CINXE.COM

Search results for: SIM card

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: SIM card</title> <meta name="description" content="Search results for: SIM card"> <meta name="keywords" content="SIM card"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="SIM card" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="SIM card"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 212</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: SIM card</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">212</span> Modulation of the Europay, MasterCard, and VisaCard Authentications by Using Avispa Tool</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ossama%20Al-Maliki">Ossama Al-Maliki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Europay, MasterCard, and Visa (EMV) is the transaction protocol for most of the world and especially in Europe and the UK. EMV protocol consists of three main stages which are: card authentication, cardholder verification methods, and transaction authorization. This paper details in full the EMV card authentications. We have used AVISPA and SPAN tools to do our modulization for the EMV card authentications. The code for each type of the card authentication was written by using CAS+ language. The results showed that our modulations were successfully addressed all the steps of the EMV card authentications and the entire process of the EMV card authentication are secured. Also, our modulations were successfully addressed all the main goals behind the EMV card authentications according to the EMV specifications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=EMV" title="EMV">EMV</a>, <a href="https://publications.waset.org/abstracts/search?q=card%20authentication" title=" card authentication"> card authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=contactless%20card" title=" contactless card"> contactless card</a>, <a href="https://publications.waset.org/abstracts/search?q=SDA" title=" SDA"> SDA</a>, <a href="https://publications.waset.org/abstracts/search?q=DDA" title=" DDA"> DDA</a>, <a href="https://publications.waset.org/abstracts/search?q=CDA%20AVISPA" title=" CDA AVISPA"> CDA AVISPA</a> </p> <a href="https://publications.waset.org/abstracts/89595/modulation-of-the-europay-mastercard-and-visacard-authentications-by-using-avispa-tool" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89595.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">178</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">211</span> Security Analysis of SIMSec Protocol</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kerem%20Ok">Kerem Ok</a>, <a href="https://publications.waset.org/abstracts/search?q=Cem%20Cevikbas"> Cem Cevikbas</a>, <a href="https://publications.waset.org/abstracts/search?q=Vedat%20Coskun"> Vedat Coskun</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20Alsadi"> Mohammed Alsadi</a>, <a href="https://publications.waset.org/abstracts/search?q=Busra%20Ozdenizci"> Busra Ozdenizci</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=End-to-end%20encryption" title="End-to-end encryption">End-to-end encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20exchange" title=" key exchange"> key exchange</a>, <a href="https://publications.waset.org/abstracts/search?q=SIM%20card" title=" SIM card"> SIM card</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20card" title=" smart card"> smart card</a> </p> <a href="https://publications.waset.org/abstracts/46503/security-analysis-of-simsec-protocol" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46503.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">284</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">210</span> Advanced Machine Learning Algorithm for Credit Card Fraud Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manpreet%20Kaur">Manpreet Kaur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> When legitimate credit card users are mistakenly labelled as fraudulent in numerous financial delated applications, there are numerous ethical problems. The innovative machine learning approach we have suggested in this research outperforms the current models and shows how to model a data set for credit card fraud detection while minimizing false positives. As a result, we advise using random forests as the best machine learning method for predicting and identifying credit card transaction fraud. The majority of victims of these fraudulent transactions were discovered to be credit card users over the age of 60, with a higher percentage of fraudulent transactions taking place between the specific hours. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automated%20fraud%20detection" title="automated fraud detection">automated fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=isolation%20forest%20method" title=" isolation forest method"> isolation forest method</a>, <a href="https://publications.waset.org/abstracts/search?q=local%20outlier%20factor" title=" local outlier factor"> local outlier factor</a>, <a href="https://publications.waset.org/abstracts/search?q=ML%20algorithm" title=" ML algorithm"> ML algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=credit%20card" title=" credit card"> credit card</a> </p> <a href="https://publications.waset.org/abstracts/167417/advanced-machine-learning-algorithm-for-credit-card-fraud-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167417.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">113</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">209</span> Influence of Telkom Membership Card Customer Perceived Value on Retaining PT. Telkom Indonesia&#039;s Customer in 2013-2014</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eka%20Yuliana">Eka Yuliana</a>, <a href="https://publications.waset.org/abstracts/search?q=Siska%20Shabrina%20Julyan"> Siska Shabrina Julyan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The competitive environment and high customer’s churn rate in telecommunication industries lead Indonesian telecommunication companies become strive to offer products with more value. Offering product with more value can encourage customers to keep using the companies product. One of way to retain customer is give a membership card to the customers as practiced by PT. Telkom by giving Telkom Membership Card to PT. Telkom loyal customer. This study aims to determine the influence of Telkom Membership Card customer perceived value on retaining PT. Telkom Indonesia’s customer in 2013-2014 by using quantitative method with causal study. Analythical technique used in this study is Structural Equation Modelling (SEM) to test the causal relationship with 216 owner of Telkom Membership Card in Indonesia. This study conclude that: (i) Customer perceived value on Telkom Membership Card is located in fair value zone, (ii) PT. Telkom efforts in order to retain the customers is classified as good, (iii) Customer perceived value is influencing the effort to retain the customer with the probability value less than 0.05 and level of influence 69%. Based on result of this study, PT. Telkom should (i) Improve Telkom Membership Card’s promotion because not all customer of PT. Telkom have the membership card. (iia) Adding Telkom Membership Card’s benefit such as discount at various merchant (iib) Making call center for member of Telkom Membership Card (iii) PT. Telkom should be ensure availability of their service. (iv) PT. Telkom should make a priority to customer who have telkom membership card and offers a better service.For future research should be use different variables. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=customer%20perceived%20value" title="customer perceived value">customer perceived value</a>, <a href="https://publications.waset.org/abstracts/search?q=customer%20retention" title=" customer retention"> customer retention</a>, <a href="https://publications.waset.org/abstracts/search?q=marketing" title=" marketing"> marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=relationship%20marketing" title=" relationship marketing"> relationship marketing</a> </p> <a href="https://publications.waset.org/abstracts/31461/influence-of-telkom-membership-card-customer-perceived-value-on-retaining-pt-telkom-indonesias-customer-in-2013-2014" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31461.