نتایج جستجو برای: credit transaction
تعداد نتایج: 54198 فیلتر نتایج به سال:
Nowadays the customers prefer the most accepted payment mode via credit card for the convenient way of online shopping, paying bills in easiest way. At the same time the fraud transaction risks using credit card is a main problem which should be avoided. There are many data mining techniques available to avoid these risks effectively. In existing research they modelled the sequence of operation...
Soft-products are intangible products that can be consumed without shipment, such as software, music and calling cards (calling time). The demand for soft-products on the Internet has been increasing for the past few years. At the same time, fraudulent credit card transactions have also increased. Compared to tangible products, fraudulent credit card transactions on soft-products are easier to ...
Soft-products are intangible products that can be consumed without shipment, such as software, music and calling cards (calling time). The demand for soft-products on the Internet has been increasing for the past few years. At the same time, fraudulent credit card transactions have also increased. Compared to tangible products, fraudulent credit card transactions on soft-products are easier to ...
هدف از انجام این مطالعه، اندازه گیری اثر متغیر روابط اعطای تسهیلات بر هزینه مبادله (هماهنگی) اعطای تسهیلات بانکی در بانک کشاورزی و بررسی توالی اهمیت متغیرهای تاثیر گذار بر هزینه مبادله می باشد. هزینه های مبادله در کشورهای در حال توسعه به ویژه در بخش اعتباری بالا است و بالا بودن این هزینه باعث کاهش کارایی نظام بانکی و عملکرد آن می شود. داده های مورد استفاده در این مطالعه از طریق پرسشنامه که ح...
We propose a unique and hybrid approach containing data mining techniques, artificial intelligence and statistics in a single platform for fraud detection of online financial transaction, which combines evidences from current as well as past behavior. The proposed transaction risk generation model (TRSGM) consists of five major components, namely, DBSCAN algorithm, Linear equation, Rules, Data ...
Brief introduced the concepts of credit and credit risk in e-commerce, analyzed the impact of credit risks in e-commerce. Gave out the basic contents of personal credit information and business credit information in e-commerce, and analyzed and pointed out the main factors that caused the security risks of e-commerce credit information. At last, proposed some technical and non-technical measure...
This thesis presents a framework of a passively replicated transaction manager. By integrating transactions and replication, two well known fault tolerance techniques, the framework provides high availability for transactional systems and better support for non-deterministic execution for replicated systems. A prototype Java implementation of the framework, based on Jgroup/ARM and Jini, has bee...
Off-Chain transactions allow for the immediate transfer of Cryptocurrency between two parties, without delays or unavoidable transaction fees. Such capabilities are critical for mainstream Cryptocurrency adaption. They allow for the “Coffee-Coin Criteria”; under which a customer orders a coffee and pays for that coffee in bitcoins. This is not possible with On-Chain transactions today. No custo...
In this paper, we analyze the spending decisions of over 1.5 million Americans who vary in their degree of revealed credit constraints. Specifically, we analyze how these Americans spend their income tax refunds, using transaction-level data from a stored-value card product. Card-holders may choose among several tax settlement and loan options, effectively receiving cash as much as 90 days earl...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید