|
|
|
Abdul Rehman Khalid, Nsikak Owoh, Omair Uthmani, Moses Ashawa, Jude Osamor and John Adejoh
In the era of digital advancements, the escalation of credit card fraud necessitates the development of robust and efficient fraud detection systems. This paper delves into the application of machine learning models, specifically focusing on ensemble met...
ver más
|
|
|
|
|
|
|
Guoqing Dong, Weirong Li, Zhenzhen Dong, Cai Wang, Shihao Qian, Tianyang Zhang, Xueling Ma, Lu Zou, Keze Lin and Zhaoxia Liu
The developed prototype provides a more efficient and accurate solution for classifying dynagraph cards, meeting the requirements of oil field operations and enhancing economic benefits and work efficiency.
|
|
|
|
|
|
|
Romain Amyot, Noriyuki Kodera and Holger Flechsig
Simulation of atomic force microscopy (AFM) computationally emulates experimental scanning of a biomolecular structure to produce topographic images that can be correlated with measured images. Its application to the enormous amount of available high-res...
ver más
|
|
|
|
|
|
|
Audrone Janaviciute, Agnius Liutkevicius, Gedas Dabu?inskas and Nerijus Morkevicius
Online shopping has become a common and popular form of shopping, so online attackers try to extract money from customers by creating online shops whose purpose is to compel the buyer to disclose credit card details or to pay money for goods that are nev...
ver más
|
|
|
|
|
|
|
Jingjiang Xiao, Haiping Long, Xuemei He, Guoyu Chen, Tao Yuan, Yi Liu and Qiaoling Xu
In order to treat phosphorus-containing wastewater and realize the resource utilization of wetland plant residues, biochar was prepared by the pyrolysis of canna aquatic plant waste at 700 °C, and the adsorption characteristics of phosphorus by MgO-modif...
ver más
|
|
|
|
|
|
|
Poh Soon JosephNg, Pin Sen BrandonChan and Koo Yuen Phan
Security remains a top priority for those users in the hotel, even with the advent of innovative technological advances. This is because many tragic incidents, such as theft and crime, have occurred with unrestricted access. This paper proposes an intell...
ver más
|
|
|
|
|
|
|
Wanbing Huang, Wen Xiong and Xiaoxuan Wang
Trajectory similarity search (TSS) is a common operation for spatiotemporal data analysis. However, the existing TSS methods are mainly focused on GPS trajectories produced by moving objects such as vehicles. Further, these corresponding optimization str...
ver más
|
|
|
|
|
|
|
Ibomoiye Domor Mienye and Yanxia Sun
With the rapid developments in electronic commerce and digital payment technologies, credit card transactions have increased significantly. Machine learning (ML) has been vital in analyzing customer data to detect and prevent fraud. However, the presence...
ver más
|
|
|
|
|
|
|
Khaled A. M. Ahmed, Sabry F. Saraya, John F. Wanis and Amr M. T. Ali-Eldin
Open finance is evolving and extending open banking. This creates a large context that implies a financial and identity data exchange paradigm, which faces challenges to balance customer experience, security, and the self-control over personal identity i...
ver más
|
|
|
|
|
|
|
Khando Khando, M. Sirajul Islam and Shang Gao
The interplay between finance and technology with the use of the internet triggered the emergence of digital payment technologies. Such technological innovation in the payment industry is the foundation for financial inclusion. However, despite the conti...
ver más
|
|
|
|