CINXE.COM
Search results for: related-party transactions
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: related-party transactions</title> <meta name="description" content="Search results for: related-party transactions"> <meta name="keywords" content="related-party transactions"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="related-party transactions" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="related-party transactions"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 280</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: related-party transactions</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">280</span> A Study on Relationships between Authenticity of Transactions, Quality of Relationships, and Transaction Performances</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chan%20Kwon%20Park">Chan Kwon Park</a>, <a href="https://publications.waset.org/abstracts/search?q=Chae-Bogk%20Kim"> Chae-Bogk Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Sung-Min%20Park"> Sung-Min Park</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study is a research on the authenticity of transactions between corporations and quality of their relationships and transaction performances. As the factors of authenticity of transactions, honesty, transparency, customer orientation and consistency were selected; as the factors of quality of relationships, trust and commitment were selected, and as the factors of transactions performances, intention of repeat transactions and switching intention were selected, and on these relationships a hypothesis was established, and verification was conducted. First, the factors of the authenticity of transactions positively influenced the factors of quality of relationships. Thus, a higher level of authenticity of transactions can lead to higher level of trust and commitment. Second, the factors of quality of relationships made a positive influence on the intention of repeat transactions, while a negative influence in the switching intention. Third, it showed that trust and commitment as the factors of quality of relationships functioned partly as the parameter between the authenticity of transactions and transaction performances. Finally, it proved that the factors of the authenticity of transactions improved trust and commitment in transactions between corporations and further improved the intention of repeat transactions while they decreased the switching intention. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authenticity%20of%20transactions" title="authenticity of transactions">authenticity of transactions</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a>, <a href="https://publications.waset.org/abstracts/search?q=commitment" title=" commitment"> commitment</a>, <a href="https://publications.waset.org/abstracts/search?q=intention%20of%20repeat%20transactions" title=" intention of repeat transactions"> intention of repeat transactions</a>, <a href="https://publications.waset.org/abstracts/search?q=switching%20intention" title=" switching intention"> switching intention</a> </p> <a href="https://publications.waset.org/abstracts/54024/a-study-on-relationships-between-authenticity-of-transactions-quality-of-relationships-and-transaction-performances" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54024.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">373</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">279</span> Banking Innovation and Customers' Satisfaction in Nigeria: A Case Study of Some Selected Banks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jameelah%20O.%20Yaqub">Jameelah O. Yaqub</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The financial industry all over the world has undergone and still undergoing great transformation especially with the introduction of e-products which involves the use of computers and telecommunications to enable banking transactions to be done by telephone or computer rather than by humans. The adoption of e-banking in Nigeria is becoming more popular with customers now being able to use the ATM cards for different transactions. The internet banking, POS machines, telephone banking as well as mobile banking are some other e-products being used in Nigeria. This study examines how satisfied bank customers are with the e-products. The study found that the ATM is the most popular e-products among bank customers in Nigeria; followed by the POS. The least use of the e-products is telephone banking. The study also found that visits to banks for transactions declined with the use of e-products. The chi-square analysis shows that there is significant relationship between the use of banks’ e-products and customers’ satisfaction. One of the major reason adduced by respondents for low usage of e-products is insecurity or fear of cyber fraud, it is therefore recommended that banks should provide adequate. Security for transactions and ensure the proper backing up of critical data files. In addition, government should ensure stable electricity supply to reduce banks’ running costs and consequently, customers’ cost of transactions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=banks" title="banks">banks</a>, <a href="https://publications.waset.org/abstracts/search?q=e-products" title=" e-products"> e-products</a>, <a href="https://publications.waset.org/abstracts/search?q=innovation" title=" innovation"> innovation</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a> </p> <a href="https://publications.waset.org/abstracts/46119/banking-innovation-and-customers-satisfaction-in-nigeria-a-case-study-of-some-selected-banks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46119.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">337</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">278</span> Scalable Blockchain Solutions for NGOs: Enhancing Financial Transactions and Accountability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aarnav%20Singh">Aarnav Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Jayesh%20Ghatate"> Jayesh Ghatate</a>, <a href="https://publications.waset.org/abstracts/search?q=Tarush%20Pandey"> Tarush Pandey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Non-Governmental Organizations (NGOs) play a crucial role in addressing societal challenges, relying heavily on financial transactions to fund their impactful initiatives. However, traditional financial systems can be cumbersome and lack transparency, hindering the efficiency and trustworthiness of NGO operations. The Ethereum main-net, while pioneering the decentralized finance landscape, grapples with inherent scalability challenges, restricting its transaction throughput to a range of 15-45 transactions per second (TPS). This limitation poses substantial obstacles for NGOs engaging in swift and dynamic financial transactions critical to their operational efficiency. This research is a comprehensive exploration of the intricacies of these scalability challenges and delves into the design and implementation of a purpose-built blockchain system explicitly crafted to surmount these constraints. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=non-governmental%20organizations" title="non-governmental organizations">non-governmental organizations</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralized%20system" title=" decentralized system"> decentralized system</a>, <a href="https://publications.waset.org/abstracts/search?q=zero%20knowledge%20Ethereum%20virtual%20machine" title=" zero knowledge Ethereum virtual machine"> zero knowledge Ethereum virtual machine</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralized%20application" title=" decentralized application"> decentralized application</a> </p> <a href="https://publications.waset.org/abstracts/179647/scalable-blockchain-solutions-for-ngos-enhancing-financial-transactions-and-accountability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179647.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">59</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">277</span> Smart Card Technology Adaption in a Hospital Setting</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20K.%20V.%20Narayan">H. K. V. Narayan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study was conducted at Tata Memorial Hospital (TMH), Mumbai, India. The study was to evaluate the impact of adapting Smart Card (SC) for clinical and business transactions in order to reduce Lead times and to enforce business rules of the hospital. The objective for implementing the Smart Card was to improve the patient perception of quality in terms of structures process and outcomes and also to improve the productivity of the Institution. The Smart Card was implemented in phases from 2011 and integrated with the Hospital Information System (HIS/EMR). The implementation was a learning curve for all the stake holders as software obviated the need to use hardcopies of transactions. The acceptability to the stake holders was challenge in change management. The study assessed the impact 3 years into the implementation and the observed trends have suggested that it has decreased the lead times for services and increased the no of transactions and thereby the productivity. Patients who used to complain of multiple queues and cumbersome transactions now compliment the administration for effective use of Information and Communication Technology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20card" title="smart card">smart card</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20availability%20of%20health%20care%20information" title=" high availability of health care information"> high availability of health care information</a>, <a href="https://publications.waset.org/abstracts/search?q=reduction%20in%20potential%20medical%20errors%20due%20to%20elimination%20of%20transcription%20errors" title=" reduction in potential medical errors due to elimination of transcription errors"> reduction in potential medical errors due to elimination of transcription errors</a>, <a href="https://publications.waset.org/abstracts/search?q=reduction%20in%20no%20of%20queues" title=" reduction in no of queues"> reduction in no of queues</a>, <a href="https://publications.waset.org/abstracts/search?q=increased%20transactions" title=" increased transactions"> increased transactions</a>, <a href="https://publications.waset.org/abstracts/search?q=augmentation%20of%20revenue" title=" augmentation of revenue "> augmentation of revenue </a> </p> <a href="https://publications.waset.org/abstracts/39224/smart-card-technology-adaption-in-a-hospital-setting" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39224.