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">321</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">208</span> Estimating Destinations of Bus Passengers Using Smart Card Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hasik%20Lee">Hasik Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Seung-Young%20Kho"> Seung-Young Kho</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, automatic fare collection (AFC) system is widely used in many countries. However, smart card data from many of cities does not contain alighting information which is necessary to build OD matrices. Therefore, in order to utilize smart card data, destinations of passengers should be estimated. In this paper, kernel density estimation was used to forecast probabilities of alighting stations of bus passengers and applied to smart card data in Seoul, Korea which contains boarding and alighting information. This method was also validated with actual data. In some cases, stochastic method was more accurate than deterministic method. Therefore, it is sufficiently accurate to be used to build OD matrices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=destination%20estimation" title="destination estimation">destination estimation</a>, <a href="https://publications.waset.org/abstracts/search?q=Kernel%20density%20estimation" title=" Kernel density estimation"> Kernel density estimation</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20card%20data" title=" smart card data"> smart card data</a>, <a href="https://publications.waset.org/abstracts/search?q=validation" title=" validation"> validation</a> </p> <a href="https://publications.waset.org/abstracts/80452/estimating-destinations-of-bus-passengers-using-smart-card-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80452.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">352</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">207</span> A Study on the Reliability Evaluation of a Timer Card for Air Dryer of the Railway Vehicle </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chul%20Su%20Kim">Chul Su Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Jun%20Ku%20Lee"> Jun Ku Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Won%20Jun%20Lee"> Won Jun Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The EMU (electric multiple unit) vehicle timer card is a PCB (printed circuit board) for controlling the air-dryer to remove the moisture of the generated air from the air compressor of the braking device. This card is exposed to the lower part of the railway vehicle, so it is greatly affected by the external environment such as temperature and humidity. The main cause of the failure of this timer card is deterioration of soldering area of the PCB surface due to temperature and humidity. Therefore, in the viewpoint of preventive maintenance, it is important to evaluate the reliability of the timer card and predict the replacement cycle to secure the safety of the air braking device is one of the main devices for driving. In this study, the existing and the improved products were evaluated on the reliability through ALT (accelerated life test). In addition, the acceleration factor by the 'Coffin-Manson' equation was obtained, and the remaining lifetime was compared and examined. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reliability%20evaluation" title="reliability evaluation">reliability evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=timer%20card" title=" timer card"> timer card</a>, <a href="https://publications.waset.org/abstracts/search?q=Printed%20Circuit%20Board" title=" Printed Circuit Board"> Printed Circuit Board</a>, <a href="https://publications.waset.org/abstracts/search?q=Accelerated%20Life%20Test" title=" Accelerated Life Test"> Accelerated Life Test</a> </p> <a href="https://publications.waset.org/abstracts/69077/a-study-on-the-reliability-evaluation-of-a-timer-card-for-air-dryer-of-the-railway-vehicle" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69077.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">279</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">206</span> An Exploratory Analysis of Brisbane&#039;s Commuter Travel Patterns Using Smart Card Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ming%20Wei">Ming Wei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Over the past two decades, Location Based Service (LBS) data have been increasingly applied to urban and transportation studies due to their comprehensiveness and consistency. However, compared to other LBS data including mobile phone data, GPS and social networking platforms, smart card data collected from public transport users have arguably yet to be fully exploited in urban systems analysis. By using five weekdays of passenger travel transaction data taken from go card – Southeast Queensland’s transit smart card – this paper analyses the spatiotemporal distribution of passenger movement with regard to the land use patterns in Brisbane. Work and residential places for public transport commuters were identified after extracting journeys-to-work patterns. Our results show that the locations of the workplaces identified from the go card data and residential suburbs are largely consistent with those that were marked in the land use map. However, the intensity for some residential locations in terms of population or commuter densities do not match well between the map and those derived from the go card data. This indicates that the misalignment between residential areas and workplaces to a certain extent, shedding light on how enhancements to service management and infrastructure expansion might be undertaken. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=big%20data" title="big data">big data</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20card%20data" title=" smart card data"> smart card data</a>, <a href="https://publications.waset.org/abstracts/search?q=travel%20pattern" title=" travel pattern"> travel pattern</a>, <a href="https://publications.waset.org/abstracts/search?q=land%20use" title=" land use"> land use</a> </p> <a href="https://publications.waset.org/abstracts/54782/an-exploratory-analysis-of-brisbanes-commuter-travel-patterns-using-smart-card-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54782.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">285</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">205</span> Efficient Signcryption Scheme with Provable Security for Smart Card</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jayaprakash%20Kar">Jayaprakash Kar</a>, <a href="https://publications.waset.org/abstracts/search?q=Daniyal%20M.%20Alghazzawi"> Daniyal M. Alghazzawi </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=random%20oracle" title="random oracle">random oracle</a>, <a href="https://publications.waset.org/abstracts/search?q=provable%20security" title=" provable security"> provable security</a>, <a href="https://publications.waset.org/abstracts/search?q=unforgebility" title=" unforgebility"> unforgebility</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20card" title=" smart card"> smart card</a> </p> <a href="https://publications.waset.org/abstracts/17144/efficient-signcryption-scheme-with-provable-security-for-smart-card" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17144.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">593</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">204</span> Automatic Teller Machine System Security by Using Mobile SMS Code </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Husnain%20Mushtaq">Husnain Mushtaq</a>, <a href="https://publications.waset.org/abstracts/search?q=Mary%20Anjum"> Mary Anjum</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Aleem"> Muhammad Aleem </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=PIN" title="PIN">PIN</a>, <a href="https://publications.waset.org/abstracts/search?q=inquiry" title=" inquiry"> inquiry</a>, <a href="https://publications.waset.org/abstracts/search?q=biometric" title=" biometric"> biometric</a>, <a href="https://publications.waset.org/abstracts/search?q=magnetic%20strip" title=" magnetic strip"> magnetic strip</a>, <a href="https://publications.waset.org/abstracts/search?q=iris%20recognition" title=" iris recognition"> iris recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=face%20recognition" title=" face recognition"> face recognition</a> </p> <a href="https://publications.waset.org/abstracts/31509/automatic-teller-machine-system-security-by-using-mobile-sms-code" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31509.