Results 71 to 80 of about 193,936 (207)

Checks and Balances: 2014 Update [PDF]

open access: yes, 2014
This report is the fourth in a series by The Pew Charitable Trusts examining key checking account terms and conditions. In our first report, in 2011, "Hidden Risks: The Case for Safe and Transparent Checking Accounts", we studied and reported on the ...

core  

Big data analytics in health care by data mining and classification techniques

open access: yesICT Express, 2022
Big data is the compilation of enormous data that arrives from diverse sources for instance online transaction details, social media, sensor data, etc. Such assortment of enormous data developed is tough to evaluate by conventional processing relevance’s.
Jayasri N.P., R. Aruna
doaj  

ANALISIS FAKTOR-FAKTOR YANG MEMPENGARUHI KEPUASAN PELANGGAN ONLINE

open access: yesJurnal Manajemen & Agribisnis, 2011
The objectives of this study  are to (1) analyze customer satisfaction with online shopping (2) determine factors influencing customer satisfactions with online shopping; (4) formulate strategies to increase customer satisfaction with online shopping ...
Amru Sahmono Boang Manalu   +2 more
doaj   +1 more source

The Art of Crypto Currencies: A Comprehensive Analysis of Popular Crypto Currencies

open access: yes, 2016
Crypto Currencies have recently gained enormous popularity amongst the general public. With each passing day, more and more companies are radically accepting crypto cur-rencies in their payment systems, paving way for an economic revolution.
Farooq, Sameet, Hameed, Sufian
core   +1 more source

EXPLORING THE POTENTIAL OF FEDERATED LEARNING TO EMPOWER CREDIT CARD FRAUDULENT TRANSACTION DETECTION WITH DEEP LEARNING TECHNIQUES [PDF]

open access: yesProceedings on Engineering Sciences
The rapid expansion of communication systems and computing technology has led to a significant increase in both traditional and online credit card transactions. Unfortunately, this surge has also resulted in a corresponding rise in fraudulent activities,
Chanda Sekhar Kolli   +5 more
doaj   +1 more source

The year of epoch of changes for the database technology

open access: yesТруды Института системного программирования РАН, 2018
In 2007, Michael Stonebraker and his colleagues published several papers that strongly stated a necessity of radical rethink of DBMSs’ architectures. These suggestions were supported by experiments with some new architectures targeted to applications of ...
S. D. Kuznetsov
doaj  

A modularized electronic payment system for agent-based e-commerce [PDF]

open access: yes, 2004
With the explosive growth of the Internet, electronic-commerce (e-commerce) is an increasingly important segment of commercial activities on the web.
Guan, SU, Hua, F, Tan, SL
core  

Optimization of Deep Learning-Based Model for Identification of Credit Card Frauds

open access: yesIEEE Access
With the growth of the internet, the landscape of commercial transactions has undergone significant changes. The digital revolution has permeated various aspects of our daily lives, notably transforming the financial system through digital money ...
Hemant Palivela   +6 more
doaj   +1 more source

Comparative Analysis Spread Spectrum and Parity Coding Steganography in E-commerce [PDF]

open access: yes
The transaction data online has increased compared to the previous communications that mostly in the form of voice and text messaging. To improve the security, data must be protected such a way that it cannot be attacked by unauthorized parties.
Brahim , W   +3 more
core  

LightChain: A DHT-based Blockchain for Resource Constrained Environments [PDF]

open access: yes, 2019
As an append-only distributed database, blockchain is utilized in a vast variety of applications including the cryptocurrency and Internet-of-Things (IoT).
Hassanzadeh-Nazarabadi, Yahya   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy