1,673 resources related to Credit cards
- Topics related to Credit cards
- IEEE Organizations related to Credit cards
- Conferences related to Credit cards
- Periodicals related to Credit cards
- Most published Xplore authors for Credit cards
ICSE is the premier forum for researchers to present and discuss the most recent innovations,trends, outcomes, experiences, and challenges in the field of software engineering. The scopeis broad and includes all original and unpublished results of empirical, conceptual, experimental,and theoretical software engineering research.
The International Conference on Consumer Electronics (ICCE) is soliciting technical papersfor oral and poster presentation at ICCE 2018. ICCE has a strong conference history coupledwith a tradition of attracting leading authors and delegates from around the world.Papers reporting new developments in all areas of consumer electronics are invited. Topics around the major theme will be the content ofspecial sessions and tutorials.
All fields of satellite, airborne and ground remote sensing.
The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.
The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.
Experimental and theoretical advances in antennas including design and development, and in the propagation of electromagnetic waves including scattering, diffraction and interaction with continuous media; and applications pertinent to antennas and propagation, such as remote sensing, applied optics, and millimeter and submillimeter wave techniques.
The Transactions on Biomedical Circuits and Systems addresses areas at the crossroads of Circuits and Systems and Life Sciences. The main emphasis is on microelectronic issues in a wide range of applications found in life sciences, physical sciences and engineering. The primary goal of the journal is to bridge the unique scientific and technical activities of the Circuits and Systems ...
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
IPv6 Deployment and Management, None
The Internet has experienced tremendous success since its initial widespread commercial adoption in the 1990s. Such Internet success has ultimately led to the exhaustion of available IP addresses for Internet communications. The only solution to support continued Internet growth is IPv6. This chapter presents the set of sample applications that is merely scratching the surface in terms of applications and ...
IEEE Spectrum, 1988
Credit cards with computer chips in them, which allow users to give merchants detailed financial information without contacting central banks, are described. The SuperSmart Card is a powerful credit-card-sized computer that fits into a wallet and promises to take over many of the jobs of transaction- support systems, redistributing vast amounts of data-processing work. The card's electronics, user-friendly features, and ...
Internet of Things and Data Analytics Handbook, None
Risk predictive modeling is an important and growing branch of applied data science. This chapter focuses on data and modeling that was both on the marketing/targeting side of the business and in the risk side. It also focuses on building a modeling system that stresses diversity and flexibility with a 'modeling ecosystem' approach. In the 1990s the credit card industry ...
IEEE Transactions on Engineering Management, 1977
Proceedings. 2005 IEEE International Geoscience and Remote Sensing Symposium, 2005. IGARSS '05., 2005
The major reason that spatial data warehousing has attracted a great deal of attention in business GIS in recent years is due to the wide availability of huge amount of spatial data and the imminent need for turning such data into useful geographic information. Therefore, this study focuses on designing and implementing the pilot system for spatial decision making. It ...
Carl Selinger: Stuff you Don't Learn in Engineering School
IROS TV 2019- Your Highlights
IROS TV 2019- Macau-Bringing Robotics to Macau with Prof. Dong Sun
IROS TV 2019- Welcome to IROS 2019- Welcome Reception
IROS TV 2019- Macau- Episode 1- Robots Connecting People
IROS TV 2019- How to Build a Robot: Marine Bio-inspired Soft Robotics
IROS TV 2019- How to Build a Robot: Vision Based Estimation of Driving Energy for Planetary Rovers
IROS TV 2019- Robot vs. Robot- Humanoid Challenge: Robot Magic and Music
IROS TV 2019- How to Build a Robot: The Quest for Human Level AI in Robotics
IROS TV 2019- Robot vs. Robot- Autonomous Drone Racing
IROS TV 2019 Haptic Intelligence with Dr. Katherine J Kuchenbecker
IROS TV 2019- The Big Picture with IEEE - Prof. Toshio Fukuda
IROS TV 2019- Maryland Robotics Center, Institute for Systems Research, University of Maryland
IROS TV 2019- Living with Robots- Prof. Gentiane Venture
IROS TV 2019- Industry 4.0: The Business of Robotics- Industrial CEO Summit Forum
IROS TV 2019- Istituto Italiano di Tecnologia (IIT)- Human Centered Science and Technologies
IEEE Risk Management and Professional Liability Program
IROS TV 2019- Macau- Episode 2- Robots Connecting People
IROS TV 2019- Welcome to IROS 2019- Opening Ceremony
The Internet has experienced tremendous success since its initial widespread commercial adoption in the 1990s. Such Internet success has ultimately led to the exhaustion of available IP addresses for Internet communications. The only solution to support continued Internet growth is IPv6. This chapter presents the set of sample applications that is merely scratching the surface in terms of applications and opportunities for better living in an increasingly networked world. As with every benefit, there are caveats, but as technology continues to press on with smaller, cheaper, more-integrated, and most of all, IPv6-networked, devices, access to information will rise to unprecedented levels and effective management application software will be needed for analysis, reporting, and alerting as needed.