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">364</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">203</span> Application of Cloud Based Healthcare Information System through a Smart Card in Kingdom of Saudi Arabia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wasmi%20Woishi">Wasmi Woishi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Smart card technology is a secure and safe technology that is expanding its capabilities day by day in terms of holding important information without alteration. It is readily available, and its ease of portability makes it more efficient in terms of its usage. The smart card is in use by many industries such as financial, insurance, governmental industries, personal identification, to name a few. Smart card technology is popular for its wide familiarity, adaptability, accessibility, benefits, and portability. This research aims to find out the perception toward the application of a cloud-based healthcare system through a smart card in KSA. The research has compiled the countries using a smart card or smart healthcare card and indicated the potential benefits of implementing smart healthcare cards. 120 participants from Riyadh city were surveyed by the means of a closed-ended questionnaire. Data were analyzed through SPSS. This research extends the research body in the healthcare system. Empirical evidence regarding smart healthcare cards is scarce and hence undertaken in this study. The study provides a useful insight into collecting, storing, analyzing, manipulating, and accessibility of medical information regarding smart healthcare cards. Research findings can help achieve KSA's Vision 2030 goals in terms of the digitalization of healthcare systems in improving its efficiency and effectiveness in storing and accessing healthcare data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20card%20technology" title="smart card technology">smart card technology</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare%20using%20smart%20cards" title=" healthcare using smart cards"> healthcare using smart cards</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20healthcare%20cards" title=" smart healthcare cards"> smart healthcare cards</a>, <a href="https://publications.waset.org/abstracts/search?q=KSA%20healthcare%20information%20system" title=" KSA healthcare information system"> KSA healthcare information system</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud-based%20healthcare%20cards" title=" cloud-based healthcare cards"> cloud-based healthcare cards</a> </p> <a href="https://publications.waset.org/abstracts/126728/application-of-cloud-based-healthcare-information-system-through-a-smart-card-in-kingdom-of-saudi-arabia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/126728.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">162</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">202</span> Modeling Activity Pattern Using XGBoost for Mining Smart Card Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eui-Jin%20Kim">Eui-Jin Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Hasik%20Lee"> Hasik Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Su-Jin%20Park"> Su-Jin Park</a>, <a href="https://publications.waset.org/abstracts/search?q=Dong-Kyu%20Kim"> Dong-Kyu Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Smart-card data are expected to provide information on activity pattern as an alternative to conventional person trip surveys. The focus of this study is to propose a method for training the person trip surveys to supplement the smart-card data that does not contain the purpose of each trip. We selected only available features from smart card data such as spatiotemporal information on the trip and geographic information system (GIS) data near the stations to train the survey data. XGboost, which is state-of-the-art tree-based ensemble classifier, was used to train data from multiple sources. This classifier uses a more regularized model formalization to control the over-fitting and show very fast execution time with well-performance. The validation results showed that proposed method efficiently estimated the trip purpose. GIS data of station and duration of stay at the destination were significant features in modeling trip purpose. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=activity%20pattern" title="activity pattern">activity pattern</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20fusion" title=" data fusion"> data fusion</a>, <a href="https://publications.waset.org/abstracts/search?q=smart-card" title=" smart-card"> smart-card</a>, <a href="https://publications.waset.org/abstracts/search?q=XGboost" title=" XGboost"> XGboost</a> </p> <a href="https://publications.waset.org/abstracts/80202/modeling-activity-pattern-using-xgboost-for-mining-smart-card-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80202.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">246</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">201</span> Development and Performance Analysis of Multifunctional City Smart Card System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vedat%20Coskun">Vedat Coskun</a>, <a href="https://publications.waset.org/abstracts/search?q=Fahri%20Soylemezgiller"> Fahri Soylemezgiller</a>, <a href="https://publications.waset.org/abstracts/search?q=Busra%20Ozdenizci"> Busra Ozdenizci</a>, <a href="https://publications.waset.org/abstracts/search?q=Kerem%20Ok"> Kerem Ok</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, several smart card solutions for transportation services of cities with different technical infrastructures and business models has emerged considerably, which triggers new business and technical opportunities. In order to create a unique system, we present a novel, promising system called Multifunctional City Smart Card System to be used in all cities that provides transportation and loyalty services based on the MasterCard M/Chip Advance standards. The proposed system provides a unique solution for transportation services of large cities over the world, aiming to answer all transportation needs of citizens. In this paper, development of the Multifunctional City Smart Card System and system requirements are briefly described. Moreover, performance analysis results of M/Chip Advance Compatible Validators which is the system's most important component are presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20card" title="smart card">smart card</a>, <a href="https://publications.waset.org/abstracts/search?q=m%2Fchip%20advance%20standard" title=" m/chip advance standard"> m/chip advance standard</a>, <a href="https://publications.waset.org/abstracts/search?q=city%20transportation" title=" city transportation"> city transportation</a>, <a href="https://publications.waset.org/abstracts/search?q=performance%20analysis" title=" performance analysis"> performance analysis</a> </p> <a href="https://publications.waset.org/abstracts/5579/development-and-performance-analysis-of-multifunctional-city-smart-card-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5579.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">475</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">200</span> Secure Cryptographic Operations on SIM Card for Mobile Financial Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kerem%20Ok">Kerem Ok</a>, <a href="https://publications.waset.org/abstracts/search?q=Serafettin%20Senturk"> Serafettin Senturk</a>, <a href="https://publications.waset.org/abstracts/search?q=Serdar%20Aktas"> Serdar Aktas</a>, <a href="https://publications.waset.org/abstracts/search?q=Cem%20Cevikbas"> Cem Cevikbas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SIM%20card" title="SIM card">SIM card</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20financial%20services" title=" mobile financial services"> mobile financial services</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=secure%20data%20storage" title=" secure data storage"> secure data storage</a> </p> <a href="https://publications.waset.org/abstracts/54843/secure-cryptographic-operations-on-sim-card-for-mobile-financial-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54843.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">312</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">199</span> Developing a Smart Card Using Internet of Things-Uni-C</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Enji%20E.%20Alzamzami">Enji E. Alzamzami</a>, <a href="https://publications.waset.org/abstracts/search?q=Kholod%20A.%20Almwallad"> Kholod A. Almwallad</a>, <a href="https://publications.waset.org/abstracts/search?q=Rahaf%20J.%20Alwafi"> Rahaf J. Alwafi</a>, <a href="https://publications.waset.org/abstracts/search?q=Roaa%20H.%20Alansari"> Roaa H. Alansari</a>, <a href="https://publications.waset.org/abstracts/search?q=Shatha%20S.%20Alshehri"> Shatha S. Alshehri</a>, <a href="https://publications.waset.org/abstracts/search?q=Aeshah%20A.%20Alsiyami"> Aeshah A. Alsiyami</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper demonstrates a system that helps solve the congestion problem at the entrance gates and limits the spread of viruses among people in crowded environments, such as COVID-19, using the IoT (Internet of Things). This system may assist in organizing the campus entry process efficiently by developing a smart card application supported by NFC (Near Field Communication) technology through which users' information could be sent to a reader to share it with the server and allow the server to perform its tasks and send a confirmation response for the request either by acceptance or rejection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title="COVID-19">COVID-19</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=NFC%20technology" title=" NFC technology"> NFC technology</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20card" title=" smart card"> smart card</a> </p> <a href="https://publications.waset.org/abstracts/149076/developing-a-smart-card-using-internet-of-things-uni-c" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149076.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">198</span> Efficient Credit Card Fraud Detection Based on Multiple ML Algorithms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Neha%20Ahirwar">Neha Ahirwar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the contemporary digital era, the rise of credit card fraud poses a significant threat to both financial institutions and consumers. As fraudulent activities become more sophisticated, there is an escalating demand for robust and effective fraud detection mechanisms. Advanced machine learning algorithms have become crucial tools in addressing this challenge. This paper conducts a thorough examination of the design and evaluation of a credit card fraud detection system, utilizing four prominent machine learning algorithms: random forest, logistic regression, decision tree, and XGBoost. The surge in digital transactions has opened avenues for fraudsters to exploit vulnerabilities within payment systems. Consequently, there is an urgent need for proactive and adaptable fraud detection systems. This study addresses this imperative by exploring the efficacy of machine learning algorithms in identifying fraudulent credit card transactions. The selection of random forest, logistic regression, decision tree, and XGBoost for scrutiny in this study is based on their documented effectiveness in diverse domains, particularly in credit card fraud detection. These algorithms are renowned for their capability to model intricate patterns and provide accurate predictions. Each algorithm is implemented and evaluated for its performance in a controlled environment, utilizing a diverse dataset comprising both genuine and fraudulent credit card transactions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=efficient%20credit%20card%20fraud%20detection" title="efficient credit card fraud detection">efficient credit card fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20forest" title=" random forest"> random forest</a>, <a href="https://publications.waset.org/abstracts/search?q=logistic%20regression" title=" logistic regression"> logistic regression</a>, <a href="https://publications.waset.org/abstracts/search?q=XGBoost" title=" XGBoost"> XGBoost</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20tree" title=" decision tree"> decision tree</a> </p> <a href="https://publications.waset.org/abstracts/179778/efficient-credit-card-fraud-detection-based-on-multiple-ml-algorithms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179778.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">66</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">197</span> Smart Card Technology Adaption in a Hospital Setting</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20K.%20V.%20Narayan">H. K. V. Narayan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study was conducted at Tata Memorial Hospital (TMH), Mumbai, India. The study was to evaluate the impact of adapting Smart Card (SC) for clinical and business transactions in order to reduce Lead times and to enforce business rules of the hospital. The objective for implementing the Smart Card was to improve the patient perception of quality in terms of structures process and outcomes and also to improve the productivity of the Institution. The Smart Card was implemented in phases from 2011 and integrated with the Hospital Information System (HIS/EMR). The implementation was a learning curve for all the stake holders as software obviated the need to use hardcopies of transactions. The acceptability to the stake holders was challenge in change management. The study assessed the impact 3 years into the implementation and the observed trends have suggested that it has decreased the lead times for services and increased the no of transactions and thereby the productivity. Patients who used to complain of multiple queues and cumbersome transactions now compliment the administration for effective use of Information and Communication Technology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20card" title="smart card">smart card</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20availability%20of%20health%20care%20information" title=" high availability of health care information"> high availability of health care information</a>, <a href="https://publications.waset.org/abstracts/search?q=reduction%20in%20potential%20medical%20errors%20due%20to%20elimination%20of%20transcription%20errors" title=" reduction in potential medical errors due to elimination of transcription errors"> reduction in potential medical errors due to elimination of transcription errors</a>, <a href="https://publications.waset.org/abstracts/search?q=reduction%20in%20no%20of%20queues" title=" reduction in no of queues"> reduction in no of queues</a>, <a href="https://publications.waset.org/abstracts/search?q=increased%20transactions" title=" increased transactions"> increased transactions</a>, <a href="https://publications.waset.org/abstracts/search?q=augmentation%20of%20revenue" title=" augmentation of revenue "> augmentation of revenue </a> </p> <a href="https://publications.waset.org/abstracts/39224/smart-card-technology-adaption-in-a-hospital-setting" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39224.