CFP last date
20 May 2024
Reseach Article

Improvising Users Transaction Validation using Multi-Decision Tree Conditional of Terms in Block-Chain Verification

by Yasser Al Sultan, Bassam A. Zafar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 45
Year of Publication: 2019
Authors: Yasser Al Sultan, Bassam A. Zafar
10.5120/ijca2019919365

Yasser Al Sultan, Bassam A. Zafar . Improvising Users Transaction Validation using Multi-Decision Tree Conditional of Terms in Block-Chain Verification. International Journal of Computer Applications. 178, 45 ( Sep 2019), 31-34. DOI=10.5120/ijca2019919365

@article{ 10.5120/ijca2019919365,
author = { Yasser Al Sultan, Bassam A. Zafar },
title = { Improvising Users Transaction Validation using Multi-Decision Tree Conditional of Terms in Block-Chain Verification },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2019 },
volume = { 178 },
number = { 45 },
month = { Sep },
year = { 2019 },
issn = { 0975-8887 },
pages = { 31-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number45/30852-2019919365/ },
doi = { 10.5120/ijca2019919365 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:53:12.264230+05:30
%A Yasser Al Sultan
%A Bassam A. Zafar
%T Improvising Users Transaction Validation using Multi-Decision Tree Conditional of Terms in Block-Chain Verification
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 45
%P 31-34
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

User’s transactional validation in block chain at this time encounters a significant businesses fraud in block chain Validation. Research indicate that block chain algorithms having essential persistence had addressed security concepts influenced to carry out safety of user's contexts. Regulation how decentralized solutions can reduce the extent of transactions –fraud. In this paper a spot on a review of one other than bitcoin mining vulnerability various swapping's with larger blocks that compromise the security of block reliability causing a bit inconsistency to guarantee security leading to a replicas attempts. A Multi-Decision Tree algorithm set with a Conditional of Terms (CART) to Validates and updates transactions method supported with a multiple conditional terms of verifications is proposed to check the validity of the transactions pulled into a block, afterwards design interface to implement outcomes of data accuracy and fraud detection from the compared tested values. Result, and discussion make evident that validity of every transactions in a block either fulfilled, or violated in the terms of the conditions shown in flow-chart exhibited into both tables, and figure diagrams. Result point out simulation exchanges they are none redundant and validity between each user merely take place once.

References
  1. Hileman, G. (2016). State of blockchain q1 2016: Blockchain funding overtakes bitcoin. CoinDesk, New York, NY, May, 11.
  2. Akins, B. W., Chapman, J. L., & Gordon, J. M. (2014). A whole new world: Income tax considerations of the Bitcoin economy. Pitt. Tax Rev., 12, 25.
  3. Zhang, Y., & Wen, J. (2015, February). An IoT electric business model based on the protocol of bitcoin. In Intelligence in Next Generation Networks (ICIN), 2015 18th International Conference on (pp. 184-191). IEEE
  4. Eyal, I., & Sirer, E. G. (2018). Majority is not enough: Bitcoin mining is vulnerable. Communications of the ACM, 61(7), 95-102.‏
  5. CARTArticlehttps://www.datacamp.com/community/tutorials/decision-tree-classification-python
  6. Kiran, S. (2018). Decision Tree Analysis Tool with the Design Approach of Probability Density Function towards Uncertain Data Classification'. International
  7. Journal of Scientific Research in Science and Technology (IJSRST), Print ISSN, 2395-6011.
  8. Henseler, H., Hofste, J., & van Keulen, M. (2013, August). Digital-forensics based pattern recognition for
  9. Discovering identities in electronic evidence. In 2013 European Intelligence and Security Informatics Conference (pp. 112-116). IEEE.
  10. B.C., Amanze & H.C, Inyiama & Onyesolu, Moses. (2018). On the Development of Credit Card Fraud Detection System using Multi-Agents. International Journal of Computer Sciences and Engineering. 6. 1333-1343. 10.26438/ijcse/v6i6.13331343.
  11. Dhok, S.S. (2012). Credit Card Fraud Detection Using Hidden Markov Model.
  12. Singh, P., & Singh, M. (2015). Fraud detection by monitoring customer behavior and activities. International Journal of Computer Applications, 111(11).‏
  13. Motohashi, T., Hirano, T., Okumura, K., Kashiyama, M., Ichikawa, D., & Ueno, T. (2019). Secure and Scalable mHealth Data Management Using Blockchain Combined with Client Hashchain: System Design and Validation. Journal of medical Internet research, 21(5), e13385.‏
  14. Chanson, M., Bogner, A., Bilgeri, D., Fleisch, E., & Wortmann, F. (2019). Privacy-Preserving Data Certification in the Internet of Things: Leveraging Blockchain Technology to Protect Sensor Data. Journal of the Association for Information Systems.‏
  15. Arora, A., Sengupta, S., Maheshwari, N., Kumawat, J. S., & Bishnoi, V. (2019). U.S. Patent Application No. 15/794,322.‏
  16. Griffin, P. R., Megargel, A., & Shankararaman, V. R. (2019). A Decision Framework for Decentralized Control of Distributed Processes: Is Blockchain the Only Solution? In Architectures and Frameworks for Developing and Applying Blockchain Technology (pp. 1-27). IGI Global‏.
  17. PYTHONLibraryhttps://github.com/blockcypher/blockcypher-python.
Index Terms

Computer Science
Information Sciences

Keywords

Block chain validation and verification Decision Tree classifier python