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">285</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">276</span> Assessment of ATC with Shunt FACTS Devices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ashwani%20Kumar">Ashwani Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Jitender%20Kumar"> Jitender Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, an optimal power flow based approach has been applied for multi-transactions deregulated environment for ATC determination with SVC and STATCOM. The main contribution of the paper is (i) OPF based approach for evaluation of ATC with multi-transactions, (ii) ATC enhancement with FACTS devices viz. SVC and STATCOM for intact and line contingency cases, (iii) impact of ZIP load on ATC determination and comparison of ATC obtained with SVC and STATCOM. The results have been determined for intact and line contingency cases taking simultaneous as well as single transaction cases for IEEE 24 bus RTS. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=available%20transfer%20capability" title="available transfer capability">available transfer capability</a>, <a href="https://publications.waset.org/abstracts/search?q=FACTS%20devices" title=" FACTS devices"> FACTS devices</a>, <a href="https://publications.waset.org/abstracts/search?q=line%20contingency" title=" line contingency"> line contingency</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-transactions" title=" multi-transactions"> multi-transactions</a>, <a href="https://publications.waset.org/abstracts/search?q=ZIP%20load%20model" title=" ZIP load model"> ZIP load model</a> </p> <a href="https://publications.waset.org/abstracts/1583/assessment-of-atc-with-shunt-facts-devices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1583.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">600</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">275</span> Marketing Mixed Factors Affecting on Commercial Transactions Expectations through Social Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ladaporn%20Pithuk">Ladaporn Pithuk</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aims to investigate the marketing mixed factors that affecting on expectations about commercial transactions through social networks. The research method will using quantitative research, data was collected by questionnaires to person have experience access to trading over the internet for 400 sample by purposive sampling method. Data was analyzed by descriptive statistic including percentage, mean, standard deviation and using quality function deployment for hypothesis testing. Finding the most significant interrelationship between marketing mixed factors and commercial transactions expectations through social networks are product and place the relationship of five ties product and place (location) is involved in almost all will make the site a model that meets the needs of the user visit. In terms of price, the promotion, privacy, personalization and providing a process technical. This will make operations more efficient, reduce confusion, duplication, delays in data transmission, including the creation of different elements in products and services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=commercial%20transactions%20expectations" title="commercial transactions expectations">commercial transactions expectations</a>, <a href="https://publications.waset.org/abstracts/search?q=marketing%20mixed%20factors" title=" marketing mixed factors"> marketing mixed factors</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks" title=" social networks"> social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20behavior" title=" consumer behavior"> consumer behavior</a> </p> <a href="https://publications.waset.org/abstracts/39939/marketing-mixed-factors-affecting-on-commercial-transactions-expectations-through-social-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39939.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">237</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">274</span> Enhancement of Transaction's Authentication for the Europay, MasterCard, and Visa Contactless Card Payments</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ossama%20Al-Maliki">Ossama Al-Maliki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NFC" title="NFC">NFC</a>, <a href="https://publications.waset.org/abstracts/search?q=RFID" title=" RFID"> RFID</a>, <a href="https://publications.waset.org/abstracts/search?q=contactless%20card" title=" contactless card"> contactless card</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=location" title=" location"> location</a>, <a href="https://publications.waset.org/abstracts/search?q=EMV" title=" EMV"> EMV</a> </p> <a href="https://publications.waset.org/abstracts/89591/enhancement-of-transactions-authentication-for-the-europay-mastercard-and-visa-contactless-card-payments" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">242</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">273</span> Towards the Development of Islamic Accounting Standards for Baitulmal, Waqaf, and Zakat Transactions: Addressing Gaps for Enhanced Accountability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20Farahin%20Ali">N. Farahin Ali</a>, <a href="https://publications.waset.org/abstracts/search?q=Naharriah%20Mohamed"> Naharriah Mohamed</a>, <a href="https://publications.waset.org/abstracts/search?q=Hafiz%20Majdi"> Hafiz Majdi</a>, <a href="https://publications.waset.org/abstracts/search?q=Fathiyyah"> Fathiyyah</a>, <a href="https://publications.waset.org/abstracts/search?q=Fadliana%20Saman"> Fadliana Saman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper investigates the imperative for developing Islamic accounting standards tailored to Baitulmal, waqaf, and zakat transactions, with the goal of strengthening accountability and transparency in financial reporting. Current financial reporting frameworks in Malaysia—namely, the Malaysian Financial Reporting Standards (MFRS) and Malaysian Private Entities Reporting Standards (MPERS)—are designed predominantly for conventional financial transactions and fail to fully capture the Shariah-specific nature of these religious funds. The objective of this study is to critically examine the discrepancies between these conventional reporting standards and the requirements of Shariah-compliant financial transactions, specifically for Baitulmal, waqaf, and zakat. This research adopts a qualitative methodology, utilizing case studies from four different State Islamic Religious Councils to explore the current reporting practices. The findings reveal significant gaps between the conventional frameworks and the specific needs of Shariah-compliant accounting, leading to off-balance-sheet reporting of certain transactions and inconsistencies in financial disclosures across different states. These disparities undermine both the comparability and integrity of the financial reports, raising critical concerns regarding transparency and governance. The broader implications of this study underscore the necessity for a unified Islamic accounting standard that would align more closely with Shariah principles. Such a standard would not only enhance the disclosure and presentation of baitulmal, waqaf, and zakat transactions, but also improve decision-making processes, thereby fostering greater accountability and trust in the management of these Islamic funds. This paper advocates for a concerted effort to bridge the existing gap, ensuring that the distinctive characteristics of Islamic charitable funds are appropriately reflected in the financial reporting process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=islamic%20accounting" title="islamic accounting">islamic accounting</a>, <a href="https://publications.waset.org/abstracts/search?q=waqf" title=" waqf"> waqf</a>, <a href="https://publications.waset.org/abstracts/search?q=zakat" title=" zakat"> zakat</a>, <a href="https://publications.waset.org/abstracts/search?q=islamic%20finance" title=" islamic finance"> islamic finance</a> </p> <a href="https://publications.waset.org/abstracts/193599/towards-the-development-of-islamic-accounting-standards-for-baitulmal-waqaf-and-zakat-transactions-addressing-gaps-for-enhanced-accountability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/193599.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">13</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">272</span> A Method for Identifying Unusual Transactions in E-commerce Through Extended Data Flow Conformance Checking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Handie%20Pramana%20Putra">Handie Pramana Putra</a>, <a href="https://publications.waset.org/abstracts/search?q=Ani%20Dijah%20Rahajoe"> Ani Dijah Rahajoe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The proliferation of smart devices and advancements in mobile communication technologies have permeated various facets of life with the widespread influence of e-commerce. Detecting abnormal transactions holds paramount significance in this realm due to the potential for substantial financial losses. Moreover, the fusion of data flow and control flow assumes a critical role in the exploration of process modeling and data analysis, contributing significantly to the accuracy and security of business processes. This paper introduces an alternative approach to identify abnormal transactions through a model that integrates both data and control flows. Referred to as the Extended Data Petri net (DPNE), our model encapsulates the entire process, encompassing user login to the e-commerce platform and concluding with the payment stage, including the mobile transaction process. We scrutinize the model's structure, formulate an algorithm for detecting anomalies in pertinent data, and elucidate the rationale and efficacy of the comprehensive system model. A case study validates the responsive performance of each system component, demonstrating the system's adeptness in evaluating every activity within mobile transactions. Ultimately, the results of anomaly detection are derived through a thorough and comprehensive analysis. