<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="13024" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/13024?output=omeka-xml" accessDate="2026-04-05T12:07:04+00:00">
  <collection collectionId="5">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="64">
                <text>Articles</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="19">
    <name>Article</name>
    <description>Faculty Publications -Articles</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="79278">
              <text>Leveraging ensemble learning for enhanced security in credit card transaction fraudulent within smart cities for cybersecurity challenges</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="79279">
              <text>Cyber security; Ensemble learning algorithms; Fraud; Fraud detection; Machine learning; Smart cities</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="79280">
              <text>In the age of digital transactions, credit cards have emerged as a prevalent form of payment in smart cities. However, the surge in online transactions has heightened the challenge of accurately discerning legitimate from fraudulent activities. This paper addresses this crucial concern by introducing a pioneering system for detecting fraudulent credit card transactions, particularly within highly imbalanced datasets, in the realm of cybersecurity. This paper proposes a hybrid model to effectively manage imbalanced data and enhance the detection of fraudulent transactions. This paper emphasizes the efficacy of the hybrid approach in proficiently identifying and mitigating fraudulent activities within highly imbalanced datasets, thereby contributing to the reduction of financial losses for both merchants and customers in smart cities. As cybersecurity in smart cities evolves, this paper underscores the significance of ensemble learning and cross-validation techniques in optimizing credit card transaction analysis and fortifying the security of digital payment systems.  2024, Taru Publications. All rights reserved.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="79281">
              <text>Padhi B.K.; Chakravarty S.; Naik B.; Nayak S.R.; Poonia R.C.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="79282">
              <text>Journal of Discrete Mathematical Sciences and Cryptography, Vol-27, No. 4, pp. 1233-1246.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="79283">
              <text>Taru Publications</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="79284">
              <text>2024-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="79285">
              <text>&lt;a href="https://doi.org/10.47974/JDMSC-1978" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.47974/JDMSC-1978&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85197740854&amp;amp;doi=10.47974%2FJDMSC-1978&amp;amp;partnerID=40&amp;amp;md5=29845c968f21895411f72513c9cbd593" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85197740854&amp;amp;doi=10.47974%2fJDMSC-1978&amp;amp;partnerID=40&amp;amp;md5=29845c968f21895411f72513c9cbd593&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="79286">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="79287">
              <text>ISSN: 9720529</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="79288">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="79289">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="79290">
              <text>Article</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="79291">
              <text>Padhi B.K., Department of Computer Science &amp;amp; Engineering, Centurion University of Technology &amp;amp; Management, Odisha, Bhubaneswar, 761211, India; Chakravarty S., Department of Computer Science &amp;amp; Engineering, Centurion University of Technology &amp;amp; Management, Odisha, Bhubaneswar, 761211, India; Naik B., Department of Computer Application, Veer Surendra Sai University of Technology, Odisha, Burla, 768018, India; Nayak S.R., School of Computer Engineering, KIIT Deemed to be University, Odisha, Bhubaneswar, 751024, India; Poonia R.C., Department of Computer Science, CHRIST (Deemed to be University) Delhi-NCR, Uttar Pradesh, Ghaziabad, 201003, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
