Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreEffective decision-making process is the basis for successfully solving any engineering problem. Many decisions taken in the construction projects differ in their nature due to the complex nature of the construction projects. One of the most crucial decisions that might result in numerous issues over the course of a construction project is the selection of the contractor. This study aims to use the ordinal priority approach (OPA) for the contractor selection process in the construction industry. The proposed model involves two computer programs; the first of these will be used to evaluate the decision-makers/experts in the construction projects, while the second will be used to formul
In this review of literature, the light will be concentrated on the role of stem cells as an approach in periodontal regeneration.
the contemporary Arab scholars deal with semiotics as an approach that helps them understand the texts, its meaning, and its structural functionalism . that’s why every now and then we find some
studies and researches using semiotics as an approach in study and comparatives, some of them even used the semiotic approach in analyzing old and new texts, while others think that semiotic holds and important place in critical approaches .
even though some of them considers semiotic just a trend of fashion this really didn’t lessen the value of semiotic as a scientific and procedural approach in literary and media studies as well as in analyzing literary and journalistic texts. for this reason it is considered as an important approa
<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency
... Show MoreThe bubbled slab, a type of reinforced concrete (RC) slab with plastic voids, is an innovative design that employs a biaxial distribution of voiding formers within the slab to reduce the slab’s self-weight while preserving a load-carrying capacity that is approximately comparable to that of solid slabs. This paper presents a new approach for figuring out the effective critical shear perimeter of voided slabs using the reduced-volume concept of concrete. This approach aims to reduce the coefficient of variation of the current design standards, namely the ACI 318-19 and Eurocode 2, for assessing the slabs’ resistance to punching shear. Our experimental program investigated the impact of voiding former patterns and the location of
... Show MoreThe historical center's landscape suffers from neglect, despite their importance and broad capabilities in enhancing the cultural value of the historical center, as landscape includes many heterogeneous human and non-human components, material and immaterial, natural and manufactured, also different historical layers, ancient, modern and contemporary. Due to the difference in these components and layers, it has become difficult for the designer to deal with it. Therefore, the research was directed by following a methodology of actor-network theory as it deals with such a complex system and concerned with an advanced method to connect the various components of considering landscape as a ground that can include various elements and deal wi
... Show More