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=database" title="database">database</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20analysis" title=" data analysis"> data analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=DPNE" title=" DPNE"> DPNE</a>, <a href="https://publications.waset.org/abstracts/search?q=extended%20data%20flow" title=" extended data flow"> extended data flow</a>, <a href="https://publications.waset.org/abstracts/search?q=e-commerce" title=" e-commerce"> e-commerce</a> </p> <a href="https://publications.waset.org/abstracts/180125/a-method-for-identifying-unusual-transactions-in-e-commerce-through-extended-data-flow-conformance-checking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/180125.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">56</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">271</span> Solving the Quadratic Programming Problem Using a Recurrent Neural Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20A.%20Behroozpoor">A. A. Behroozpoor</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20M.%20Mazarei"> M. M. Mazarei </a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, a fuzzy recurrent neural network is proposed for solving the classical quadratic control problem subject to linear equality and bound constraints. The convergence of the state variables of the proposed neural network to achieve solution optimality is guaranteed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=REFERENCES%20%20%0D%0A%5B1%5D%09Xia" title="REFERENCES [1] Xia">REFERENCES [1] Xia</a>, <a href="https://publications.waset.org/abstracts/search?q=Y" title=" Y"> Y</a>, <a href="https://publications.waset.org/abstracts/search?q=A%20new%20neural%20network%20for%20solving%20linear%20and%20quadratic%20programming%20problems.%20IEEE%20Transactions%20on%20Neural%20Networks" title=" A new neural network for solving linear and quadratic programming problems. IEEE Transactions on Neural Networks"> A new neural network for solving linear and quadratic programming problems. IEEE Transactions on Neural Networks</a>, <a href="https://publications.waset.org/abstracts/search?q=7%286%29" title=" 7(6)"> 7(6)</a>, <a href="https://publications.waset.org/abstracts/search?q=1996" title=" 1996"> 1996</a>, <a href="https://publications.waset.org/abstracts/search?q=pp.1544%E2%80%931548.%0D%0A%5B2%5D%09Xia" title=" pp.1544–1548. [2] Xia"> pp.1544–1548. [2] Xia</a>, <a href="https://publications.waset.org/abstracts/search?q=Y." title=" Y."> Y.</a>, <a href="https://publications.waset.org/abstracts/search?q=%26%20Wang" title=" & Wang"> & Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=J" title=" J"> J</a>, <a href="https://publications.waset.org/abstracts/search?q=A%20recurrent%20neural%20network%20for%20solving%20nonlinear%20convex%20programs%20subject%20to%20linear%20constraints.%20IEEE%20Transactions%20on%20Neural%20Networks" title=" A recurrent neural network for solving nonlinear convex programs subject to linear constraints. IEEE Transactions on Neural Networks"> A recurrent neural network for solving nonlinear convex programs subject to linear constraints. IEEE Transactions on Neural Networks</a>, <a href="https://publications.waset.org/abstracts/search?q=16%282%29" title="16(2)">16(2)</a>, <a href="https://publications.waset.org/abstracts/search?q=2005" title=" 2005"> 2005</a>, <a href="https://publications.waset.org/abstracts/search?q=pp.%20379%E2%80%93386.%0D%0A%5B3%5D%09Xia" title=" pp. 379–386. [3] Xia"> pp. 379–386. [3] Xia</a>, <a href="https://publications.waset.org/abstracts/search?q=Y." title=" Y."> Y.</a>, <a href="https://publications.waset.org/abstracts/search?q=H" title=" H"> H</a>, <a href="https://publications.waset.org/abstracts/search?q=Leung" title=" Leung"> Leung</a>, <a href="https://publications.waset.org/abstracts/search?q=%26%20J" title=" & J"> & J</a>, <a href="https://publications.waset.org/abstracts/search?q=Wang" title=" Wang"> Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=A%20projection%20neural%20network%20and%20its%20application%20to%20constrained%20optimization%20problems.%20IEEE%20Transactions%20Circuits%20and%20Systems-I" title=" A projection neural network and its application to constrained optimization problems. IEEE Transactions Circuits and Systems-I"> A projection neural network and its application to constrained optimization problems. IEEE Transactions Circuits and Systems-I</a>, <a href="https://publications.waset.org/abstracts/search?q=49%284%29" title=" 49(4)"> 49(4)</a>, <a href="https://publications.waset.org/abstracts/search?q=2002" title=" 2002"> 2002</a>, <a href="https://publications.waset.org/abstracts/search?q=pp.447%E2%80%93458.B.%20%0D%0A%5B4%5D%09Q.%20Liu" title=" pp.447–458.B. [4] Q. Liu"> pp.447–458.B. [4] Q. Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Z.%20Guo" title=" Z. Guo"> Z. Guo</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Wang" title=" J. Wang"> J. Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=A%20one-layer%20recurrent%20neural%20network%20for%20constrained%20seudoconvex%20optimization%20and%20its%20application%20for%20dynamic%20portfolio%20optimization.%20Neural%20Networks" title=" A one-layer recurrent neural network for constrained seudoconvex optimization and its application for dynamic portfolio optimization. Neural Networks"> A one-layer recurrent neural network for constrained seudoconvex optimization and its application for dynamic portfolio optimization. Neural Networks</a>, <a href="https://publications.waset.org/abstracts/search?q=26" title=" 26"> 26</a>, <a href="https://publications.waset.org/abstracts/search?q=2012" title=" 2012"> 2012</a>, <a href="https://publications.waset.org/abstracts/search?q=pp.%2099-109." title=" pp. 99-109. "> pp. 99-109. </a> </p> <a href="https://publications.waset.org/abstracts/19435/solving-the-quadratic-programming-problem-using-a-recurrent-neural-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19435.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">644</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">270</span> Fraud Detection in Credit Cards with Machine Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anjali%20Chouksey">Anjali Chouksey</a>, <a href="https://publications.waset.org/abstracts/search?q=Riya%20Nimje"> Riya Nimje</a>, <a href="https://publications.waset.org/abstracts/search?q=Jahanvi%20Saraf"> Jahanvi Saraf</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Online transactions have increased dramatically in this new ‘social-distancing’ era. With online transactions, Fraud in online payments has also increased significantly. Frauds are a significant problem in various industries like insurance companies, baking, etc. These frauds include leaking sensitive information related to the credit card, which can be easily misused. Due to the government also pushing online transactions, E-commerce is on a boom. But due to increasing frauds in online payments, these E-commerce industries are suffering a great loss of trust from their customers. These companies are finding credit card fraud to be a big problem. People have started using online payment options and thus are becoming easy targets of credit card fraud. In this research paper, we will be discussing machine learning algorithms. We have used a decision tree, XGBOOST, k-nearest neighbour, logistic-regression, random forest, and SVM on a dataset in which there are transactions done online mode using credit cards. We will test all these algorithms for detecting fraud cases using the confusion matrix, F1 score, and calculating the accuracy score for each model to identify which algorithm can be used in detecting frauds. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title="machine learning">machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20detection" title=" fraud detection"> fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20tree" title=" decision tree"> decision tree</a>, <a href="https://publications.waset.org/abstracts/search?q=k%20nearest%20neighbour" title=" k nearest neighbour"> k nearest neighbour</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20forest" title=" random forest"> random forest</a>, <a href="https://publications.waset.org/abstracts/search?q=XGBOOST" title=" XGBOOST"> XGBOOST</a>, <a href="https://publications.waset.org/abstracts/search?q=logistic%20regression" title=" logistic regression"> logistic regression</a>, <a href="https://publications.waset.org/abstracts/search?q=support%20vector%20machine" title=" support vector machine"> support vector machine</a> </p> <a href="https://publications.waset.org/abstracts/136504/fraud-detection-in-credit-cards-with-machine-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136504.