Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (36)
  • Open Access

    ARTICLE

    Handling Class Imbalance in Online Transaction Fraud Detection

    Kanika1, Jimmy Singla1, Ali Kashif Bashir2, Yunyoung Nam3,*, Najam UI Hasan4, Usman Tariq5

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2861-2877, 2022, DOI:10.32604/cmc.2022.019990

    Abstract With the rise of internet facilities, a greater number of people have started doing online transactions at an exponential rate in recent years as the online transaction system has eliminated the need of going to the bank physically for every transaction. However, the fraud cases have also increased causing the loss of money to the consumers. Hence, an effective fraud detection system is the need of the hour which can detect fraudulent transactions automatically in real-time. Generally, the genuine transactions are large in number than the fraudulent transactions which leads to the class imbalance problem. In this research work, an… More >

  • Open Access

    ARTICLE

    Multi-Factor Authentication for Secured Financial Transactions in Cloud Environment

    D. Prabakaran1,*, Shyamala Ramachandran2

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1781-1798, 2022, DOI:10.32604/cmc.2022.019591

    Abstract The rise of the digital economy and the comfort of accessing by way of user mobile devices expedite human endeavors in financial transactions over the Virtual Private Network (VPN) backbone. This prominent application of VPN evades the hurdles involved in physical money exchange. The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server. The security in the cloud authentication server remains vulnerable to the results of threat in JP Morgan Data breach in 2014, Capital One Data Breach in 2019, and many more cloud server… More >

  • Open Access

    ARTICLE

    Blockchain Based Enhanced ERP Transaction Integrity Architecture and PoET Consensus

    Tehreem Aslam1, Ayesha Maqbool1, Maham Akhtar1, Alina Mirza2,*, Muhammad Anees Khan3, Wazir Zada Khan4, Shadab Alam5

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1089-1109, 2022, DOI:10.32604/cmc.2022.019416

    Abstract Enterprise Resource Planning (ERP) software is extensively used for the management of business processes. ERP offers a system of integrated applications with a shared central database. Storing all business-critical information in a central place raises various issues such as data integrity assurance and a single point of failure, which makes the database vulnerable. This paper investigates database and Blockchain integration, where the Blockchain network works in synchronization with the database system, and offers a mechanism to validate the transactions and ensure data integrity. Limited research exists on Blockchain-based solutions for the single point of failure in ERP. We established in… More >

  • Open Access

    ARTICLE

    An E-Business Event Stream Mechanism for Improving User Tracing Processes

    Ayman Mohamed Mostafa1,2,*, Saleh N. Almuayqil1, Wael Said2,3

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 767-784, 2021, DOI:10.32604/cmc.2021.018236

    Abstract With the rapid development in business transactions, especially in recent years, it has become necessary to develop different mechanisms to trace business user records in web server log in an efficient way. Online business transactions have increased, especially when the user or customer cannot obtain the required service. For example, with the spread of the epidemic Coronavirus (COVID-19) throughout the world, there is a dire need to rely more on online business processes. In order to improve the efficiency and performance of E-business structure, a web server log must be well utilized to have the ability to trace and record… More >

  • Open Access

    ARTICLE

    A Storage Optimization Scheme for Blockchain Transaction Databases

    Jingyu Zhang1,2, Siqi Zhong1, Jin Wang1,3, Xiaofeng Yu4,*, Osama Alfarraj5

    Computer Systems Science and Engineering, Vol.36, No.3, pp. 521-535, 2021, DOI:10.32604/csse.2021.014530

    Abstract As the typical peer-to-peer distributed networks, blockchain systems require each node to copy a complete transaction database, so as to ensure new transactions can by verified independently. In a blockchain system (e.g., bitcoin system), the node does not rely on any central organization, and every node keeps an entire copy of the transaction database. However, this feature determines that the size of blockchain transaction database is growing rapidly. Therefore, with the continuous system operations, the node memory also needs to be expanded to support the system running. Especially in the big data era, the increasing network traffic will lead to… More >