Credit cards with computer chips in them, which allow users to give merchants detailed financial information without contacting central banks, are described. The SuperSmart Card is a powerful credit-card-sized computer that fits into a wallet and promises to take over many of the jobs of transaction- support systems, redistributing vast amounts of data-processing work. The card's electronics, user-friendly features, and security features are examined. Field-testing in Japan, which began in Dec.1986, is discussed.<<ETX>>
Risk predictive modeling is an important and growing branch of applied data science. This chapter focuses on data and modeling that was both on the marketing/targeting side of the business and in the risk side. It also focuses on building a modeling system that stresses diversity and flexibility with a 'modeling ecosystem' approach. In the 1990s the credit card industry was further revolutionized by the growth to prominence of nontraditional financial organization that specialized in credit card issuance rather than being diversified across all areas of banking. Time once again becomes important for feature engineering. If risk is being modeled in a dynamic environment, time will become a necessary element in the definition of some features. Diversity can be interpreted as applying at many different levels. The difference between the ecosystem approach and a typical model ensemble is that the ecosystem approach stresses diversity in methodology.
The major reason that spatial data warehousing has attracted a great deal of attention in business GIS in recent years is due to the wide availability of huge amount of spatial data and the imminent need for turning such data into useful geographic information. Therefore, this study focuses on designing and implementing the pilot system for spatial decision making. It designed a system that estimates the targeted marketing area by evaluating the purchasing power of customers spatially. We used both the quantity of credit card transactions and the number of customers using credit card in a department store in Seoul. The spatial distribution or pattern was analyzed and the spatial clusters were developed in order to seek for spatial meaning within the data acquired. The system provides OLAP tools for the interactive analysis of multidimensional data with geographically various granularities, which helps to facilitate effective spatial data mining. We adopted the snowflake schema model capabilities into the system.
We consider the problem of broadcasting sensitive information to many low cost receivers when the authenticity and integrity of the received messages are the determining factors but secrecy is not important. Although several methods exist to authentify information, as a rule, they lack the asymmetry the transmission system itself exhibits. Therefore, we propose a highly non- symmetric algorithm to generate and verify digital signatures. The algorithm is based on the computation of square roots. Since valid messages have a definite structure, we address the question of choosing the factors to get around the difficulty caused by the quadratic nonresidues.<<ETX>>
In this paper, a new technology is proposed to solve anomaly detection problems of the high false positive rate or hard to build the model of normal behavior, etc. What our technology based on is the similarity between outliers and intrusions. So we proposed a new outlier mining algorithm based on index tree to detect intrusions. The algorithm improves on the HilOut algorithm to avoid the complex generation of Hilbert value. It calculates the upper and lower bound of the weight of each record with r-region and index tree to avoid unnecessary distance calculation. The algorithm is easy to implement, and more suitable to detect intrusions in the audit data. We have performed many experiments on the KDDCup99 dataset to validate the effect of TreeOut and obtain good results.
With the growth and widespread of the internet the credit card payment industry has expanded rapidly during the course of time. Most of the companies and industries have transformed their business into online services to provide e-commerce, easy access and communication allowing their customers better efficiency and accessibility. This evolution is of great importance since it has credited towards increased efficiency, and profitability but it also has its own shortcomings. Along with this evolution comes a greater possibility of threats. One of the most crucial challenges in making business on the internet is that neither the card nor the cardholder needs to be present when the purchase is being made. This makes it impossible for the merchant to verify whether the customer making a purchase is the authentic cardholder or not. This makes it easy for a fraudster to carry out a fraudulent transaction anonymously.
Financial fraud detection is an important problem with a number of design aspects to consider. Issues such as algorithm selection and performance analysis will affect the perceived ability of proposed solutions, so for auditors and researchers to be able to sufficiently detect financial fraud it is necessary that these issues be thoroughly explored. In this paper we will revisit the key performance metrics used for financial fraud detection with a focus on credit card fraud, critiquing the prevailing ideas and offering our own understandings. There are many different performance metrics that have been employed in prior financial fraud detection research. We will analyse several of the popular metrics and compare their effectiveness at measuring the ability of detection mechanisms. We further investigated the performance of a range of computational intelligence techniques when applied to this problem domain, and explored the efficacy of several binary classification methods.
Advancements in the wireless technology have given rise to various payment methods and protocols. The recent, and probably latest KSL (S. Kungpisdan et al., 2003) protocol has been implemented for mobile credit card payments. This paper proposes a smart card based wireless Internet payment system which is derived from KSL (S. Kungpisdan et al., 2003) protocol. A client using a wireless smart card can perform transactions over a wireless LAN which is connected to the Internet via a wired network.
No standards are currently tagged "Credit cards"