International Journal of Computer Sciences and Engineering. Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693



Similar documents
Role of Neural network in data mining

Credit Card Fraud Detection Using Self Organised Map

FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks

Segmentation of Breast Tumor from Mammographic Images Using Histogram Peak Slicing Threshold

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

EFFICIENCY OF DECISION TREES IN PREDICTING STUDENT S ACADEMIC PERFORMANCE

Impelling Heart Attack Prediction System using Data Mining and Artificial Neural Network

6.2.8 Neural networks for data mining

Big Data Developments in Transaction Analytics

A Hybrid Artificial Intelligence System for Assistance in Remote Monitoring of Heart Patients

Data Mining and Neural Networks in Stata

ANN Based Fault Classifier and Fault Locator for Double Circuit Transmission Line

Analecta Vol. 8, No. 2 ISSN

UNIVERSITY OF NORTH BENGAL P.O. NORTH BENGAL UNIVERSITY RAJA RAMMOHUNPUR, DIST: DARJEELING, PIN

Executive Summary. Summary - 1

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 3, September 2013

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

Space Reduction using String and Synonym Matching Algorithm (SSMA)

UNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MS SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 1 EXAMINATION 2015/2016 INTELLIGENT SYSTEMS

A New Approach For Estimating Software Effort Using RBFN Network

USING SELF-ORGANISING MAPS FOR ANOMALOUS BEHAVIOUR DETECTION IN A COMPUTER FORENSIC INVESTIGATION

Laser Gesture Recognition for Human Machine Interaction

NTC Project: S01-PH10 (formerly I01-P10) 1 Forecasting Women s Apparel Sales Using Mathematical Modeling

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management

Back Propagation Neural Network for Wireless Networking

Neural Network Design in Cloud Computing

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

Forecasting Stock Prices using a Weightless Neural Network. Nontokozo Mpofu

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems

Neural Networks for Machine Learning. Lecture 13a The ups and downs of backpropagation

Decision Algorithms in Fire Detection Systems

Course 395: Machine Learning

Lecture 6. Artificial Neural Networks

Neural Networks in Data Mining

Neural Network Stock Trading Systems Donn S. Fishbein, MD, PhD Neuroquant.com

Neural Network Approach to Web Application Protection

A Content based Spam Filtering Using Optical Back Propagation Technique

Neural Networks and Back Propagation Algorithm

XIV. Title. 2.1 Schematics of the WEP Encryption in WEP technique Decryption in WEP technique Process of TKIP 25

Keywords: Image complexity, PSNR, Levenberg-Marquardt, Multi-layer neural network.

Artificial Intelligence and Machine Learning Models

Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap

DATA SECURITY BASED ON NEURAL NETWORKS

Histogram Peak Normalization Based Threshold to Detect Brain Tumor from T1 Weighted MRI

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.

Machine Learning: Overview

Neural Networks and Support Vector Machines

Appendices. Appendix A: List of Publications

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing

Web Usage Mining: Identification of Trends Followed by the user through Neural Network

Predicting the Risk of Heart Attacks using Neural Network and Decision Tree

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network

Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms

Classification of Engineering Consultancy Firms Using Self-Organizing Maps: A Scientific Approach

Credit Card Fraud Detection using Hidden Morkov Model and Neural Networks

Multimodal Biometric Recognition Security System

Recognition of Facial Expression Using AAM and Optimal Neural Networks

Feed-Forward mapping networks KAIST 바이오및뇌공학과 정재승

DEVELOPMENT OF A COMPUTATIONAL INTELLIGENCE COURSE FOR UNDERGRADUATE AND GRADUATE STUDENTS

Generalized Anxiety Disorder : Prediction using ANN

Neural Network Add-in

Self Organizing Maps: Fundamentals

Artificial Neural Networks are bio-inspired mechanisms for intelligent decision support. Artificial Neural Networks. Research Article 2014

THE HUMAN BRAIN. observations and foundations

Neural Networks for Intrusion Detection and Its Applications

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING

Machine Learning and Data Mining -

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Design and performance evaluation of Advanced Priority Based Dynamic Round Robin Scheduling Algorithm (APBDRR)

What is counseling? Counseling is the means by which one person helps another through purposeful conversation

A Survey on Intrusion Detection System with Data Mining Techniques

Anupam Tarsauliya Shoureya Kant Rahul Kala Researcher Researcher Researcher IIITM IIITM IIITM Gwalior Gwalior Gwalior

GLOVE-BASED GESTURE RECOGNITION SYSTEM

Stabilization by Conceptual Duplication in Adaptive Resonance Theory

MS1b Statistical Data Mining

Learning to Process Natural Language in Big Data Environment

Your Questions from Chapter 1. General Psychology PSYC 200. Your Questions from Chapter 1. Your Questions from Chapter 1. Science is a Method.

