Financial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which consists of 284,807 transactions performed by European cardholders in 2013 was used in this study. The proposed technique was applied to both the raw dataset and the pre-processed dataset. The performance of these techniques is evaluated based on accuracy, and the fastest time it takes to detect fraud. This paper, proposed a technique that uses SVM, MPSO and MMPSO to form an ensemble for the detection of credit card fraud
Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show MoreHe mentioned in this article the main types of corruption, which are political, moral, financial and administrative. Others may add other types of corruption, such as religious, scientific, media, informational and statistical corruption. At the global level, the focus is largely on financial corruption, although other types of corruption are no less bad than it. Financial corruption can be defined as all financial deviations in violation of general laws or the provisions of regulations, legislation, and procedures regulating the work of the state, private institutions and individuals and applied in state institutions and the private sector in general and inconsistent with the controls and instructions of financial control.
In th
... Show MoreFraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.
The natural ventilation in buildings is one of effective strategies for achieving energy efficiency in buildings by employing methods and ways of passive design, as well as its efficiency in providing high ranges of thermal comfort for occupants in buildings and raises their productivity. Because the concept of natural ventilation for many people confined to achieve through the windows and openings only, become necessary to provide this research to demonstrate the various passive design strategies for natural ventilation. Then, research problem: Insufficient knowledge about the importance and mechanism of the application of passive design strategies for natural ventilation in buildings. The research objective is: Analysis of passive desi
... Show More This paper describes the application of consensus optimization for Wireless Sensor Network (WSN) system. Consensus algorithm is usually conducted within a certain number of iterations for a given graph topology. Nevertheless, the best Number of Iterations (NOI) to reach consensus is varied in accordance with any change in number of nodes or other parameters of . graph topology. As a result, a time consuming trial and error procedure will necessary be applied
to obtain best NOI. The implementation of an intellig ent optimization can effectively help to get the optimal NOI. The performance of the consensus algorithm has considerably been improved by the inclusion of Particle Swarm Optimization (PSO). As a case s
Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa
... Show MoreMWCNTs-OH was used to prepare a flexible gas sensor by deposition as a network on a filter cake using the method of filtration from suspension (FFS). The morphological and structural properties of the MWCNTs network were characterized before and after exposure to Freon gas using FTIR spectra and X-ray diffractometer, which confirmed that the characteristics of the sensor did not change after exposure to the gas. The sensor was exposed to a pure Freon134a gas as well as to a mixture of Freon gas and air with different ratios at room temperature. The experiments showed that the sensor works at room temperature and the sensitivity values increased with increasing operating temperature, to be 58% unt
... Show MoreThere are growing concerns over the possibility of transfer genetically modified
sequences from genetically modified feed component (GM feed) to animals and
their products, moreover, affect these sequences on animal and human health. This
study was implemented to detect P35S in modified feed by using PCR technique by
detecting presence P35S promoter, which responsible for the regulation of gene
expression for most of the transgenic genes. Thirty eight feed samples were
collected from different sources of Baghdad markets, which have been used for
feeding livestock, comprise 21 coarse mixes feed, 13 pelleted feed, and 4 expanded
feed. Genomic DNA was extracted by using two methods, CTAB method and
Wizard kit. In
There are growing concerns over the possibility of transfer genetically modified sequences from genetically modified feed component (GM feed) to animals and their products, moreover, affect these sequences on animal and human health. This study was implemented to detect P35S in modified feed by using PCR technique by detecting presence P35S promoter, which responsible for the regulation of gene expression for most of the transgenic genes. Thirty eight feed samples were collected from different sources of Baghdad markets, which have been used for feeding livestock, comprise 21 coarse mixes feed, 13 pelleted feed, and 4 expanded feed. Genomic DNA was extracted by using two methods, CTAB method and Wizard kit. In order to verify the presenc
... Show MoreData security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm in order to remove these weakness points, Will be generated dynamic substitution box (S-B
... Show More