{"id":"https://openalex.org/W3117004855","doi":"https://doi.org/10.14704/web/v17i2/web17079","title":"Insurance Customer Authentication Using SVM and Financial Time Series Analysis for Mobile Applications","display_name":"Insurance Customer Authentication Using SVM and Financial Time Series Analysis for Mobile Applications","publication_year":2020,"publication_date":"2020-12-21","ids":{"openalex":"https://openalex.org/W3117004855","doi":"https://doi.org/10.14704/web/v17i2/web17079","mag":"3117004855"},"language":"en","primary_location":{"id":"doi:10.14704/web/v17i2/web17079","is_oa":true,"landing_page_url":"https://doi.org/10.14704/web/v17i2/web17079","pdf_url":null,"source":{"id":"https://openalex.org/S4210195749","display_name":"Webology","issn_l":"1735-188X","issn":["1735-188X"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310318996","host_organization_name":"University of Tehran Press","host_organization_lineage":["https://openalex.org/P4310318996"],"host_organization_lineage_names":["University of Tehran Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Webology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.14704/web/v17i2/web17079","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057608018","display_name":"R Harikrishnan","orcid":"https://orcid.org/0000-0001-5512-2345"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"R. Harikrishnan","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"R. Jebakumar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R. Jebakumar","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101416673","display_name":"S. Ganesh Kumar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Ganesh Kumar","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5025564191","display_name":"Amu tha","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Amu tha","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5057608018"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3762,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73124203,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"17","issue":"2","first_page":"945","last_page":"956"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11536","display_name":"Consumer Retail Behavior Studies","score":0.9710000157356262,"subfield":{"id":"https://openalex.org/subfields/1406","display_name":"Marketing"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11536","display_name":"Consumer Retail Behavior Studies","score":0.9710000157356262,"subfield":{"id":"https://openalex.org/subfields/1406","display_name":"Marketing"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9674000144004822,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9258000254631042,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7927783727645874},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7456787824630737},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6885573863983154},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6390411853790283},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4916456341743469},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4345166087150574},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41887497901916504},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3124890625476837}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7927783727645874},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7456787824630737},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6885573863983154},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6390411853790283},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4916456341743469},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4345166087150574},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41887497901916504},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3124890625476837},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.14704/web/v17i2/web17079","is_oa":true,"landing_page_url":"https://doi.org/10.14704/web/v17i2/web17079","pdf_url":null,"source":{"id":"https://openalex.org/S4210195749","display_name":"Webology","issn_l":"1735-188X","issn":["1735-188X"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310318996","host_organization_name":"University of Tehran Press","host_organization_lineage":["https://openalex.org/P4310318996"],"host_organization_lineage_names":["University of Tehran Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Webology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.14704/web/v17i2/web17079","is_oa":true,"landing_page_url":"https://doi.org/10.14704/web/v17i2/web17079","pdf_url":null,"source":{"id":"https://openalex.org/S4210195749","display_name":"Webology","issn_l":"1735-188X","issn":["1735-188X"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310318996","host_organization_name":"University of Tehran Press","host_organization_lineage":["https://openalex.org/P4310318996"],"host_organization_lineage_names":["University of Tehran Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Webology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1705642415","https://openalex.org/W1993810324","https://openalex.org/W2051761035","https://openalex.org/W2108279131","https://openalex.org/W2125279885","https://openalex.org/W2133679872","https://openalex.org/W2143902225","https://openalex.org/W2155139768","https://openalex.org/W2181980586","https://openalex.org/W2379198023","https://openalex.org/W2473784818","https://openalex.org/W2583229339","https://openalex.org/W2794377947","https://openalex.org/W2900839216","https://openalex.org/W3123373525"],"related_works":["https://openalex.org/W4200385009","https://openalex.org/W2121192050","https://openalex.org/W1946269094","https://openalex.org/W3033677767","https://openalex.org/W2993041258","https://openalex.org/W2103129630","https://openalex.org/W2035164471","https://openalex.org/W4226084338","https://openalex.org/W2783875446","https://openalex.org/W3196892517"],"abstract_inverted_index":{"Insurance":[0],"industry":[1],"facilitates":[2],"the":[3,7,14,20,26,36,41,54,61,65,70,74,85,107,115,132,138,142,152],"users":[4],"to":[5,38],"access":[6],"information":[8],"easily":[9],"in":[10,28,56,77,92],"their":[11],"jobs":[12],"without":[13],"repetition":[15],"of":[16,124],"password":[17],"and":[18,90,101,155],"remember":[19],"multiple":[21],"passwords.":[22],"Current":[23],"technology":[24],"attracts":[25],"insurers":[27],"authentication":[29,144],"process.":[30,145],"The":[31,50,110,118,127,146],"identity":[32],"authentification":[33],"processes":[34],"requires":[35],"customers":[37],"jump":[39],"through":[40],"many":[42],"hoops,":[43],"which":[44],"construct":[45],"an":[46],"unpleasant":[47],"customer":[48],"experience.":[49],"proposed":[51,139],"method":[52],"reduces":[53],"challenges":[55],"insurance":[57,108],"business":[58],"data":[59,97,133],"using":[60,64,98,151],"classification":[62,119],"algorithms":[63],"support":[66,128],"vector":[67,129],"machine":[68,130],"(SVM)for":[69],"mobile":[71,78,160],"Applications":[72],"since":[73],"growing":[75],"trend":[76],"apps":[79],"will":[80],"make":[81],"it":[82],"easy":[83],"for":[84,106,159],"users.":[86],"A":[87],"seasonal":[88],"variations":[89],"correlation":[91],"this":[93],"financial":[94],"time":[95],"series":[96],"statistical":[99],"methods":[100],"ultimately":[102],"generate":[103],"trading":[104],"signals":[105],"data.":[109],"feature":[111],"extraction":[112],"process":[113,120,135],"increases":[114,131],"user":[116,125,143],"security.":[117],"improves":[121],"different":[122],"level":[123],"identity.":[126],"validation":[134],"quickly.":[136],"Finally":[137],"work":[140,148],"enhances":[141],"frame":[147],"is":[149],"implemented":[150],"matlabR2014":[153],"software":[154],"results":[156],"were":[157],"simulated":[158],"apps.":[161]},"counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
