Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, concept drift, and verification latency problems using machine learning and deep learning. It also provides valuable information for academic and industrial researchers and opens new avenues for research aimed at developing robust fraud detection systems.
A total of nine swab samples were collected from inflamed teeth and gingiva of human’soral cavity from a dentist clinic in Baghdad. All specimens were cultured in Mitis Salivarius agar medium and the isolated bacterial pure colonies werethen identified by using VITEK2. Three samples were diagnosed and identified as Staphylococcus lentus. One of the three isolates which showed a distinctive heavy growth on the media was selected for further analysis in this study. Paper disk diffusion method was used to detect the antibacterial activityof three of mouthwash solutions (Zak, Colgate and Listerine). The results showed that “Colgate†was the most active solution with antibacterial activity compared with the other two s
... Show MoreThe current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a number of
... Show MoreThe current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a numbe
... Show MoreBecause of their Physico‐chemical characteristics and its composition, the development of new specific analytical methodologies to determine some highly polar pesticides are required. The reported methods demand long analysis time, expensive instruments and prior extraction of pesticide for detection. The current work presents a new flow injection analysis method combined with indirect photometric detection for the determination of Fosetyl‐Aluminum (Fosetyl‐Al) in commercial formulations, with rapid and highly accurate determination involving only construction of manifold system combined with photometric detector without need some of the pre‐treatments to the sample before the analysis such a
Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate
... Show MoreIraq has confronted a huge political transformations after 2003 which resembled and presented rapid changes from totalitarian regime into democracy's system , this phenomenon has become a feature embodied in a new political system, specifically is being a price for previous deprivation and despotism .So that, the nature of political work has been changed as a result of practicing new democratic values ,but the real challenges appeared by depending on the conformity and political compromise in dealing with all of crises and problems in the political life .
The future of political work in this nascent democracy could be prepared according to fulfillment an active doings values stretched on national unity and forgiveness from one side ,t
Documentary Credit passes through many practical phases starting from Opening credit and matching documents and payment of the amount of credit……etc. It is worthy to mention that there are several aspects that are varied and differed from Bank to another one which can offer Competitive Advantage for the bank …This will be shown in this research.
For the purpose of achieving the objective of this research within the theoretical aspect, the researcher had seen and briefed several books and researches which are mainly related to the subject of the research.
As for the practical aspect, has included Questionnaire which included many questions that are fit and suitable to the hypotheses.
Research sample has
... Show MoreSurge pressure is supplemental pressure because of the movement of the pipes downward and the swab pressure is the pressure reduction as a result of the drill string's upward movement. Bottom hole pressure is reduced because of swabbing influence. An Investigation showed that the surge pressure has great importance for the circulation loss problem produced by unstable processes in the management pressure drilling (MPD) actions. Through Trip Margin there is an increase in the hydrostatic pressure of mud that compensates for the reduction of bottom pressure due to stop pumping and/or swabbing effect while pulling the pipe out of the hole. This overview shows suggested mathematical/numerical models for simulating surge pressure problems ins
... Show MoreQuantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat
... Show More