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">285</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">196</span> A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Niloofar%20Yousefi">Niloofar Yousefi</a>, <a href="https://publications.waset.org/abstracts/search?q=Marie%20Alaghband"> Marie Alaghband</a>, <a href="https://publications.waset.org/abstracts/search?q=Ivan%20Garibay"> Ivan Garibay</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increase of credit card usage, the volume of credit card misuse also has significantly increased, which may cause appreciable financial losses for both credit card holders and financial organizations issuing credit cards. As a result, financial organizations are working hard on developing and deploying credit card fraud detection methods, in order to adapt to ever-evolving, increasingly sophisticated defrauding strategies and identifying illicit transactions as quickly as possible to protect themselves and their customers. Compounding on the complex nature of such adverse strategies, credit card fraudulent activities are rare events compared to the number of legitimate transactions. Hence, the challenge to develop fraud detection that are accurate and efficient is substantially intensified and, as a consequence, credit card fraud detection has lately become a very active area of research. In this work, we provide a survey of current techniques most relevant to the problem of credit card fraud detection. We carry out our survey in two main parts. In the first part, we focus on studies utilizing classical machine learning models, which mostly employ traditional transnational features to make fraud predictions. These models typically rely on some static physical characteristics, such as what the user knows (knowledge-based method), or what he/she has access to (object-based method). In the second part of our survey, we review more advanced techniques of user authentication, which use behavioral biometrics to identify an individual based on his/her unique behavior while he/she is interacting with his/her electronic devices. These approaches rely on how people behave (instead of what they do), which cannot be easily forged. By providing an overview of current approaches and the results reported in the literature, this survey aims to drive the future research agenda for the community in order to develop more accurate, reliable and scalable models of credit card fraud detection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Credit%20Card%20Fraud%20Detection" title="Credit Card Fraud Detection">Credit Card Fraud Detection</a>, <a href="https://publications.waset.org/abstracts/search?q=User%20Authentication" title=" User Authentication"> User Authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=Behavioral%20Biometrics" title=" Behavioral Biometrics"> Behavioral Biometrics</a>, <a href="https://publications.waset.org/abstracts/search?q=Machine%20Learning" title=" Machine Learning"> Machine Learning</a>, <a href="https://publications.waset.org/abstracts/search?q=Literature%20Survey" title=" Literature Survey"> Literature Survey</a> </p> <a href="https://publications.waset.org/abstracts/135569/a-comprehensive-survey-on-machine-learning-techniques-and-user-authentication-approaches-for-credit-card-fraud-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135569.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">121</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">195</span> Government Credit Card in State Financial Management: Public Sector Innovation in Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Paramita%20Nur%20Kurniati">Paramita Nur Kurniati</a>, <a href="https://publications.waset.org/abstracts/search?q=Stanislaus%20Riyanta"> Stanislaus Riyanta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the midst of the heightened usage of electronic money (e-money), Indonesian government expenditure is yet governed through cash-basis transactions. This conventional system brings about a number of potential risks and obstacles to operational conduct, including state financial liquidity issue. Consequently, Ministry of Finance is currently establishing the cashless payment methods for State Budget (APBN). Included in those advance methods is credit card facility as a government expenditure payment scheme. This policy is one of the innovations within the public sector learned from other countries’ best practices. Moreover, this particular method is already prominent within the private-sector realm. Qualitative descriptive analysis technique is implemented to evaluate the contemporary innovation of using government credit card in the path towards cashless society. This approach is expected to generate several benefits for the government, particularly in minimizing corruption within the state financial management. Effective coordination among policy makers and policy implementers is essential for the success of this policy’s exercise, without neglecting prudence and public transparency aspects. Government credit card usage shall be the potent resolution for enhancing the government’s overall public service performance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cashless%20basis" title="cashless basis">cashless basis</a>, <a href="https://publications.waset.org/abstracts/search?q=cashless%20society" title=" cashless society"> cashless society</a>, <a href="https://publications.waset.org/abstracts/search?q=government%20credit%20card" title=" government credit card"> government credit card</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20sector%20innovation" title=" public sector innovation"> public sector innovation</a> </p> <a href="https://publications.waset.org/abstracts/104227/government-credit-card-in-state-financial-management-public-sector-innovation-in-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104227.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">149</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">194</span> Unauthorized License Verifier and Secure Access to Vehicle </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20Prakash">G. Prakash</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Mohamed%20Aasiq"> L. Mohamed Aasiq</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Dhivya"> N. Dhivya</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Jothi%20Mani"> M. Jothi Mani</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Mounika"> R. Mounika</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Gomathi"> B. Gomathi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In our day to day life, many people met with an accident due to various reasons like over speed, overload in the vehicle, violation of the traffic rules, etc. Driving license system is difficult task for the government to monitor. To prevent non-licensees from driving who are causing most of the accidents, a new system is proposed. The proposed system consists of a smart card capable of storing the license details of a particular person. Vehicles such as cars, bikes etc., should have a card reader capable of reading the particular license. A person, who wishes to drive the vehicle, should insert the card (license) in the vehicle and then enter the password in the keypad. If the license data stored in the card and database about the entire license holders in the microcontroller matches, he/she can proceed for ignition after the automated opening of the fuel tank valve, otherwise the user is restricted to use the vehicle. Moreover, overload detector in our proposed system verifies and then prompts the user to avoid overload before driving. This increases the security of vehicles and also ensures safe driving by preventing accidents. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=license" title="license">license</a>, <a href="https://publications.waset.org/abstracts/search?q=verifier" title=" verifier"> verifier</a>, <a href="https://publications.waset.org/abstracts/search?q=EEPROM" title=" EEPROM"> EEPROM</a>, <a href="https://publications.waset.org/abstracts/search?q=secure" title=" secure"> secure</a>, <a href="https://publications.waset.org/abstracts/search?q=overload%20detection" title=" overload detection"> overload detection</a> </p> <a href="https://publications.waset.org/abstracts/3963/unauthorized-license-verifier-and-secure-access-to-vehicle" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3963.