum are organized from our datum analysis we focuses on the key factors and TV, Internet, and Newspapers etc. Fuzzy classification implementing the Fuzzy, Uncertainty and randomness implementation derives several components Such as evaluation as follows, Table-8: Advertisement Assessment Deception Possibilities Using Using Using Deception component (Expected/Warned by Uncertainty Fuzzification Randomness owner) Evaluation Evaluation Evaluation Events/Exhibition/Park 20 % 5% 10% 5% Consumer-Products 30 % 5% 20% 5% Medicines & Cosmetics 70 % 30% 30% 10% Land/Real-estate related 90 % 20% 60% 10% Medicine-Private/Secret disease 90 % 15% 65% 10% cures Travel & tourism 20 % 5% 10% 5% Education related 50 % 10% 30% 10% Food Related 20 % 4% 10% 6% Cloth Related 30 % 10% 12% 8% Government sectors Related 3% 1% 1% 1% deception detection. At first we applied the V. RESULTS AND DISCUSSIONS Randomness towards the Matrimonial site, spam mail, Our experiment comprises three levels and seven jobsite, social network, and short messaging service stages which are revealed as follows, and advertisement domains. It identifies the least At Level-1 we applied the concept of Fuzziness, deception detections but filtering the fair sided datum Uncertainty and Randomness towards several from our spool of research items. Second we applied domains; we faced lot of diverging factors which leads the Uncertainty tools for identifying the deception us to unpredictable characteristics for identifying the detection towards Matrimonial site, spam mail, jobsite, www.ijorcs.org
  • 7. Unification of Randomized Anomaly in Deception Detection using Fuzzy Logic under Uncertainty 13 social network, and short messaging service and implementation to towards the Matrimonial site, spam advertisement domains. It provides us tolerable mail, jobsite, social network, short messaging service detections of deception; third we applied the Fuzziness and advertisement domains. Here Randomness & concept for identifying the deception detection towards uncertainty produces 50% to 60 % efficiency, Matrimonial site, Spam mail, jobsite, social network, Randomness & Fuzziness produces 61% to 75 % and short messaging service and advertisement Fuzziness & uncertainty produces 76% to 90% for domains. detecting deceptions. Then at Level -2 we implement the mixture of two Then at Level-3 we implement the Full-fledged components at a time such that the output filtering combination of Randomness, Uncertainty and results of first component will be the input for the Fuzziness to towards the Matrimonial site, spam mail, second component, taking Randomness & Uncertainty, jobsite, social network, and short messaging service Randomness & Fuzziness and Fuzziness & and advertisement domains. It produces more than 95 Uncertainty are the three stages for this level of % efficiency in detecting deceptions successfully. Table-9: Performance Assessment Matrimonial Spam Social Advertise- Level Stage Success Rate Jobsite SMS Site Mail Network ment 1 Randomness 20 % 18 % 26 % 31 % 24 % 18 % 1 2 Uncertainty 35 % 36 % 32 % 36 % 34 % 30 % 3 Fuzziness 45 % 44 % 48 % 46 % 43 % 40 % 1 Randomness & Uncertainty 56 % 53 % 53 % 52 % 57 % 56 % 2 2 Randomness & Fuzziness 68 % 71 % 66 % 67 % 63 % 66 % 3 Fuzziness & Uncertainty 79 % 86 % 83 % 87 % 86 % 90 % Randomness, Uncertainty and 3 1 93 % 92 % 94 % 93 % 96 % 96 % Fuzziness VI. CONCLUSION deceptive keywords. In future we will try with experts in this same area. We suggested this technique for the Deception detection is an art or a fashion which police department to use it in their deep core itself act as a separate course in our new trends of life. investigations for deception detection. We consider three major concepts of decision making components such as fuzzy logic, Uncertainty and Deception is always availabe as an vital part in our Randomness for our implementation strategies to daily life. But individuals and organizations need not towards the Matrimonial site, spam mail, jobsite, to be powerless to detect its use against them. This social network, and short messaging service and paper reflects our computational effort in identifying advertisement domains. We implement the strategies Deception in its deep core. In future we will individually, then taking two at time and finally with implement the mixture of Neuro fuzzy, Genetic all the three components and identifies several results. algorithm,Automata theory and NP-Completeness with All the components mixture produces excellent results its deep impact. than taking two at a time moreover taking two at a time is better than applying in its individual nature. In VII. REFERENCES This research paper we acquire several information [1] Alan Ryan -Professional liars - Truth-Telling, Lying concepts, modality which leads us to vast science of and Self-Deception Social Research, Fall, 1996. deception detection. So we include the facts which [2] Bond,c.,F. “A world of lies: the global deception relates to our concept are identified for processing in research team”, JournalofCrossculturePsychology our research. 2006Vol.37(1)60-74. Media plays a vital role in detecting the deceptions. [3] Burgoon, J.K., and Qin,T. “The Dynamic Nature of Direct communication mode can be analyzed with the Deceptive Verbal Communication”. Journal of gestures feeling the waves of opponent in an Language and Social Psychology, 2006, vol25(1), 1-22. exact/accurate mode, whereas video conference can be [4] Gupta, Bina (1995). Perceiving in Advaita Vedanta: handled with proper care [4].The repetitive plays Epistemological Analysis and Interpretation . Delhi: varying the speed of presentation analysis is an Motilal Banarsidass. pp. 197. ISBN 81-208-1296-4. additional skill present in video conference while [5] Pennebaker,J.W,Mehl,M.R.&Niederhoffer,K. audio chat focuses on the pitch stress and pause time ”Psychological aspects of natural language use: our gaps of communication response as its primary factors words, ourselves”. Annual Review of Psychology, 2003, 54,547-577 [2]. SMS or Email is blind folded in detecting deceptions. Subjects in our case ABCD students are [6] Steve Woznaik,L.Simon, 2002. “The art of deception: unaware of few technically advanced psychometric controlling the human element of security”. Wiley; 1 edition. www.ijorcs.org
  • 8. 14 S.Rajkumar, V.Narayani, Dr.S.P.Victor [7] Whissell,C., Fournier,M.,Pelland,R., Weir, D.,& Makaree,K. ”A comparison of Classfiifcation methods for predicting deception in computer-mediated communication”. Journal of Management Information systems, 2004,139-165. [8] Zuckerman, M.,DePaulo, B.M. and Rosenthal, R.”Verbal and Nonverbal Communication of Deception”. In L.Berkowitz(Ed)(1981) . www.ijorcs.org