Padma Charan Das Dept. of E.T.C. Berhampur, Odisha, India

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

Building an Advanced Invariant Real-Time Human Tracking System

Edifice an Educational Framework using Educational Data Mining and Visual Analytics

A Simple Feature Extraction Technique of a Pattern By Hopfield Network

Artificial Neural Networks and Support Vector Machines. CS 486/686: Introduction to Artificial Intelligence

Intrusion Detection via Machine Learning for SCADA System Protection

Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing Classifier

Global Variables. However, when global variables are used in a function block or control modules, they must be declared as external

Short Term Electricity Price Forecasting Using ANN and Fuzzy Logic under Deregulated Environment

How to Explain (and Overcome) 2% Barrier in Teaching Computer Science: Fuzzy Ideas Can Help

Implementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid 60

Forecasting Student Admission in Colleges with Neural Networks

Clarkian Logic on Trial. Eryn J. Newman. Victoria University of Wellington. and. Elizabeth F. Loftus. University of California, Irvine

ICSES Journal on Image Processing and Pattern Recognition (IJIPPR), Aug. 2015, Vol. 1, No. 1

Trust Based Infererence Violation Detection Scheme Using Acut Model

Recurrent Neural Networks

T O B C A T C A S E G E O V I S A T DETECTIE E N B L U R R I N G V A N P E R S O N E N IN P A N O R A MISCHE BEELDEN

DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD

Artificial Neural Network and Non-Linear Regression: A Comparative Study


Transcription:

International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Pattern Variation Method to Detect Lie Using Artificial Neural Network (PVMANN) Shantanu Chakraborty * Sri Guru Vidyamandir, Champasari, Siliguri, West Bengal 7343 informshan@gmail.com Rakesh Kumar Mandal Dept of Computer Science & Application, University of North Bengal, Raja Rammohunpur, Dist Darjeeling, West Bengal 73413 rakesh_it22@yahoo.com Abstract This beautiful world is a collection of variety of people. They have different sort of mind. Some people always speak the truth. Some hardly have the habits to tell the truth. If a person is guilty then he or she must try to save him or herself and conceal his or her sin. If a system can be designed to detect lie then a genuine and trusty counseling can be done for the establishment of the truth. This paper contains an algorithm PVMANN which makes a gateway to detect a person s truthfulness. Keyword-Lie detection, Artificial Neural Network (ANN), Pattern, Perceptron, Segmentation I. INTRODUCTION: This algorithm is based on untrained data and it is a basis of unsupervised learning by Artificial Neural Network [1]. A person will be asked five questions having answering options as yes or no. Evidently the method will treat the answers as Binary (1 or ). Same questions will be asked in different five days. His current answer will be compared with his first or earliest answers. If any difference occurs then he or she will be treated as a liar. II. SIMILAR STUDIES Mic Hanlon scientists at Manchester Metropolitan University that interprets facial gestures could be the most accurate lie detector using just a laptop and a camera [2]. Patrick Kennedy used Artificial intelligence to detect lies via tiny changes in facial expressions [3]. Mark Williams Pontin on April 21, 29 made review on lie detection based on facial expressions [4]. Leonard Saxe, PhD, Psychologist (1991) has argued, the idea that we can detect a person's veracity by monitoring psycho physiological changes is more myth than reality. Even the term "lie detector," used to refer to polygraph testing, is a misnomer. So-called "lie detection"[5]. John P. Clark and Larry L. Tifft American Sociologist worked for Polygraphic validation on lie detection [6]. This paper is divided into two sections. Section 1 discusses methodology and Section 2 discusses the algorithm. III. METHODOLGY An Artificial Neural Network has been depicted figure 1. It consists of five input vectors x1, x2, x3, x4, x5 and w 1, w2, w3, w4, w5 are five weights for those five input vectors. Those all weights are fixed to 1.These input vectors are answers collected from an individual in five sets. The first set of answers that given by the an individual are stored as initial pattern which will help to calculate the threshold i.e. the difference of initial and current set of answers. The difference justifies the truth of his reply. National Conference on Computational Technologies-(NCCT-216), Available online at: www.ijcseonline.org Page No. 57