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">242</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">193</span> Application of Biometrics in Patient Identification Card: Case Study of Saudi Arabia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sarah%20Aldhalaan">Sarah Aldhalaan</a>, <a href="https://publications.waset.org/abstracts/search?q=Tanzila%20Saba"> Tanzila Saba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Healthcare sectors are increasing rapidly to fulfill patient’s needs across the world. A patient identification is considered as the main aspect for a patient to be served in healthcare institutes. Nowadays, people are presenting their insurance card along with their identification card in order to get the needed treatment in hospitals however, this process lack security preferences. The aim of this research paper is to reveal a solution to introduce and use biometrics in healthcare hospitals. The findings show that the people know biometrics since they are interacting with them through different channels and that the need for biometrics techniques to identify patients is essential. Also, the survey relevant questions are used to analyze and add insights on what is are the suitable biometrics to be used in such cases. Moreover, results are presented to exhibit the effectiveness of the used methodology and in analyzing usage of biometrics in hospitals in an enhancing way. Finally, an interesting conclusion of overall work is presented at the end of paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biometrics" title="biometrics">biometrics</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=fingerprint" title=" fingerprint"> fingerprint</a>, <a href="https://publications.waset.org/abstracts/search?q=Saudi%20Arabia" title=" Saudi Arabia"> Saudi Arabia</a> </p> <a href="https://publications.waset.org/abstracts/69905/application-of-biometrics-in-patient-identification-card-case-study-of-saudi-arabia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69905.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">247</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">192</span> An Augmented-Reality Interactive Card Game for Teaching Elementary School Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=YuLung%20Wu">YuLung Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=YuTien%20Wu"> YuTien Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=ShuMey%20Yu"> ShuMey Yu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Game-based learning can enhance the learning motivation of students and provide a means for them to learn through playing games. This study used augmented reality technology to develop an interactive card game as a game-based teaching aid for delivering elementary school science course content with the aim of enhancing student learning processes and outcomes. Through playing the proposed card game, students can familiarize themselves with appearance, features, and foraging behaviors of insects. The system records the actions of students, enabling teachers to determine their students’ learning progress. In this study, 37 students participated in an assessment experiment and provided feedback through questionnaires. Their responses indicated that they were significantly more motivated to learn after playing the game, and their feedback was mostly positive. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=game-based%20learning" title="game-based learning">game-based learning</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20motivation" title=" learning motivation"> learning motivation</a>, <a href="https://publications.waset.org/abstracts/search?q=teaching%20aid" title=" teaching aid"> teaching aid</a>, <a href="https://publications.waset.org/abstracts/search?q=augmented%20reality" title=" augmented reality"> augmented reality</a> </p> <a href="https://publications.waset.org/abstracts/37541/an-augmented-reality-interactive-card-game-for-teaching-elementary-school-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37541.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">375</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">191</span> Implementation of Smart Card Automatic Fare Collection Technology in Small Transit Agencies for Standards Development</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Walter%20E.%20Allen">Walter E. Allen</a>, <a href="https://publications.waset.org/abstracts/search?q=Robert%20D.%20Murray"> Robert D. Murray</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Many large transit agencies have adopted RFID technology and electronic automatic fare collection (AFC) or smart card systems, but small and rural agencies remain tied to obsolete manual, cash-based fare collection. Small countries or transit agencies can benefit from the implementation of smart card AFC technology with the promise of increased passenger convenience, added passenger satisfaction and improved agency efficiency. For transit agencies, it reduces revenue loss, improves passenger flow and bus stop data. For countries, further implementation into security, distribution of social services or currency transactions can provide greater benefits. However, small countries or transit agencies cannot afford expensive proprietary smart card solutions typically offered by the major system suppliers. Deployment of Contactless Fare Media System (CFMS) Standard eliminates the proprietary solution, ultimately lowering the cost of implementation. Acumen Building Enterprise, Inc. chose the Yuma County Intergovernmental Public Transportation Authority (YCIPTA) existing proprietary YCAT smart card system to implement CFMS. The revised system enables the purchase of fare product online with prepaid debit or credit cards using the Payment Gateway Processor. Open and interoperable smart card standards for transit have been developed. During the 90-day Pilot Operation conducted, the transit agency gathered the data from the bus AcuFare 200 Card Reader, loads (copies) the data to a USB Thumb Drive and uploads the data to the Acumen Host Processing Center for consolidation of the data into the transit agency master data file. The transition from the existing proprietary smart card data format to the new CFMS smart card data format was transparent to the transit agency cardholders. It was proven that open standards and interoperability design can work and reduce both implementation and operational costs for small transit agencies or countries looking to expand smart card technology. Acumen was able to avoid the implementation of the Payment Card Industry (PCI) Data Security Standards (DSS) which is expensive to develop and costly to operate on a continuing basis. Due to the substantial additional complexities of implementation and the variety of options presented to the transit agency cardholder, Acumen chose to implement only the Directed Autoload. To improve the implementation efficiency and the results for a similar undertaking, it should be considered that some passengers lack credit cards and are averse to technology. There are more than 1,300 small and rural agencies in the United States. This grows by 10 fold when considering small countries or rural locations throughout Latin American and the world. Acumen is evaluating additional countries, sites or transit agency that can benefit from the smart card systems. Frequently, payment card systems require extensive security procedures for implementation. The Project demonstrated the ability to purchase fare value, rides and passes with credit cards on the internet at a reasonable cost without highly complex security requirements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automatic%20fare%20collection" title="automatic fare collection">automatic fare collection</a>, <a href="https://publications.waset.org/abstracts/search?q=near%20field%20communication" title=" near field communication"> near field communication</a>, <a href="https://publications.waset.org/abstracts/search?q=small%20transit%20agencies" title=" small transit agencies"> small transit agencies</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20cards" title=" smart cards"> smart cards</a> </p> <a href="https://publications.waset.org/abstracts/63545/implementation-of-smart-card-automatic-fare-collection-technology-in-small-transit-agencies-for-standards-development" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63545.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">283</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">190</span> Automatic Checkpoint System Using Face and Card Information</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kriddikorn%20Kaewwongsri">Kriddikorn Kaewwongsri</a>, <a href="https://publications.waset.org/abstracts/search?q=Nikom%20Suvonvorn"> Nikom Suvonvorn</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the deep south of Thailand, checkpoints for people verification are necessary for the security management of risk zones, such as official buildings in the conflict area. In this paper, we propose an automatic checkpoint system that verifies persons using information from ID cards and facial features. The methods for a person&rsquo;s information abstraction and verification are introduced based on useful information such as ID number and name, extracted from official cards, and facial images from videos. The proposed system shows promising results and has a real impact on the local society. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=face%20comparison" title="face comparison">face comparison</a>, <a href="https://publications.waset.org/abstracts/search?q=card%20recognition" title=" card recognition"> card recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=OCR" title=" OCR"> OCR</a>, <a href="https://publications.waset.org/abstracts/search?q=checkpoint%20system" title=" checkpoint system"> checkpoint system</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a> </p> <a href="https://publications.waset.org/abstracts/40284/automatic-checkpoint-system-using-face-and-card-information" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40284.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">321</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">189</span> Use of Visual, Animating Narrative in an Entrepreneurial Storytelling: A Case Study of Greenesignit! Card Game, Educational and Brainstorming Tool for Development of Sustainable Products</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maja%20S.%20Todorovic">Maja S. Todorovic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper aims to promote entrepreneurial storytelling by exploring new ideas and learning practices. An entrepreneur needs to be a ‘storyteller’, an ‘epic hero’, capable of offering an emotional connection to his audience, a character with whom audience can identify with, rejoice, suffer, celebrate, fail – simply experience everything. In other words, a successful entrepreneur is giving tangible experience through his business story and that’s what makes his story and business alive. Use of mythology, eulogy, metaphor, epic, fairytales and cartoons, permeated with humor and sudden twists is a winning recipe for a business story that captures attention. In the business case of the Greenesignit! Card game, (educational and brainstorming tool for development of sustainable products) we will demonstrate how an entrepreneur successfully used visual narrative to communicate his story and at the same time as a vehicle to transmute his message in learning tool and product development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=animating%20narrative" title="animating narrative">animating narrative</a>, <a href="https://publications.waset.org/abstracts/search?q=entrepreneur" title=" entrepreneur"> entrepreneur</a>, <a href="https://publications.waset.org/abstracts/search?q=Greeneisgnit%21%20card%20game" title=" Greeneisgnit! card game"> Greeneisgnit! card game</a>, <a href="https://publications.waset.org/abstracts/search?q=visual%20storytelling" title=" visual storytelling"> visual storytelling</a> </p> <a href="https://publications.waset.org/abstracts/39520/use-of-visual-animating-narrative-in-an-entrepreneurial-storytelling-a-case-study-of-greenesignit-card-game-educational-and-brainstorming-tool-for-development-of-sustainable-products" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39520.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">188</span> Developing Cucurbitacin a Minimum Inhibition Concentration of Meloidogyne Incognita Using a Computer-Based Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zakheleni%20P.%20Dube">Zakheleni P. Dube</a>, <a href="https://publications.waset.org/abstracts/search?q=Phatu%20W.%20Mashela"> Phatu W. Mashela</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Minimum inhibition concentration (MIC) is the lowest concentration of a chemical that brings about significant inhibition of target organism. The conventional method for establishing the MIC for phytonematicides is tedious. The objective of this study was to use the Curve-fitting Allelochemical Response Data (CARD) to determine the MIC for pure cucurbitacin A on Meloidogyne incognita second-stage juveniles (J2) hatch, immobility and mortality. Meloidogyne incognita eggs and freshly hatched J2 were separately exposed to a series of pure cucurbitacin A concentrations of 0.00, 0.25, 0.50, 0.75, 1.00, 1.25, 1.50, 1.75, 2.00, 2.25 and 2.50 μg.mL⁻¹for 12, 24, 48 and 72 h in an incubator set at 25 ± 2°C. Meloidogyne incognita J2 hatch, immobility and mortality counts were determined using a stereomicroscope and the significant means were subjected to the CARD model. The model exhibited density-dependent growth (DDG) patterns of J2 hatch, immobility and mortality to increasing concentrations of cucurbitacin A. The average MIC for cucurbitacin A on M. incognita J2 hatch, immobility and mortality were 2.2, 0.58 and 0.63 µg.mL⁻¹, respectively. Meloidogyne incognita J2 hatch had the highest average MIC value followed by mortality and immobility had the least. In conclusion, the CARD model was able to generate MIC for cucurbitacin A, hence it could serve as a valuable tool in the chemical-nematode bioassay studies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=inhibition%20concentration" title="inhibition concentration">inhibition concentration</a>, <a href="https://publications.waset.org/abstracts/search?q=phytonematicide" title=" phytonematicide"> phytonematicide</a>, <a href="https://publications.waset.org/abstracts/search?q=sensitivity%20index" title=" sensitivity index"> sensitivity index</a>, <a href="https://publications.waset.org/abstracts/search?q=threshold%20stimulation" title=" threshold stimulation"> threshold stimulation</a>, <a href="https://publications.waset.org/abstracts/search?q=triterpenoids." title=" triterpenoids."> triterpenoids.</a> </p> <a href="https://publications.waset.org/abstracts/72586/developing-cucurbitacin-a-minimum-inhibition-concentration-of-meloidogyne-incognita-using-a-computer-based-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72586.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">190</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">187</span> To Determine the Effects of Regulatory Food Safety Inspections on the Grades of Different Categories of Retail Food Establishments across the Dubai Region</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shugufta%20Mohammad%20Zubair">Shugufta Mohammad Zubair</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explores the Effect of the new food System Inspection system also called the new inspection color card scheme on reduction of critical & major food safety violations in Dubai. Data was collected from all retail food service establishments located in two zones in the city. Each establishment was visited twice, once before the launch of the new system and one after the launch of the system. In each visit, the Inspection checklist was used as the evaluation tool for observation of the critical and major violations. The old format of the inspection checklist was concerned with scores based on the violations; but the new format of the checklist for the new inspection color card scheme is divided into administrative, general major and critical which gives a better classification for the inspectors to identify the critical and major violations of concerned. The study found that there has been a better and clear marking of violations after the launch of new inspection system wherein the inspectors are able to mark and categories the violations effectively. There had been a 10% decrease in the number of food establishment that was previously given A grade. The B & C grading were also considerably dropped by 5%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=food%20inspection" title="food inspection">food inspection</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20assessment" title=" risk assessment"> risk assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=color%20card%20scheme" title=" color card scheme"> color card scheme</a>, <a href="https://publications.waset.org/abstracts/search?q=violations" title=" violations"> violations</a> </p> <a href="https://publications.waset.org/abstracts/71630/to-determine-the-effects-of-regulatory-food-safety-inspections-on-the-grades-of-different-categories-of-retail-food-establishments-across-the-dubai-region" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71630.