Results 41 to 50 of about 207,683 (286)

Mining Bad Credit Card Accounts from OLAP and OLTP

open access: yes, 2017
Credit card companies classify accounts as a good or bad based on historical data where a bad account may default on payments in the near future. If an account is classified as a bad account, then further action can be taken to investigate the actual ...
Eberle, William   +2 more
core   +1 more source

The Transformation of Accounting Information Systems Curriculum in the Last Decade [PDF]

open access: yes, 2020
Accounting information systems (AIS) are an extremely important component of accounting and accounting education. The purpose of the current study is to examine the transformation of accounting information systems (AIS) curriculum in the last decade. The
Larkin, Timothy Patrick
core   +1 more source

Blockchain as a driver of innovation in the fintech industry and modern financial markets [PDF]

open access: yesIndustrija
This paper aims to analyze the role of blockchain technology in the transformation of the financial sector, with particular emphasis on its application within FinTech solutions and its potential to drive structural changes in financial markets.
Dimić Maja   +2 more
doaj   +1 more source

Big data analytics in health care by data mining and classification techniques

open access: yesICT Express, 2022
Big data is the compilation of enormous data that arrives from diverse sources for instance online transaction details, social media, sensor data, etc. Such assortment of enormous data developed is tough to evaluate by conventional processing relevance’s.
Jayasri N.P., R. Aruna
doaj   +1 more source

Ensuring the visibility and traceability of items through logistics chain of automotive industry based on AutoEPCNet Usage [PDF]

open access: yes, 2016
Traceability in logistics is the capability of the participants to trace the products throughout the supply chain by means of either the product and/or container identifiers in a forward and/or backward direction.
Beneš, Filip   +7 more
core   +2 more sources

Color Visual Secret Sharing for QR Code with Perfect Module Reconstruction

open access: yesApplied Sciences, 2019
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc.
Tao Liu, Bin Yan, Jeng-Shyang Pan
doaj   +1 more source

A multi-agent architecture for electronic payment [PDF]

open access: yes, 2003
The Internet has brought about innumerable changes to the way enterprises do business. An essential problem to be solved before the widespread commercial use of the Internet is to provide a trustworthy solution for electronic payment.
Guan, SU, Hua, F
core   +1 more source

From transactions to interactions: the value of co-creation processes within online brand consumer communities

open access: yesBusiness Process Management Journal, 2020
PurposeThe aim of this paper is to examine the extent of value co-creation activity that exists in online brand communities. The approach was to use elements of practice theory to analyse the member-to-member Adult Fans of Lego (AFOL) communityDesign/methodology/approachThe method adopted was netnography based on a study of eight LEGO Facebook groups ...
Barry Ardley   +2 more
openaire   +2 more sources

Query Dictionary for Frequent Non-Indexed Queries in HTAP Databases

open access: yesIEEE Access, 2022
The increasing demand for the simultaneous transaction and review of the data for either decision making or forecasting has created a need for faster and better Hybrid Transactional/Analytical Processing (HTAP).
Sucharitha Shetty   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy