Search
Search Results
-
Distributed Transactions
As software systems move from monolithic applications to microservices and cloud-native services, and with the trend of decentralized and... -
Transactions
Ethereum is both a platform and a protocol: it is a place where something (accounts, code, state) is hosted and a set of rules for communicating... -
PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval
The advent of blockchain technology has revolutionized Internet-of-Thing (IoT) systems offering immutable and transparent ledger mechanisms. However,...
-
Efficient loss updated XGBoost with deep emended genetic algorithm for detecting online fraudulent transactions
In the fast-paced technological era, online financial transactions have gained widespread use as it offers significant merits to customers for easy...
-
A Comprehensive Fraud Detection for Credit Card Transactions in Federated Averaging
Credit card fraud costs card issuers billions of dollars each year. Therefore, an effective Fraud Detection System (FDS) is crucial to minimize...
-
Special GL Transactions
In this chapter, we look at Special GL Transactions and how to disclose Special GL transactions in SAP R/3 using alternative reconciliation accounts. -
Is Bitcoin gathering dust? An analysis of low-amount Bitcoin transactions
In the Bitcoin protocol, dust refers to small amounts of currency that are lower than the fee required to spend them in a transaction. Although...
-
Robust copyright tracing and trusted transactions using zero-watermarking and blockchain
Zero-watermarking technology is an effective method to protect image copyright, but it relies on trusted third party to store and manage the...
-
Robust recurrent graph convolutional network approach based sequential prediction of illicit transactions in cryptocurrencies
Money laundering has urged the need for machine learning algorithms for combating illicit services in the blockchain of cryptocurrencies due to its...
-
Towards intelligent database systems using clusters of SQL transactions
Transactions are the bread-and-butter of database management system (DBMS) industry. When you check your bank balance, pay bill, or move money from...
-
Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS)
Blockchain-based decentralized infrastructure is intended to achieve peer-to-peer transactions without relying on centralized/trusted third parties....
-
Transactions
Transactions are a fundamental feature of all databases—they are part of what distinguishes a database from a file system. And yet, they are often... -
What makes Ethereum blockchain transactions be processed fast or slow? An empirical study
The Ethereum platform allows developers to implement and deploy applications called ÐApps onto the blockchain for public use through the use of smart...
-
Transactions
In this chapter, we will learn how Orleans supports transactions across grains. This allows us to update the state of multiple grains in one atomic... -
Innovative and secure decentralized approach to process real estate transactions by utilizing private blockchain
PurposeThis research introduces a decentralized method for handling real estate transactions through the utilization of private blockchain...
-
R-GCN: a residual-gated recurrent unit convolution network model for anomaly detection in blockchain transactions
The domain of deep learning has provided an exemplary paradigm for how Artificial Intelligence (AI) can be a disruptive technological paragon through...
-
Exploring the trust mechanism of digital intellectual property transactions based on smart contracts
Intellectual Property (IP) digital transaction is an IP financing activity that digitizes traditional IP goods or related services and then delivers...
-
Anti-money Laundering Analytics on the Bitcoin Transactions
Bitcoin is a popular cryptocurrency widely used for cross-border transactions. Anonymity, immutability, and decentralization are the major features... -
Transactions Overview
Create the final part of our application dashboard—the transactions overview. Once the trasactions have been saved in the previous step, we can come... -
Trust factor-based analysis of user behavior using sequential pattern mining for detecting intrusive transactions in databases
Organizations today are employing databases on a large scale to store data essential for their functioning. Malicious access and modifications of the...