Preferred Language
Articles
/
yBdqOI8BVTCNdQwCSWP6
Credit Card Fraud Detection Challenges and Solutions: A Review
...Show More Authors

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, concept drift, and verification latency problems using machine learning and deep learning. It also provides valuable information for academic and industrial researchers and opens new avenues for research aimed at developing robust fraud detection systems.

Scopus Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Vein Biometric Recognition Methods and Systems: A Review
...Show More Authors

View Publication
Scopus (16)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review
...Show More Authors

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Biotechnology Research Center
Candida and Candidiasis - A review of Virulence Factors
...Show More Authors

   The occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. I

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Employment and Societal Changes in Iraq Challenges and Policies
...Show More Authors

This study attempts to focus on there lation ship between employment policies andsocietal changesinIraq.Theconstruction ofoperational policyincommunitiesin crisis remains fraught with challenges and risks, especially in countries that have longoutstanding conflict sand crises, it is important in this context to achieve those policy and build the foundations of human security and poverty alleviation, unemployment, to find effective ways to help the community to achieve stability and reduce the risk of renew edorrepeat the cycleofviolence-butthatwouldrequirearadicalrethinking, including rethinking the way evaluating therisksandchallengesand management.And thatsuchaprojectshouldbe based ona clear roadmap, andthevisionsofdevelopmentanda clea

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 31 2025
Journal Name
Passer Journal Of Basic And Applied Sciences
Enhanced Security Taxonomy for Fog-Enabled VANETs: A Comprehensive Survey on Attacks, Challenges, Applications and Architectures
...Show More Authors

Vehicular Ad Hoc Networks (VANETs) are integral to Intelligent Transportation Systems (ITS), enabling real-time communication between vehicles and infrastructure to enhance traffic flow, road safety, and passenger experience. However, the open and dynamic nature of VANETs presents significant privacy and security challenges, including data eavesdropping, message manipulation, and unauthorized access. This study addresses these concerns by leveraging advancements in Fog Computing (FC), which offers lowlatency, distributed data processing near-end devices to enhance the resilience and security of VANET communications. The paper comprehensively analyzes the security frameworks for fog-enabled VANETs, introducing a novel taxonomy that c

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
2019 International Conference On Electrical Engineering And Informatics (iceei)
Health Information Exchange: Current Trends, Challenges and Recommendations
...Show More Authors

View Publication
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Pathology - Research And Practice
Artificial intelligence in cancer diagnosis: Opportunities and challenges
...Show More Authors

View Publication
Scopus (56)
Crossref (58)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
On Blow-up Solutions of A Parabolic System Coupled in Both Equations and Boundary Conditions
...Show More Authors

This paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jul 08 2017
Journal Name
Neural Computing And Applications
A new algorithm of modified binary particle swarm optimization based on the Gustafson-Kessel for credit risk assessment
...Show More Authors

View Publication
Scopus (35)
Crossref (34)
Scopus Clarivate Crossref