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">269</span> Incorporation of Hibah as a Catalyst for Channelling Profits and Compensations in Islamic Transactions </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ameen%20Alshugaa">Ameen Alshugaa</a>, <a href="https://publications.waset.org/abstracts/search?q=Farrukh%20Habib"> Farrukh Habib</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Shariah (the Islamic law) sanctions a plethora of profit-sharing arrangements for financial transactions. However, when it comes to the practice of Islamic banking, it is felt by the scholars and practitioners that many of these arrangements often fail to compensate different parties of a financial transaction compared to conventional banking, due to the Riba (interest / usury) element. This issue is caused by the parties inability to codify these compensations in any contract so as to avoid Riba. Here, hibah (gift) may be regarded as one of the solutions. In essence, hibah is a unilateral charity contract where a party voluntarily gives away something to another party without any counter value. This paper attempts to analyse theoretical and practical aspects of hibah from the perspective of Islamic law, enunciating its legality and detailing its allowance in Islamic banking. It also discusses several practices evaluating the role of hibah in resolving issues related to Riba. In particular, these practices demonstrate the validity of hibah as a way to distribute revenues and compensate parties in Islamic financial transactions, while achieving competitive advantage over conventional banking, and avoiding the element of Riba. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hibah%20%28gift%29" title="hibah (gift)">hibah (gift)</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20Finance" title=" Islamic Finance"> Islamic Finance</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20Law%20of%20Contract" title=" Islamic Law of Contract"> Islamic Law of Contract</a>, <a href="https://publications.waset.org/abstracts/search?q=profit%20distribution" title=" profit distribution"> profit distribution</a>, <a href="https://publications.waset.org/abstracts/search?q=Shariah" title=" Shariah"> Shariah</a> </p> <a href="https://publications.waset.org/abstracts/50778/incorporation-of-hibah-as-a-catalyst-for-channelling-profits-and-compensations-in-islamic-transactions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50778.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">301</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">268</span> Efficient Fuzzy Classified Cryptographic Model for Intelligent Encryption Technique towards E-Banking XML Transactions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maher%20Aburrous">Maher Aburrous</a>, <a href="https://publications.waset.org/abstracts/search?q=Adel%20Khelifi"> Adel Khelifi</a>, <a href="https://publications.waset.org/abstracts/search?q=Manar%20Abu%20Talib"> Manar Abu Talib</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Transactions performed by financial institutions on daily basis require XML encryption on large scale. Encrypting large volume of message fully will result both performance and resource issues. In this paper a novel approach is presented for securing financial XML transactions using classification data mining (DM) algorithms. Our strategy defines the complete process of classifying XML transactions by using set of classification algorithms, classified XML documents processed at later stage using element-wise encryption. Classification algorithms were used to identify the XML transaction rules and factors in order to classify the message content fetching important elements within. We have implemented four classification algorithms to fetch the importance level value within each XML document. Classified content is processed using element-wise encryption for selected parts with "High", "Medium" or “Low” importance level values. Element-wise encryption is performed using AES symmetric encryption algorithm and proposed modified algorithm for AES to overcome the problem of computational overhead, in which substitute byte, shift row will remain as in the original AES while mix column operation is replaced by 128 permutation operation followed by add round key operation. An implementation has been conducted using data set fetched from e-banking service to present system functionality and efficiency. Results from our implementation showed a clear improvement in processing time encrypting XML documents. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=XML%20transaction" title="XML transaction">XML transaction</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=Advanced%20Encryption%20Standard%20%28AES%29" title=" Advanced Encryption Standard (AES)"> Advanced Encryption Standard (AES)</a>, <a href="https://publications.waset.org/abstracts/search?q=XML%20classification" title=" XML classification"> XML classification</a>, <a href="https://publications.waset.org/abstracts/search?q=e-banking%20security" title=" e-banking security"> e-banking security</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20classification" title=" fuzzy classification"> fuzzy classification</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=intelligent%20encryption" title=" intelligent encryption"> intelligent encryption</a> </p> <a href="https://publications.waset.org/abstracts/16665/efficient-fuzzy-classified-cryptographic-model-for-intelligent-encryption-technique-towards-e-banking-xml-transactions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16665.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">411</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">267</span> Integrating Cost-Benefit Assessment and Contract Design to Support Industrial Symbiosis Deployment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Robin%20Molinier">Robin Molinier</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Industrial symbiosis (I.S) is the realization of Industrial Ecology (I.E) principles in production systems in function. I.S consists in the use of waste materials, fatal energy, recirculated utilities and infrastructure/service sharing as resources for production. Environmental benefits can be achieved from resource conservation but economic profitability is required by the participating actors. I.S indeed involves several actors with their own objectives and resources so that each one must be satisfied by ex-ante arrangements to commit toward I.S execution (investments and transactions). Following the Resource-Based View of transactions we build a modular framework to assess global I.S profitability and to specify each actor’s contributions to costs and benefits in line with their resource endowments and performance requirements formulations. I.S projects specificities implied by the need for customization (asset specificity, non-homogeneity) induce the use of long-term contracts for transactions following Transaction costs economics arguments. Thus we propose first a taxonomy of costs and value drivers for I.S and an assignment to each actor of I.S specific risks that we identified as load profiles mismatch, quality problems and value fluctuations. Then appropriate contractual guidelines (pricing, cost sharing and warranties) that support mutual profitability are derived from the detailed identification of contributions by the cost-benefits model. This analytical framework helps identifying what points to focus on when bargaining over contracting for transactions and investments. Our methodology is applied to I.S archetypes raised from a literature survey on eco-industrial parks initiatives and practitioners interviews. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=contracts" title="contracts">contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=cost-benefit%20analysis" title=" cost-benefit analysis"> cost-benefit analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=industrial%20symbiosis" title=" industrial symbiosis"> industrial symbiosis</a>, <a href="https://publications.waset.org/abstracts/search?q=risks" title=" risks"> risks</a> </p> <a href="https://publications.waset.org/abstracts/78236/integrating-cost-benefit-assessment-and-contract-design-to-support-industrial-symbiosis-deployment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/78236.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">340</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">266</span> Analysis and Suggestion on Patent Protection in Shanghai, China</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuhong%20Niu">Yuhong Niu</a>, <a href="https://publications.waset.org/abstracts/search?q=Na%20Li"> Na Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Chunlin%20Jin"> Chunlin Jin</a>, <a href="https://publications.waset.org/abstracts/search?q=Hansheng%20Ding"> Hansheng Ding</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study reviewed all types of patents applied by Shanghai health system to analyze how patent development in China from the year of 1990 to 2012. The study used quantitative and comparative analysis to investigate the change and trends of patent numbers, patent types, patent claims, forward citations, patent life, patent transactions, etc. Results reflected an obviously increased numbers of invention patents, applications, and authorizations and short-life patents, but the ratio of invention patents represented an up and down change. Forward citations and transactions ratio always kept at a low level. The results meant that the protection of intellectual property in the Shanghai health sector had made great progress and lots of positive changes due to incentive policies by local government. However, the low-quality patents, at the same time, increased rapidly. Thus, in the future, it is suggested that the quality management should be strengthened, and invents should be estimated before patent application. It is also suggested that the incentives for intellectual property should be optimized to promote the comprehensive improvement of patent quantity and quality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=patent%20claims" title="patent claims">patent claims</a>, <a href="https://publications.waset.org/abstracts/search?q=forward%20citations" title=" forward citations"> forward citations</a>, <a href="https://publications.waset.org/abstracts/search?q=patent%20life" title=" patent life"> patent life</a>, <a href="https://publications.waset.org/abstracts/search?q=patent%20transactions%20ratio" title=" patent transactions ratio"> patent transactions ratio</a> </p> <a href="https://publications.waset.org/abstracts/88974/analysis-and-suggestion-on-patent-protection-in-shanghai-china" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88974.