This paper proposes a novel hybrid fraud detection framework that integrates multi-stage feature selection,unsupervised clustering,and ensemble learning to improve classification performance in financial transaction m...This paper proposes a novel hybrid fraud detection framework that integrates multi-stage feature selection,unsupervised clustering,and ensemble learning to improve classification performance in financial transaction monitoring systems.The framework is structured into three core layers:(1)feature selection using Recursive Feature Elimination(RFE),Principal Component Analysis(PCA),and Mutual Information(MI)to reduce dimensionality and enhance input relevance;(2)anomaly detection through unsupervised clustering using K-Means,Density-Based Spatial Clustering(DBSCAN),and Hierarchical Clustering to flag suspicious patterns in unlabeled data;and(3)final classification using a voting-based hybrid ensemble of Support Vector Machine(SVM),Random Forest(RF),and Gradient Boosting Classifier(GBC).The experimental evaluation is conducted on a synthetically generated dataset comprising one million financial transactions,with 5% labelled as fraudulent,simulating realistic fraud rates and behavioural features,including transaction time,origin,amount,and geo-location.The proposed model demonstrated a significant improvement over baseline classifiers,achieving an accuracy of 99%,a precision of 99%,a recall of 97%,and an F1-score of 99%.Compared to individual models,it yielded a 9% gain in overall detection accuracy.It reduced the false positive rate to below 3.5%,thereby minimising the operational costs associated with manually reviewing false alerts.The model’s interpretability is enhanced by the integration of Shapley Additive Explanations(SHAP)values for feature importance,supporting transparency and regulatory auditability.These results affirm the practical relevance of the proposed system for deployment in real-time fraud detection scenarios such as credit card transactions,mobile banking,and cross-border payments.The study also highlights future directions,including the deployment of lightweight models and the integration of multimodal data for scalable fraud analytics.展开更多
Since its inception in 2009,Bitcoin has become and is currently the most successful and widely used cryptocurrency.It introduced blockchain technology,which allows transactions that transfer funds between users to tak...Since its inception in 2009,Bitcoin has become and is currently the most successful and widely used cryptocurrency.It introduced blockchain technology,which allows transactions that transfer funds between users to take place online,in an immutable manner.No real-world identities are needed or stored in the blockchain.At the same time,all transactions are publicly available and auditable,making Bitcoin a pseudo-anonymous ledger of transactions.The volume of transactions that are broadcast on a daily basis is considerably large.We propose a set of features that can be extracted from transaction data.Using this,we apply a data processing pipeline to ultimately cluster transactions via a k-means clustering algorithm,according to the transaction properties.Finally,according to these properties,we are able to characterize these clusters and the transactions they include.Our work mainly differentiates from previous studies in that it applies an unsupervised learning method to cluster transactions instead of addresses.Using the novel features we introduce,our work classifies transactions in multiple clusters,while previous studies only attempt binary classification.Results indicate that most transactions fall into a cluster that can be described as common user transactions.Other clusters include transactions made by online exchanges and lending services,those relating to mining activities as well as smaller clusters,one of which contains possibly illicit or fraudulent transactions.We evaluated our results against an online database of addresses that belong to known actors,such as online exchanges,and found that our results generally agree with them,which enhances the validity of our methods.展开更多
In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systema...In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systematic literature review (SLR) explores the current state of distributed transaction management within MSA, focusing on the unique challenges, strategies, and technologies utilized in this domain. By synthesizing findings from 16 primary studies selected based on rigorous criteria, the review identifies key trends and best practices for maintaining data consistency and integrity across microservices. This SLR provides a comprehensive understanding of the complexities associated with distributed transactions in MSA, offering actionable insights and potential research directions for software architects, developers, and researchers.展开更多
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me...Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.展开更多
Market construction Overview In 2009, the electric power market expanded continuously. New installed capacity put into production within the coverage of the State Grid Corporation
This paper proposes to use the related party transactions’(RPT)budget completion ratio(BCR)as indicator of RPT’s execution quality.This paper studies BCR by defining budget ceiling through RPTs announcement and comp...This paper proposes to use the related party transactions’(RPT)budget completion ratio(BCR)as indicator of RPT’s execution quality.This paper studies BCR by defining budget ceiling through RPTs announcement and comparing the amount disclosed in annual report as budget execution result.Through statistical analysis of 285 RPT announcements,we classify RPT’s BCR into four benchmark grades.This paper sums up the BCR of RPT from the samples,and deduces moral obligation and moral judgement curve(OJ curve)in terms of BCR.OJ curve is the real dynamic equilibrium after the struggle agency problems.From our statistical results,we verified that Weitzman’s ratchet effect exists in the budget formulation of RPTs,and it is a solid proof of Weitzman’s ratchet effect applied to real business scenarios.The empirical results show ratchet effect exists in BCR of RPTs before and after the change from GEM board listing to main board listing in Hong Kong(Transfer).This paper also finds that it is significant to find the estimated actual amount in the coming year through the budget completion ratio(BCR)of RPT from last year.This paper is a pioneer to examine the execution quality of RPT by the means of(i)Weitzman’s Truth Inducing Model,(ii)BCR,and(iii)SGR as well as(iv)estimated actual amount.展开更多
