Financial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which consists of 284,807 transactions performed by European cardholders in 2013 was used in this study. The proposed technique was applied to both the raw dataset and the pre-processed dataset. The performance of these techniques is evaluated based on accuracy, and the fastest time it takes to detect fraud. This paper, proposed a technique that uses SVM, MPSO and MMPSO to form an ensemble for the detection of credit card fraud
Human action recognition has gained popularity because of its wide applicability, such as in patient monitoring systems, surveillance systems, and a wide diversity of systems that contain interactions between people and electrical devices, including human computer interfaces. The proposed method includes sequential stages of object segmentation, feature extraction, action detection and then action recognition. Effective results of human actions using different features of unconstrained videos was a challenging task due to camera motion, cluttered background, occlusions, complexity of human movements, and variety of same actions performed by distinct subjects. Thus, the proposed method overcomes such problems by using the fusion of featur
... Show MoreSkin cancer is the most serious health problems in the globe because of its high occurrence compared to other types of cancer. Melanoma and non-melanoma are the two most common kinds of skin cancer. One of the most difficult problems in medical image processing is the automatic detection of skin cancer. Skin melanoma is classified as either benign or malignant based on the results of this test. Impediment due to artifacts in dermoscopic images impacts the analytic activity and decreases the precision level. In this research work, an automatic technique including segmentation and classification is proposed. Initially, pre-processing technique called DullRazor tool is used for hair removal process and semi-supervised mean-shift
... Show MoreIn computer vision, visual object tracking is a significant task for monitoring
applications. Tracking of object type is a matching trouble. In object tracking, one
main difficulty is to select features and build models which are convenient for
distinguishing and tracing the target. The suggested system for continuous features
descriptor and matching in video has three steps. Firstly, apply wavelet transform on
image using Haar filter. Secondly interest points were detected from wavelet image
using features from accelerated segment test (FAST) corner detection. Thirdly those
points were descripted using Speeded Up Robust Features (SURF). The algorithm
of Speeded Up Robust Features (SURF) has been employed and impl
This work is divided into two parts first part study electronic structure and vibration properties of the Iobenguane material that is used in CT scan imaging. Iobenguane, or MIBG, is an aralkylguanidine analog of the adrenergic neurotransmitter norepinephrine and a radiopharmaceutical. It acts as a blocking agent for adrenergic neurons. When radiolabeled, it can be used in nuclear medicinal diagnostic techniques as well as in neuroendocrine antineoplastic treatments. The aim of this work is to provide general information about Iobenguane that can be used to obtain results to diagnose the diseases. The second part study image processing techniques, the CT scan image is transformed to frequency domain using the LWT. Two methods of contrast
... Show MoreThe presence of natural voids and fractures (weak zones) in subsurface gypsiferous soil and gypsum, within the University of Al-Anbar, western Iraq. It causes a harsher problem for civil engineering projects. Electrical resistivity technique is applied as an economic decipher for investigation underground weak zones. The inverse models of the Dipole-dipole and Pole-dipole arrays with aspacing of 2 m and an n-factor of 6 clearly show that the resistivity contrast between the anomalous part of the weak zone and the background. The maximum thickness and shape are well defined from 2D imaging with Dipole-dipole array, the maximum thickness ranges between 9.5 to 11.5 m. It is concluded that the 2D imaging survey is a useful technique and more
... Show MoreEnsuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac
... Show MoreInternet technology has revolutionized the landscape of communication technologies in the modern era. However, because the internet is open to the public, communication security cannot be guaranteed. As a result, data concealment approaches have been developed to ensure confidential information sharing. Various methods have emerged to achieve the goal of secure data communication via multimedia documents. This study proposes a method, which is both adaptable and imperceptible, for concealing a secret text in a color image. From an adaptivity perspective, image corners are detected using the Harris corner detection algorithm and utilized as anchor points for picking the optimal hiding regions of interest using Bezier curve interp
... Show MoreIn this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
The main aim of this paper is to explain the effect of the aggregation accounting information on the financial, investment, and operational, managerial decision-making and the evaluation of the financial statements after aggregate. The problem of this study is represented in administrative decision-making that takes place under differentiated accounting systems operating within a governmental economic unit that seeks at the same time to achieve a unified vision and goals for the organization. This study was conducted at the College of Administration and Economics /University of Baghdad, and it represents a sample from a community of governmental economic units that apply differentiated accounting systems. The study method is repr
... Show MoreThis study examined the relationship between the reporting lag (the timeliness of corporate financial reporting) and several independent variables: (1) Audit reporting lag,(2)Company Size,(3) Profitability of the company,(4)Company Age,(5) Sector Type.(6)Audit’s Opinion,(7) Market Type,(8) Gearing,(9) Concentration of ownership,(10) Audit Firm Size(11)Profit or Loss Company(12) Companies Listed lag on the PEX. In order to achieve the objectives of the study and testing its hypotheses, the data Obtained through actual data of a financial reports, and based on me
... Show More