  • Open Access

    ARTICLE

    Pricing Method for Big Data Knowledge Based on a Two-Part Tariff Pricing Scheme

    Chuanrong Wu1,*, Huayi Yin1, Xiaoming Yang2, Zhi Lu3, Mark E. McMurtrey4

    Intelligent Automation & Soft Computing, Vol.26, No.5, pp. 1173-1184, 2020, DOI:10.32604/iasc.2020.014961

    Abstract Nowadays big data knowledge is being bought and sold online for market research, new product development, or other business decisions, especially when customer demands and consumer preferences knowledge for new product development are needed. Previous studies have introduced two commonly used pricing schemes for big data knowledge transactions (e.g., cloud services): Subscription pricing and pay-per-use pricing from a big data knowledge provider’s standpoint. However, few studies to date have investigated a two-part tariff pricing scheme for big data knowledge transactions, albeit this pricing scheme may increasingly attract the big data knowledge providers in this hyper-competitive market. Also, little research has… More >

  • Open Access

    ARTICLE

    Green Energy Development System under the Background of Environmental Sustainability

    Qin Liu*, Ruliang Zhang

    Energy Engineering, Vol.118, No.1, pp. 173-187, 2021, DOI:10.32604/EE.2020.012788

    Abstract With the continuous advancement of economic globalization, energy demand is expanding and energy consumption is excessive, which leads to energy shortage. Unreasonable energy use also brings great challenges to the environment and affects the balance of the ecosystem seriously. The rise of the third industrial revolution has injected new vitality into energy system. The construction of energy Internet system, which integrates Internet technology and energy technology, has become a new energy system of sustainable development. It has put forward the reform scheme for the mismatch of energy demand points and environmental pollution. The deepening of sustainable development strategy accelerates the… More >

  • Open Access

    ARTICLE

    Research on Intelligent Mobile Commerce Transaction Security Mechanisms Based on Mobile Agent

    Weijin Jiang1, 2, 3, Wei Liu2, *, Haolong Xia1, Yuhui Xu2, Dongbo Cao1, Guo Liang4

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2543-2555, 2020, DOI:10.32604/cmc.2020.011454

    Abstract In networked mobile commerce network transactions, trust is the prerequisite and key to a smooth transaction. The measurement of trust between entities involves factors such as transaction amount, transaction time, personal income of consumer entities and their risk attitude towards trust, etc., so it is difficult to accurately calculate quantitatively. In order to find out the essential characteristics of this trust relationship, based on the research background of mobile commerce in the mobile network environment, a dynamic trust mechanism is proposed through the research of trust in the mobile network environment, trust influencing factors and trust mechanism. The calculation model… More >

  • Open Access

    ARTICLE

    Heuristic and Bent Key Exchange Secured Energy Efficient Data Transaction for Traffic Offloading in Mobile Cloud

    Nithya Rekha Sivakumar1, *, Sara Ghorashi1, Mona Jamjoom1, Mai Alduailij1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1925-1943, 2020, DOI:10.32604/cmc.2020.011505

    Abstract In today’s world, smart phones offer various applications namely face detection, augmented-reality, image and video processing, video gaming and speech recognition. With the increasing demand for computing resources, these applications become more complicated. Cloud Computing (CC) environment provides access to unlimited resource pool with several features, including on demand self-service, elasticity, wide network access, resource pooling, low cost, and ease of use. Mobile Cloud Computing (MCC) aimed at overcoming drawbacks of smart phone devices. The task remains in combining CC technology to the mobile devices with improved battery life and therefore resulting in significant performance. For remote execution, recent studies… More >

  • Open Access

    ARTICLE

    The Impact of Privacy Seal on Users’ Perception in Network Transactions

    Jing Chen,Yuchen Luo2,†, Ruiqi Du3,‡

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 199-206, 2020, DOI:10.32604/csse.2020.35.199

    Abstract In the age of big data, the issue of online privacy has attracted much attention from all sectors. The introduction and establishment of an evaluation system for the privacy agreement based on a third party, together with the establishment of a safer internet transaction environment, can help to establish mutual trust between users and the platform. With the research background links to the online trading platform, this article investigates how the privacy seal which is provided by the third-party evaluation organization influences and addresses trust-awareness and privacy concerns of users, as well as exposing information and purchasing data. According to… More >

Displaying 21-30 on page 3 of 36. Per Page