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">265</span> Taxation, Evidential and Jurisdictional Issues in Electronic Commercial Transactions in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michael%20Sunday%20Afolayan">Michael Sunday Afolayan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research work examined the challenges bedevilling the development of legal framework for electronic commercial transactions (e-commerce) in Nigeria. Nigeria does not have a clear-cut legislation regulating electronic commerce in its jurisdiction despite the geometrical rate of growth and adoption of this method of trade. It specifically posed a great challenge looking at taxation, evidential and jurisdictional issues in e-commerce in Nigeria. The author in a broader research work which is abridged here, traced the origin and development of e-commerce and the attendant laws applicable in Nigeria, examining their sufficiency or otherwise. In carrying out the research work, doctrinal mode of legal research was adopted, examining both primary and secondary sources of legal research materials within their contextual meanings. It was found that the failure to enact a law which has direct regulatory bearing on e-commerce in Nigeria has led to adoption and application of circumstantial laws, rules and common law principles to tackle the problems arising out of electronic commercial transactions, especially in the areas of taxation, evidential and jurisdictional challenges. It was ultimately suggested that there is urgent need to sign into law, the Electronic Transaction Bill which had already been passed by the National Assembly since 2017. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-commerce" title="e-commerce">e-commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=legislation" title=" legislation"> legislation</a>, <a href="https://publications.waset.org/abstracts/search?q=taxation" title=" taxation"> taxation</a>, <a href="https://publications.waset.org/abstracts/search?q=evidential" title=" evidential"> evidential</a>, <a href="https://publications.waset.org/abstracts/search?q=jurisdiction" title=" jurisdiction"> jurisdiction</a> </p> <a href="https://publications.waset.org/abstracts/142657/taxation-evidential-and-jurisdictional-issues-in-electronic-commercial-transactions-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142657.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">86</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">264</span> The Concept of Accounting in Islamic Transactions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmad%20Abdulkadir%20Ibrahim">Ahmad Abdulkadir Ibrahim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Islamic law of transactions laid down the methods and instruments of accounting and analyzed its basic assumptions in the modern world. There is a need to examine the implications of accounting initiatives in the Muslim world and attempt to outline the important characteristics of Islamic accounting and how Islamic accounting resolves the problem of measuring the cost of Murabaha goods in case of exchange rate variation. The research tends to discuss an analytical approach to the Islamic accounting concept as well as elaborating the jurisprudential matter and practical aspects of accounting in Islamic financial transactions. It also aims to alert the practitioners of accounting in the Islamic world to be aware of the concept of accounting in Islamic jurisprudence and its historical development. The methodology adopted in this research is the qualitative method through the consultation of relevant literature, which focuses on the thematic study of the subject matter. This is followed by an analysis and discussion of the contents of the materials used. It is concluded that Islamic accounting is unique in its norms as it has been characterized by fairness, accuracy in measuring tools, truthfulness, mutual trust, moderation in making a profit, and tolerance. It was also qualified by capacity and flexibility in terms of the tools and terminology used and invented by Islamic jurisprudence in the accounting system, which indicates its validity and consistency anytime and anywhere. An important conclusion of the research also lies in the refutation of the popular idea that an Italian writer known as Luca Pacilio was the first writer who developed the basis of double-entry due to the presented proofs by Muslim scholars of critical accounting developments, which cannot be ignored. It concludes further that Islamic jurisprudence draws the accounting system codified in the foundations of a market that is far from usury, fraud, cheating, and unfair competition in all areas. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=accounting" title="accounting">accounting</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20accounting" title=" Islamic accounting"> Islamic accounting</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20transactions" title=" Islamic transactions"> Islamic transactions</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20jurisprudence" title=" Islamic jurisprudence"> Islamic jurisprudence</a>, <a href="https://publications.waset.org/abstracts/search?q=double%20entry" title=" double entry"> double entry</a>, <a href="https://publications.waset.org/abstracts/search?q=murabaha" title=" murabaha"> murabaha</a>, <a href="https://publications.waset.org/abstracts/search?q=characteristics" title=" characteristics"> characteristics</a> </p> <a href="https://publications.waset.org/abstracts/174861/the-concept-of-accounting-in-islamic-transactions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/174861.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">64</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">263</span> Real Estate Rigidities: The Effect of Cash Transactions and the Impact of Demonetisation on Them</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dishant%20Shahi">Dishant Shahi</a>, <a href="https://publications.waset.org/abstracts/search?q=Aradhya%20Shandilya"> Aradhya Shandilya</a>, <a href="https://publications.waset.org/abstracts/search?q=Nand%20Kumar"> Nand Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We study here the impact of the black component referred to as X component in the text on Real estate transactions. The X component involved not only acts as friction in transaction but also leads to dysfunctionality in the capital market of real estate. The effect of the component is presented by using a model of economy which seeks resemblance with that of India involving property deals. The rigidities which hinder smooth transactions in property or land deals are depicted and their impact on the economy as a whole has been modelled. The effect of subprime crisis (2007) on Indian housing capital market and the role which the X component played during it, is also included in one of the sections. In the entire text, we have utilised 4 Quadrant graphs to study supply and demand causalities involved in commercial real estate. At the end we have included the impact of demonetisation as a move to counter the problem of overvaluation in the property assets arising due to the X component. The case of Demonetisation which has been the latest move by the Indian Government to control huge amount of black money in circulation has been included along with its impact on the housing and rent as well as the capital market. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=X-component" title="X-component">X-component</a>, <a href="https://publications.waset.org/abstracts/search?q=4Q%20graph" title=" 4Q graph"> 4Q graph</a>, <a href="https://publications.waset.org/abstracts/search?q=real%20estate" title=" real estate"> real estate</a>, <a href="https://publications.waset.org/abstracts/search?q=capital%20markets" title=" capital markets"> capital markets</a>, <a href="https://publications.waset.org/abstracts/search?q=demonetisation" title=" demonetisation"> demonetisation</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20sentiments" title=" consumer sentiments"> consumer sentiments</a> </p> <a href="https://publications.waset.org/abstracts/73001/real-estate-rigidities-the-effect-of-cash-transactions-and-the-impact-of-demonetisation-on-them" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73001.