International Journal of Computer Sciences and Engineering Vol.-4(1), PP(57-6) Feb 216, E-ISSN: 2347-2693 x 1 w 1 x 2 w 2 ynet w 3 x 3 w 4 x 4 w 5 X 5 Figure 1: Basic ANN The questions are given below: Q no: 1) Are you under Fourteen? Q no: 2) Have you scored more than 6% Q no: 3) Can you operate Computer? Q no: 4) Can you play Badminton? Q no: 5) travelling by Flight? All the answers of the above questions have two answering options i.e. Yes or No. For Yes the Binary representation is 1 and for No the Binary representation is. The answers of the mentioned five questions in binary are stored in the input vectors x 1, x 2, x 3, x 4, x 5. The net input of the ANN is calculated as follows: ynet i = i d i = ynet initial ynet i d= ( )/n w i = 1 III. ALGORITHM STEP 1: Declare, x ini [5], x[5], w[5], i, d i [5], : ynet ini, ynet i STEP 2: Set all weights w i x i w[i] by 1 which is fixed. STEP 3: Ask Five Questions and initialize the answers in binary in the array x ini [5]. STEP 4: Calculate: ynet ini = ynet ini + w[i]* x ini [i] STEP 5: Repeat Step 4 for i=1 to 5 for 5 set of answers. STEP 6: Ask same questions in day 1 & store the answers in array x[1]. STEP 7: Calculate ynet i = ynet i + w[i]* xi[i] STEP 8: Repeat Step 7 for i=1 to 5 for 5 set of answers. STEP 9: Calculate the absolute difference from first set of answers to answers of day1 d i [1] =abs(ynet ini - ynet) STEP 4: Repeat Step 6 to Step 9 for i=1 to 5 for 5 set of answers in day2, day3, day4, day 5. STEP 6: Calculate Average Difference d= (d i [] + d i [1] + d i [2] + d i [3] + d i [4])/5 STEP 7: Check if the difference d= then print He is true else he is liar. STEP 8: END National Conference on Computational Technologies-(NCCT-216), Page No. 58

International Journal of Computer Sciences and Engineering Vol.-4(1), PP(57-6) Feb 216, E-ISSN: 2347-2693 IV: RESULT ANALYSIS Initial Data: Y=1, N= QUESTIONS Are you under Fourteen? 1 marks in previous standard? travelling by Flight? 1 Answers at day 1 and Difference: QUESTIONS Difference Are you under Fourteen? 2 1 Answers at day 2 and Difference: QUESTIONS Difference Are you under Fourteen? 1 2 Can you play Badminton? 1 travelling by Flight? Answers at day 3 and Difference: QUESTIONS Difference Are you under Fourteen? 1 1 Can you operate computer? National Conference on Computational Technologies-(NCCT-216), Page No. 59

International Journal of Computer Sciences and Engineering Vol.-4(1), PP(57-6) Feb 216, E-ISSN: 2347-2693 Answers at day 4 and Difference: QUESTIONS Difference Are you under Fourteen? 3 Can you operate computer? travelling by Flight? Answers at day 5 and Difference: QUESTIONS Difference Are you under Fourteen? 1 Difference table: 1 2 3 4 5 Average Output 2 2 1 3 1.6 Liar V: DISCUSSION This algorithm is an attempt using Self Organizing Map (SOM), based on a simple logic of Artificial Neuron. It is an unsupervised learning technique that takes input from people and checks the habit of answering at different periods of time. But it has some limitation that if a situation arises where number of wrong answers and correct answers are same, which generates zero difference, the system shows the person is true though he is false. But it is just the beginning of thought, later a suitable modification will be performed to overcome the limitations and develop the method. REFERENCES [1]. L. Fausett, Fundamentals of Neural Networks, Architectures, Algorithms and Applications, Pearson Education, India, 29. [2]. Mic Hanlon, Mathematician at Manchestar Metropolitan University, Polygraphic Lie Detecting Technique. (www.gizmag.com/go/1735/) [3]. Patrick Kennedy, School of Professional Development (www3.imperial.ac.uk/newsandeventspggrp/imperialcollege/newssummary/news_1-3-214-15-2-12) [4]. Mark Williams Pontin, contributing editor to Technology Review (www.technologyreview.com/review/413133/lie-detection/page/1/) [5]. Saxe L, (1991), Lying, American Psychologist, Thoughts of an applied social psychologist. 46(4): 49-15. American Psychological Association, August 5, 24. [6]. John P. Clark and Larry L. Tifft, American Sociological Review, Vol. 31, No. 4 (Aug. 1966), pp. 516-523. National Conference on Computational Technologies-(NCCT-216), Page No. 6