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">323</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">186</span> Self-Organizing Maps for Credit Card Fraud Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=ChunYi%20Peng">ChunYi Peng</a>, <a href="https://publications.waset.org/abstracts/search?q=Wei%20Hsuan%20CHeng"> Wei Hsuan CHeng</a>, <a href="https://publications.waset.org/abstracts/search?q=Shyh%20Kuang%20Ueng"> Shyh Kuang Ueng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=self-organizing%20map%20technology" title="self-organizing map technology">self-organizing map technology</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20detection" title=" fraud detection"> fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20visualization" title=" information visualization"> information visualization</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20analysis" title=" data analysis"> data analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=composite%20intelligent%20system%20technologies" title=" composite intelligent system technologies"> composite intelligent system technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20support%20technologies" title=" decision support technologies"> decision support technologies</a> </p> <a href="https://publications.waset.org/abstracts/183639/self-organizing-maps-for-credit-card-fraud-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183639.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">57</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">185</span> Self-Organizing Maps for Credit Card Fraud Detection and Visualization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Peng%20Chun-Yi">Peng Chun-Yi</a>, <a href="https://publications.waset.org/abstracts/search?q=Chen%20Wei-Hsuan"> Chen Wei-Hsuan</a>, <a href="https://publications.waset.org/abstracts/search?q=Ueng%20Shyh-Kuang"> Ueng Shyh-Kuang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=self-organizing%20map%20technology" title="self-organizing map technology">self-organizing map technology</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20detection" title=" fraud detection"> fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20visualization" title=" information visualization"> information visualization</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20analysis" title=" data analysis"> data analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=composite%20intelligent%20system%20technologies" title=" composite intelligent system technologies"> composite intelligent system technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20support%20technologies" title=" decision support technologies"> decision support technologies</a> </p> <a href="https://publications.waset.org/abstracts/183172/self-organizing-maps-for-credit-card-fraud-detection-and-visualization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183172.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">59</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">184</span> The Determinants of Customer’s Purchase Intention of Islamic Credit Card: Evidence from Pakistan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nasir%20Mehmood">Nasir Mehmood</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Yar%20Khan"> Muhammad Yar Khan</a>, <a href="https://publications.waset.org/abstracts/search?q=Anam%20Javeed"> Anam Javeed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aims to scrutinize the dynamics which tend to impact customer’s purchasing intention of Islamic credit card and nexus of product’s knowledge and religiosity with the attitude of potential Islamic credit card’s customer. The theory of reasoned action strengthened the idea that intentions due to its proven predictive power are most likely to instigate intended consumer behavior. Particularly, the study examines the relationships of perceived financial cost (PFC), subjective norms (SN), and attitude (ATT) with the intention to purchase Islamic credit cards. Using a convenience sampling approach, data have been collected from 450 customers of banks located in Rawalpindi and Islamabad. A five-point Likert scale self-administered questionnaire was used to collect the data. The data were analyzed using the Statistical Package of Social Sciences (SPSS) through the procedures of principal component and multiple regression analysis. The results suggested that customer’s religiosity and product knowledge are strong indicators of attitude towards buying Islamic credit cards. Likewise, subjective norms, attitude, and perceived financial cost have a significant positive impact on customers’ purchase intent of Islamic bank’s credit cards. This study models a useful path for future researchers to further investigate the underlined phenomenon along with a variety of psychodynamic factors which are still in its infancy, at least in the Pakistani banking sector. The study also provides an insight to the practitioners and Islamic bank managers for directing their efforts toward educating customers regarding the use of Islamic credit cards and other financial products. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attitude" title="attitude">attitude</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20credit%20card" title=" Islamic credit card"> Islamic credit card</a>, <a href="https://publications.waset.org/abstracts/search?q=religiosity" title=" religiosity"> religiosity</a>, <a href="https://publications.waset.org/abstracts/search?q=subjective%20norms" title=" subjective norms"> subjective norms</a> </p> <a href="https://publications.waset.org/abstracts/118122/the-determinants-of-customers-purchase-intention-of-islamic-credit-card-evidence-from-pakistan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/118122.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">144</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">183</span> Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ismail%20Bile%20Hassan">Ismail Bile Hassan</a>, <a href="https://publications.waset.org/abstracts/search?q=Masrah%20Azrifah%20Azmi%20Murad"> Masrah Azrifah Azmi Murad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards Smart National Identity Card health information application. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the previous studies revealed that the factors of trust, perceived risk, privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory existing in the information system literature up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. The empirical study may be conducted in the future to provide proof and empirically validate this I-P framework. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=unified%20theory%20of%20acceptance%20and%20use%20of%20technology%20%28UTAUT%29%20model" title="unified theory of acceptance and use of technology (UTAUT) model">unified theory of acceptance and use of technology (UTAUT) model</a>, <a href="https://publications.waset.org/abstracts/search?q=UTAUT2%20model" title=" UTAUT2 model"> UTAUT2 model</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20national%20identity%20card%20%28SNIC%29" title=" smart national identity card (SNIC)"> smart national identity card (SNIC)</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20information%20application" title=" health information application"> health information application</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20calculus%20model%20%28PCM%29" title=" privacy calculus model (PCM)"> privacy calculus model (PCM)</a> </p> <a href="https://publications.waset.org/abstracts/10398/acceptance-of-health-information-application-in-smart-national-identity-card-snic-using-a-new-i-p-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10398.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">467</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=SIM%20card&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=SIM%20card&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=SIM%20card&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=SIM%20card&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=SIM%20card&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=SIM%20card&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=SIM%20card&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=SIM%20card&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10