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">364</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">262</span> Enhancing Financial Security: Real-Time Anomaly Detection in Financial Transactions Using Machine Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20Kazemi">Ali Kazemi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The digital evolution of financial services, while offering unprecedented convenience and accessibility, has also escalated the vulnerabilities to fraudulent activities. In this study, we introduce a distinct approach to real-time anomaly detection in financial transactions, aiming to fortify the defenses of banking and financial institutions against such threats. Utilizing unsupervised machine learning algorithms, specifically autoencoders and isolation forests, our research focuses on identifying irregular patterns indicative of fraud within transactional data, thus enabling immediate action to prevent financial loss. The data we used in this study included the monetary value of each transaction. This is a crucial feature as fraudulent transactions may have distributions of different amounts than legitimate ones, such as timestamps indicating when transactions occurred. Analyzing transactions' temporal patterns can reveal anomalies (e.g., unusual activity in the middle of the night). Also, the sector or category of the merchant where the transaction occurred, such as retail, groceries, online services, etc. Specific categories may be more prone to fraud. Moreover, the type of payment used (e.g., credit, debit, online payment systems). Different payment methods have varying risk levels associated with fraud. This dataset, anonymized to ensure privacy, reflects a wide array of transactions typical of a global banking institution, ranging from small-scale retail purchases to large wire transfers, embodying the diverse nature of potentially fraudulent activities. By engineering features that capture the essence of transactions, including normalized amounts and encoded categorical variables, we tailor our data to enhance model sensitivity to anomalies. The autoencoder model leverages its reconstruction error mechanism to flag transactions that deviate significantly from the learned normal pattern, while the isolation forest identifies anomalies based on their susceptibility to isolation from the dataset's majority. Our experimental results, validated through techniques such as k-fold cross-validation, are evaluated using precision, recall, and the F1 score alongside the area under the receiver operating characteristic (ROC) curve. Our models achieved an F1 score of 0.85 and a ROC AUC of 0.93, indicating high accuracy in detecting fraudulent transactions without excessive false positives. This study contributes to the academic discourse on financial fraud detection and provides a practical framework for banking institutions seeking to implement real-time anomaly detection systems. By demonstrating the effectiveness of unsupervised learning techniques in a real-world context, our research offers a pathway to significantly reduce the incidence of financial fraud, thereby enhancing the security and trustworthiness of digital financial services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anomaly%20detection" title="anomaly detection">anomaly detection</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20fraud" title=" financial fraud"> financial fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=autoencoders" title=" autoencoders"> autoencoders</a>, <a href="https://publications.waset.org/abstracts/search?q=isolation%20forest" title=" isolation forest"> isolation forest</a>, <a href="https://publications.waset.org/abstracts/search?q=transactional%20data%20analysis" title=" transactional data analysis"> transactional data analysis</a> </p> <a href="https://publications.waset.org/abstracts/184984/enhancing-financial-security-real-time-anomaly-detection-in-financial-transactions-using-machine-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184984.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">57</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">261</span> Accountants and Anti-Money Laundering Compliance in the Real Estate Sector</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mark%20E.%20Lokanan">Mark E. Lokanan</a>, <a href="https://publications.waset.org/abstracts/search?q=Liz%20Lee"> Liz Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper aims to examine the role of accountants as gatekeepers in anti-money laundering compliance in real estate transactions. The paper seeks to answer questions on ways in which accountants are involved in real estate transactions and mandatory compliance with regulatory authorities in Canada. The data for the study came from semi-structured interviews with accountants, lawyers, and government officials. Preliminary results reveal that there is a conflict between accountants’ obligation to disclose and loyalty to their clients. Accountants often do not see why they are obligated to disclose their clients' information to government agencies. The importance of the client in terms of the amount of revenue contributed to the accounting firm also plays a significant role in accountants' reporting decision-making process. Although the involvement of accountants in real estate purchase and sale transactions is limited to lawyers or notaries, they are often involved in designing financing schemes, which may involve money laundering activities. The paper is of wider public policy interests to both accountants and regulators. It is hard not to see Chartered Professional Accountant (CPA) Canada and government regulators using the findings to better understand the decision-making processes of accountants in their reporting practices to regulatory authorities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=money%20laundering" title="money laundering">money laundering</a>, <a href="https://publications.waset.org/abstracts/search?q=real%20estate" title=" real estate"> real estate</a>, <a href="https://publications.waset.org/abstracts/search?q=disclosure" title=" disclosure"> disclosure</a>, <a href="https://publications.waset.org/abstracts/search?q=legislation" title=" legislation"> legislation</a>, <a href="https://publications.waset.org/abstracts/search?q=compliance" title=" compliance"> compliance</a> </p> <a href="https://publications.waset.org/abstracts/93114/accountants-and-anti-money-laundering-compliance-in-the-real-estate-sector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93114.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">231</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">260</span> Advanced Machine Learning Algorithm for Credit Card Fraud Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manpreet%20Kaur">Manpreet Kaur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> When legitimate credit card users are mistakenly labelled as fraudulent in numerous financial delated applications, there are numerous ethical problems. The innovative machine learning approach we have suggested in this research outperforms the current models and shows how to model a data set for credit card fraud detection while minimizing false positives. As a result, we advise using random forests as the best machine learning method for predicting and identifying credit card transaction fraud. The majority of victims of these fraudulent transactions were discovered to be credit card users over the age of 60, with a higher percentage of fraudulent transactions taking place between the specific hours. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automated%20fraud%20detection" title="automated fraud detection">automated fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=isolation%20forest%20method" title=" isolation forest method"> isolation forest method</a>, <a href="https://publications.waset.org/abstracts/search?q=local%20outlier%20factor" title=" local outlier factor"> local outlier factor</a>, <a href="https://publications.waset.org/abstracts/search?q=ML%20algorithm" title=" ML algorithm"> ML algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=credit%20card" title=" credit card"> credit card</a> </p> <a href="https://publications.waset.org/abstracts/167417/advanced-machine-learning-algorithm-for-credit-card-fraud-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167417.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">113</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">259</span> Lie Symmetry Treatment for Pricing Options with Transactions Costs under the Fractional Black-Scholes Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=B.%20F.%20Nteumagne">B. F. Nteumagne</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20Pindza"> E. Pindza</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20Mare"> E. Mare</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We apply Lie symmetries analysis to price and hedge options in the fractional Brownian framework. The reputation of Lie groups is well spread in the area of Mathematical sciences and lately, in Finance. In the presence of transactions costs and under fractional Brownian motions, analytical solutions become difficult to obtain. Lie symmetries analysis allows us to simplify the problem and obtain new analytical solution. In this paper, we investigate the use of symmetries to reduce the partial differential equation obtained and obtain the analytical solution. We then proposed a hedging procedure and calibration technique for these types of options, and test the model on real market data. We show the robustness of our methodology by its application to the pricing of digital options. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fractional%20brownian%20model" title="fractional brownian model">fractional brownian model</a>, <a href="https://publications.waset.org/abstracts/search?q=symmetry" title=" symmetry"> symmetry</a>, <a href="https://publications.waset.org/abstracts/search?q=transaction%20cost" title=" transaction cost"> transaction cost</a>, <a href="https://publications.waset.org/abstracts/search?q=option%20pricing" title=" option pricing"> option pricing</a> </p> <a href="https://publications.waset.org/abstracts/38502/lie-symmetry-treatment-for-pricing-options-with-transactions-costs-under-the-fractional-black-scholes-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38502.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">399</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">258</span> Reliability Evaluation of a Payment Model in Mobile E-Commerce Using Colored Petri Net</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdolghader%20Pourali">Abdolghader Pourali</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20V.%20Malakooti"> Mohammad V. Malakooti</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Hussein%20Yektaie"> Muhammad Hussein Yektaie </a> </p> <p class="card-text"><strong>Abstract:</strong></p> A mobile payment system in mobile e-commerce generally have high security so that the user can trust it for doing business deals, sales, paying financial transactions, etc. in the mobile payment system. Since an architecture or payment model in e-commerce only shows the way of interaction and collaboration among users and mortgagers and does not present any evaluation of effectiveness and confidence about financial transactions to stakeholders. In this paper, we try to present a detailed assessment of the reliability of a mobile payment model in the mobile e-commerce using formal models and colored Petri nets. Finally, we demonstrate that the reliability of this system has high value (case study: a secure payment model in mobile commerce. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reliability" title="reliability">reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=colored%20Petri%20net" title=" colored Petri net"> colored Petri net</a>, <a href="https://publications.waset.org/abstracts/search?q=assessment" title=" assessment"> assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=payment%20models" title=" payment models"> payment models</a>, <a href="https://publications.waset.org/abstracts/search?q=m-commerce" title=" m-commerce "> m-commerce </a> </p> <a href="https://publications.waset.org/abstracts/16315/reliability-evaluation-of-a-payment-model-in-mobile-e-commerce-using-colored-petri-net" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16315.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">537</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">257</span> Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sarthak%20Mishra">Sarthak Mishra</a>, <a href="https://publications.waset.org/abstracts/search?q=Astha%20Sinha"> Astha Sinha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=business-business%20transaction%20%28B2B%29" title="business-business transaction (B2B)">business-business transaction (B2B)</a>, <a href="https://publications.waset.org/abstracts/search?q=business-consumer%20transaction%20%28B2C%29" title=" business-consumer transaction (B2C)"> business-consumer transaction (B2C)</a>, <a href="https://publications.waset.org/abstracts/search?q=e-commerce" title=" e-commerce"> e-commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20transaction" title=" online transaction"> online transaction</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20and%20security%20threats" title=" privacy and security threats"> privacy and security threats</a> </p> <a href="https://publications.waset.org/abstracts/53081/securing-the-electronic-commerce-the-way-forward-a-comparative-ananlysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53081.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">232</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">256</span> Efficient Credit Card Fraud Detection Based on Multiple ML Algorithms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Neha%20Ahirwar">Neha Ahirwar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the contemporary digital era, the rise of credit card fraud poses a significant threat to both financial institutions and consumers. As fraudulent activities become more sophisticated, there is an escalating demand for robust and effective fraud detection mechanisms. Advanced machine learning algorithms have become crucial tools in addressing this challenge. This paper conducts a thorough examination of the design and evaluation of a credit card fraud detection system, utilizing four prominent machine learning algorithms: random forest, logistic regression, decision tree, and XGBoost. The surge in digital transactions has opened avenues for fraudsters to exploit vulnerabilities within payment systems. Consequently, there is an urgent need for proactive and adaptable fraud detection systems. This study addresses this imperative by exploring the efficacy of machine learning algorithms in identifying fraudulent credit card transactions. The selection of random forest, logistic regression, decision tree, and XGBoost for scrutiny in this study is based on their documented effectiveness in diverse domains, particularly in credit card fraud detection. These algorithms are renowned for their capability to model intricate patterns and provide accurate predictions. Each algorithm is implemented and evaluated for its performance in a controlled environment, utilizing a diverse dataset comprising both genuine and fraudulent credit card transactions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=efficient%20credit%20card%20fraud%20detection" title="efficient credit card fraud detection">efficient credit card fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20forest" title=" random forest"> random forest</a>, <a href="https://publications.waset.org/abstracts/search?q=logistic%20regression" title=" logistic regression"> logistic regression</a>, <a href="https://publications.waset.org/abstracts/search?q=XGBoost" title=" XGBoost"> XGBoost</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20tree" title=" decision tree"> decision tree</a> </p> <a href="https://publications.waset.org/abstracts/179778/efficient-credit-card-fraud-detection-based-on-multiple-ml-algorithms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179778.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">66</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">255</span> Impact of Changes of the Conceptual Framework for Financial Reporting on the Indicators of the Financial Statement </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nadezhda%20Kvatashidze">Nadezhda Kvatashidze</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The International Accounting Standards Board updated the conceptual framework for financial reporting. The main reason behind it is to resolve the tasks of the accounting, which are caused by the market development and business-transactions of a new economic content. Also, the investors call for higher transparency of information and responsibility for the results in order to make a more accurate risk assessment and forecast. All these make it necessary to further develop the conceptual framework for financial reporting so that the users get useful information. The market development and certain shortcomings of the conceptual framework revealed in practice require its reconsideration and finding new solutions. Some issues and concepts, such as disclosure and supply of information, its qualitative characteristics, assessment, and measurement uncertainty had to be supplemented and perfected. The criteria of recognition of certain elements (assets and liabilities) of reporting had to be updated, too and all this is set out in the updated edition of the conceptual framework for financial reporting, a comprehensive collection of concepts underlying preparation of the financial statement. The main objective of conceptual framework revision is to improve financial reporting and development of clear concepts package. This will support International Accounting Standards Board (IASB) to set common “Approach & Reflection” for similar transactions on the basis of mutually accepted concepts. As a result, companies will be able to develop coherent accounting policies for those transactions or events that are occurred from particular deals to which no standard is used or when standard allows choice of accounting policy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conceptual%20framework" title="conceptual framework">conceptual framework</a>, <a href="https://publications.waset.org/abstracts/search?q=measurement%20basis" title=" measurement basis"> measurement basis</a>, <a href="https://publications.waset.org/abstracts/search?q=measurement%20uncertainty" title=" measurement uncertainty"> measurement uncertainty</a>, <a href="https://publications.waset.org/abstracts/search?q=neutrality" title=" neutrality"> neutrality</a>, <a href="https://publications.waset.org/abstracts/search?q=prudence" title=" prudence"> prudence</a>, <a href="https://publications.waset.org/abstracts/search?q=stewardship" title=" stewardship"> stewardship</a> </p> <a href="https://publications.waset.org/abstracts/101329/impact-of-changes-of-the-conceptual-framework-for-financial-reporting-on-the-indicators-of-the-financial-statement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/101329.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">126</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">254</span> Ensuring Consistency under the Snapshot Isolation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carlos%20Roberto%20Val%C3%AAncio">Carlos Roberto Valêncio</a>, <a href="https://publications.waset.org/abstracts/search?q=F%C3%A1bio%20Renato%20de%20Almeida"> Fábio Renato de Almeida</a>, <a href="https://publications.waset.org/abstracts/search?q=Thatiane%20Kawabata"> Thatiane Kawabata</a>, <a href="https://publications.waset.org/abstracts/search?q=Leandro%20Alves%20Neves"> Leandro Alves Neves</a>, <a href="https://publications.waset.org/abstracts/search?q=Julio%20Cesar%20Momente"> Julio Cesar Momente</a>, <a href="https://publications.waset.org/abstracts/search?q=Mario%20Luiz%20Tronco"> Mario Luiz Tronco</a>, <a href="https://publications.waset.org/abstracts/search?q=Angelo%20Cesar%20Colombini"> Angelo Cesar Colombini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> By running transactions under the Snapshot isolation we can achieve a good level of concurrency, specially in databases with high-intensive read workloads. However, Snapshot is not immune to all the problems that arise from competing transactions and therefore no serialization warranty exists. We propose in this paper a technique to obtain data consistency with Snapshot by using some special triggers that we named Daemon Triggers. Besides keeping the benefits of the Snapshot isolation, the technique is specially useful for those database systems that do not have an isolation level that ensures serializability, like Firebird and Oracle. We describe all the anomalies that might arise when using the Snapshot isolation and show how to preclude them with Daemon Triggers. Based on the methodology presented here, it is also proposed the creation of a new isolation level: Daemon Snapshot. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20consistency" title="data consistency">data consistency</a>, <a href="https://publications.waset.org/abstracts/search?q=serialization" title=" serialization"> serialization</a>, <a href="https://publications.waset.org/abstracts/search?q=snapshot" title=" snapshot"> snapshot</a>, <a href="https://publications.waset.org/abstracts/search?q=isolation" title=" isolation"> isolation</a> </p> <a href="https://publications.waset.org/abstracts/10560/ensuring-consistency-under-the-snapshot-isolation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10560.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">329</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">253</span> Circular Economy and Remedial Frameworks in Contract Law</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Reza%20Beheshti">Reza Beheshti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines remedies for defective manufactured goods in commercial circular economic transactions. The linear ‘take-make-dispose’ model fits well with the conventional remedial framework in which damages are considered the primary remedy. Damages under English Sales Law encourages buyers to look for a substitute seller with broadly similar goods to the ones agreed on in the original contract, enter into contract with this new seller and hence terminate the original contract. By doing so, the buyer ends the contractual relationship. This seems contrary to the core principles of the circular economy: keeping products, components, and materials in longer use, which can partly be achieved by product refurbishment. This process involves returning a product to good working condition by replacing or repairing major components that are faulty or close to failure and making ‘cosmetic’ changes to update the appearance of a product. This remedy has not been widely accepted or applied in commercial cases, which in turn flags up the secondary nature of performance-related remedies. This paper critically analyses the laws concerning the seller’s duty to cure in English law and the extent to which they correspond with core principles of the circular economy. In addition, this paper takes into account the potential of circular economic transactions being characterised as something other than sales. In such situations, the likely outcome will be a license to use products, which may limit the choice of remedy further. Consequently, this paper suggests an outline remedial framework specifically for commercial circular economic transactions in manufactured goods. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=circular%20economy" title="circular economy">circular economy</a>, <a href="https://publications.waset.org/abstracts/search?q=contract%20law" title=" contract law"> contract law</a>, <a href="https://publications.waset.org/abstracts/search?q=remedies" title=" remedies"> remedies</a>, <a href="https://publications.waset.org/abstracts/search?q=English%20Sales%20Law" title=" English Sales Law "> English Sales Law </a> </p> <a href="https://publications.waset.org/abstracts/107443/circular-economy-and-remedial-frameworks-in-contract-law" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/107443.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">153</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">252</span> Financial Instruments of Islamic Banking: A Critical Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rukhsana%20Shaheen">Rukhsana Shaheen</a>, <a href="https://publications.waset.org/abstracts/search?q=Tahira%20Ifraq">Tahira Ifraq</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Interest based transactions led the advent of Islamic banking. In order to provide an alternative to Interest based banking, financial transactions found in classical books of fiqh were employed. Musharakah, Mudarabah, Murabahah Salam, Ijara, and some other modes were adopted. These modes were modified so that they can be adopted for banking and satisfy the needs of customers. Since the inception of Islamic banking, these modes are being used and with the passage of time, are being molded and experimented with to cater different kinds of customers and requirements. Human efforts cannot be errorless. These modes too bear legal defects which need an in-depth scrutiny and refinement. The aim of this paper is to dig the basis and rulings of these modes in classical books of fiqh and analyze its modification and adoption in Islamic banking and the legal defects that these modes are bearing. Paper will prove itself fruitful by providing remedies for the legal defects. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=financial%20instruments" title="financial instruments">financial instruments</a>, <a href="https://publications.waset.org/abstracts/search?q=legal%20defects" title=" legal defects"> legal defects</a>, <a href="https://publications.waset.org/abstracts/search?q=remedies" title=" remedies"> remedies</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20banking" title=" Islamic banking"> Islamic banking</a> </p> <a href="https://publications.waset.org/abstracts/4375/financial-instruments-of-islamic-banking-a-critical-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4375.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">251</span> The Position of Islamic Jurisprudence in UAE Private Law: Analytical Study </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iyad%20Jadalhaq">Iyad Jadalhaq</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20El%20Hadi%20El%20Maknouzi"> Mohammed El Hadi El Maknouzi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The place of Islamic law in the legal system of the UAE is best understood by introducing a differentiation between its role as a formal source of law and its influence as a material source of law. What this differentiation helps clarify is that the corpus of Islamic law constitutes a much deeper influence on adjudication, law-making and the legal profession in the UAE, than it might appear at first sight, by considering its formal position in the division of labor between courts, or legislative lists of sources of law. This paper aims to examine the role of Shariah in the UAE private law system by determining the comprehensiveness of Sharia in the legal system as a whole, and not in a limited way related to it as a source of law according to Article 1 of the Civil Transactions Law. Turning to the role of the Shariah as a formal source of law, it is useful to start from Article 1 of the UAE Civil Code. This provision lays out the formal hierarchy of sources of UAE private law, these being legislation, Islamic law, and custom. Hence, when deciding a civil dispute, a judge should first refer to positive legislation in force in the UAE. Lacking the rule to cover the case before him/her, the judge ought then to refer directly to Islamic law. If the matter lacks regulation in Islamic law, only then may the judge appeal to custom. Accordingly, in connection to civil transactions, Shariah is presented here, formally, as the second source of law. Still, Shariah law addresses many other issues beyond civil transactions, including matters of morals, worship, and belief. However, in Article 1 of the UAE Civil Code, the reference to Islamic law ought to be understood as limited to the rules it lays out for civil transactions. There are four main sets of courts in the judicial systems of the UAE, whose competence is based on whether a dispute touches upon civil and commercial transactions, criminal offenses, personal statuses, or labor relations. This sectorial and multi-tiered organization of courts as a whole constitutes an institutional development compatible with the long-standing affirmation in the Shariah of the legitimacy of the judiciary. Indeed, Islamic law authorizes the governing authorities to organize the judiciary, including by allocating specific types of cases to particular kinds of judges depending on the value of the case, or by assigning judges to a specific place in which they are to exercise their jurisdictional function. In view of this, the contemporary organization of courts in the UAE can be regarded as an organic adaptation, aligned with Shariah rules on the assignment of jurisdictional authority, to the growing complexity of modern society. Therefore, we can conclude to the comprehensive role of Shariah in the entire legal system of the United Arab Emirates, including legislation, a judicial system, institutional, and administrative work. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Islamic%20jurisprudence" title="Islamic jurisprudence">Islamic jurisprudence</a>, <a href="https://publications.waset.org/abstracts/search?q=Shariah" title=" Shariah"> Shariah</a>, <a href="https://publications.waset.org/abstracts/search?q=UAE%20civil%20code" title=" UAE civil code"> UAE civil code</a>, <a href="https://publications.waset.org/abstracts/search?q=UAE%20private%20law" title=" UAE private law"> UAE private law</a> </p> <a href="https://publications.waset.org/abstracts/123702/the-position-of-islamic-jurisprudence-in-uae-private-law-analytical-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/123702.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">119</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=related-party%20transactions&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=related-party%20transactions&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=related-party%20transactions&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=related-party%20transactions&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=related-party%20transactions&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=related-party%20transactions&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=related-party%20transactions&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=related-party%20transactions&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=related-party%20transactions&page=10">10</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=related-party%20transactions&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>