Transactions of Nanjing University of Aeronautics&Astronautics (TNUAA) is a bimonthly journal facing international academic community. Emphasizing prompt and effective dissemination of key data and new scientific ...Transactions of Nanjing University of Aeronautics&Astronautics (TNUAA) is a bimonthly journal facing international academic community. Emphasizing prompt and effective dissemination of key data and new scientific insights, TNUAA offers publication of new experimental and theoretical papers bearing on applications to all branches of aeronautics, astronautics and civil aviation.展开更多
Transactions of Nanjing University of Aeronautics & Astronautics (TNUAA) is a bimonthly journal facing international academic community.Emphasizing prompt and effective dissemination of key data and new scientific...Transactions of Nanjing University of Aeronautics & Astronautics (TNUAA) is a bimonthly journal facing international academic community.Emphasizing prompt and effective dissemination of key data and new scientific insights,TNUAA offers publication of new experimental and theoretical papers bearing on applications to all branches of aeronautics,astronautics and civil aviation.展开更多
In hard real-time systems, schedulability analysis is not only one of the important means of guaranteeing the timelines of embedded software but also one of the fundamental theories of applying other new techniques, s...In hard real-time systems, schedulability analysis is not only one of the important means of guaranteeing the timelines of embedded software but also one of the fundamental theories of applying other new techniques, such as energy savings and fault tolerance. However, most of the existing schedulability analysis methods assume that schedulers use preemptive scheduling or non-preemptive scheduling. In this paper, we present a schedulability analysis method, i.e., the worst-case hybrid scheduling (WCHS) algorithm, which considers the influence of release jitters of transactions and extends schedulability analysis theory to timing analysis of linear transactions under fixed priority hybrid scheduling. To the best of our knowledge, this method is the first one on timing analysis of linear transactions under hybrid scheduling. An example is employed to demonstrate the use of this method. Experiments show that this method has lower computational complexity while keeping correctness, and that hybrid scheduling has little influence on the average worst-case response time (WCRT), but a negative impact on the schedulability of systems.展开更多
Transactions of Tianjin University (ISSN 1006-4982) is an academic journal sponsored by Tianjin University under the administration of Ministry of Education of China. This bimonthly journal mainly publishes novel rese...Transactions of Tianjin University (ISSN 1006-4982) is an academic journal sponsored by Tianjin University under the administration of Ministry of Education of China. This bimonthly journal mainly publishes novel research articles in natural science and engineering fields, including Chemical Engineering, Materials Science and Engineering, Pharmaceutical Engineering,Civil Engineering, Environmental Science, etc.Contributions within the above scope all over the world are welcome.Transactions of Tianjin University is indexed by Engineering Index (EI), Scopus, Chemical Abstracts (CA), Cambridge Abstract, etc.展开更多
The rise of the digital economy and the comfort of accessing by way of user mobile devices expedite human endeavors in financial transactions over the Virtual Private Network(VPN)backbone.This prominent application of...The rise of the digital economy and the comfort of accessing by way of user mobile devices expedite human endeavors in financial transactions over the Virtual Private Network(VPN)backbone.This prominent application of VPN evades the hurdles involved in physical money exchange.The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server.The security in the cloud authentication server remains vulnerable to the results of threat in JP Morgan Data breach in 2014,Capital One Data Breach in 2019,and manymore cloud server attacks over and over again.These attacks necessitate the demand for a strong framework for authentication to secure from any class of threat.This research paper,propose a framework with a base of EllipticalCurve Cryptography(ECC)to performsecure financial transactions throughVirtual PrivateNetwork(VPN)by implementing strongMulti-Factor Authentication(MFA)using authentication credentials and biometric identity.The research results prove that the proposed model is to be an ideal scheme for real-time implementation.The security analysis reports that the proposed model exhibits high level of security with a minimal response time of 12 s on an average of 1000 users.展开更多
Transactions of Nanjing University of Aeronautics & Astronautics (ISSN 1005-1120) is a comprehensive academic publication focusing on the research achievements in aeronautics, civil aviation, astronautics and thei...Transactions of Nanjing University of Aeronautics & Astronautics (ISSN 1005-1120) is a comprehensive academic publication focusing on the research achievements in aeronautics, civil aviation, astronautics and their theoretical basis. It mainly publishes the papers on advancements in science and technology researches, and significant achievements in展开更多
基金funded by the Deanship of Scientific Research,Vice Presidency for Graduate Studies and Scientific Research,King Faisal University,Saudi Arabia[Grant No.KFU241683].
文摘This paper proposes a novel hybrid fraud detection framework that integrates multi-stage feature selection,unsupervised clustering,and ensemble learning to improve classification performance in financial transaction monitoring systems.The framework is structured into three core layers:(1)feature selection using Recursive Feature Elimination(RFE),Principal Component Analysis(PCA),and Mutual Information(MI)to reduce dimensionality and enhance input relevance;(2)anomaly detection through unsupervised clustering using K-Means,Density-Based Spatial Clustering(DBSCAN),and Hierarchical Clustering to flag suspicious patterns in unlabeled data;and(3)final classification using a voting-based hybrid ensemble of Support Vector Machine(SVM),Random Forest(RF),and Gradient Boosting Classifier(GBC).The experimental evaluation is conducted on a synthetically generated dataset comprising one million financial transactions,with 5% labelled as fraudulent,simulating realistic fraud rates and behavioural features,including transaction time,origin,amount,and geo-location.The proposed model demonstrated a significant improvement over baseline classifiers,achieving an accuracy of 99%,a precision of 99%,a recall of 97%,and an F1-score of 99%.Compared to individual models,it yielded a 9% gain in overall detection accuracy.It reduced the false positive rate to below 3.5%,thereby minimising the operational costs associated with manually reviewing false alerts.The model’s interpretability is enhanced by the integration of Shapley Additive Explanations(SHAP)values for feature importance,supporting transparency and regulatory auditability.These results affirm the practical relevance of the proposed system for deployment in real-time fraud detection scenarios such as credit card transactions,mobile banking,and cross-border payments.The study also highlights future directions,including the deployment of lightweight models and the integration of multimodal data for scalable fraud analytics.
基金co-financed by the European Union Horizon Europe Research and Innovation Programme under Grant Agreements No.101058174 and No 101091895.
文摘Since its inception in 2009,Bitcoin has become and is currently the most successful and widely used cryptocurrency.It introduced blockchain technology,which allows transactions that transfer funds between users to take place online,in an immutable manner.No real-world identities are needed or stored in the blockchain.At the same time,all transactions are publicly available and auditable,making Bitcoin a pseudo-anonymous ledger of transactions.The volume of transactions that are broadcast on a daily basis is considerably large.We propose a set of features that can be extracted from transaction data.Using this,we apply a data processing pipeline to ultimately cluster transactions via a k-means clustering algorithm,according to the transaction properties.Finally,according to these properties,we are able to characterize these clusters and the transactions they include.Our work mainly differentiates from previous studies in that it applies an unsupervised learning method to cluster transactions instead of addresses.Using the novel features we introduce,our work classifies transactions in multiple clusters,while previous studies only attempt binary classification.Results indicate that most transactions fall into a cluster that can be described as common user transactions.Other clusters include transactions made by online exchanges and lending services,those relating to mining activities as well as smaller clusters,one of which contains possibly illicit or fraudulent transactions.We evaluated our results against an online database of addresses that belong to known actors,such as online exchanges,and found that our results generally agree with them,which enhances the validity of our methods.
文摘In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systematic literature review (SLR) explores the current state of distributed transaction management within MSA, focusing on the unique challenges, strategies, and technologies utilized in this domain. By synthesizing findings from 16 primary studies selected based on rigorous criteria, the review identifies key trends and best practices for maintaining data consistency and integrity across microservices. This SLR provides a comprehensive understanding of the complexities associated with distributed transactions in MSA, offering actionable insights and potential research directions for software architects, developers, and researchers.
文摘Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.
文摘Market construction Overview In 2009, the electric power market expanded continuously. New installed capacity put into production within the coverage of the State Grid Corporation
文摘This paper proposes to use the related party transactions’(RPT)budget completion ratio(BCR)as indicator of RPT’s execution quality.This paper studies BCR by defining budget ceiling through RPTs announcement and comparing the amount disclosed in annual report as budget execution result.Through statistical analysis of 285 RPT announcements,we classify RPT’s BCR into four benchmark grades.This paper sums up the BCR of RPT from the samples,and deduces moral obligation and moral judgement curve(OJ curve)in terms of BCR.OJ curve is the real dynamic equilibrium after the struggle agency problems.From our statistical results,we verified that Weitzman’s ratchet effect exists in the budget formulation of RPTs,and it is a solid proof of Weitzman’s ratchet effect applied to real business scenarios.The empirical results show ratchet effect exists in BCR of RPTs before and after the change from GEM board listing to main board listing in Hong Kong(Transfer).This paper also finds that it is significant to find the estimated actual amount in the coming year through the budget completion ratio(BCR)of RPT from last year.This paper is a pioneer to examine the execution quality of RPT by the means of(i)Weitzman’s Truth Inducing Model,(ii)BCR,and(iii)SGR as well as(iv)estimated actual amount.
文摘Transactions of Nanjing University of Aeronautics&Astronautics (TNUAA) is a bimonthly journal facing international academic community. Emphasizing prompt and effective dissemination of key data and new scientific insights, TNUAA offers publication of new experimental and theoretical papers bearing on applications to all branches of aeronautics, astronautics and civil aviation.
文摘Transactions of Nanjing University of Aeronautics & Astronautics (TNUAA) is a bimonthly journal facing international academic community.Emphasizing prompt and effective dissemination of key data and new scientific insights,TNUAA offers publication of new experimental and theoretical papers bearing on applications to all branches of aeronautics,astronautics and civil aviation.
基金the National Natural Science Foundation of China (No. 60533040)the Hi-Tech Research and Development Program (863) of China (Nos. 2007AA010304 and 2007AA01Z129)the Key Scientific and Technological Project of Hangzhou Tech-nology Bureau, China (No. 20062412B01)
文摘In hard real-time systems, schedulability analysis is not only one of the important means of guaranteeing the timelines of embedded software but also one of the fundamental theories of applying other new techniques, such as energy savings and fault tolerance. However, most of the existing schedulability analysis methods assume that schedulers use preemptive scheduling or non-preemptive scheduling. In this paper, we present a schedulability analysis method, i.e., the worst-case hybrid scheduling (WCHS) algorithm, which considers the influence of release jitters of transactions and extends schedulability analysis theory to timing analysis of linear transactions under fixed priority hybrid scheduling. To the best of our knowledge, this method is the first one on timing analysis of linear transactions under hybrid scheduling. An example is employed to demonstrate the use of this method. Experiments show that this method has lower computational complexity while keeping correctness, and that hybrid scheduling has little influence on the average worst-case response time (WCRT), but a negative impact on the schedulability of systems.
文摘Transactions of Tianjin University (ISSN 1006-4982) is an academic journal sponsored by Tianjin University under the administration of Ministry of Education of China. This bimonthly journal mainly publishes novel research articles in natural science and engineering fields, including Chemical Engineering, Materials Science and Engineering, Pharmaceutical Engineering,Civil Engineering, Environmental Science, etc.Contributions within the above scope all over the world are welcome.Transactions of Tianjin University is indexed by Engineering Index (EI), Scopus, Chemical Abstracts (CA), Cambridge Abstract, etc.
文摘The rise of the digital economy and the comfort of accessing by way of user mobile devices expedite human endeavors in financial transactions over the Virtual Private Network(VPN)backbone.This prominent application of VPN evades the hurdles involved in physical money exchange.The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server.The security in the cloud authentication server remains vulnerable to the results of threat in JP Morgan Data breach in 2014,Capital One Data Breach in 2019,and manymore cloud server attacks over and over again.These attacks necessitate the demand for a strong framework for authentication to secure from any class of threat.This research paper,propose a framework with a base of EllipticalCurve Cryptography(ECC)to performsecure financial transactions throughVirtual PrivateNetwork(VPN)by implementing strongMulti-Factor Authentication(MFA)using authentication credentials and biometric identity.The research results prove that the proposed model is to be an ideal scheme for real-time implementation.The security analysis reports that the proposed model exhibits high level of security with a minimal response time of 12 s on an average of 1000 users.
文摘Transactions of Nanjing University of Aeronautics & Astronautics (ISSN 1005-1120) is a comprehensive academic publication focusing on the research achievements in aeronautics, civil aviation, astronautics and their theoretical basis. It mainly publishes the papers on advancements in science and technology researches, and significant achievements in