Preferred Language
Articles
/
jih-2425
Design The Modified Multi Practical Swarm Optimization To Enhance Fraud Detection
...Show More Authors

     Financial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which consists of 284,807 transactions performed by European cardholders in 2013 was used in this study. The proposed technique was applied to both the raw dataset and the pre-processed dataset. The performance of these techniques is evaluated based on accuracy, and the fastest time it takes to detect fraud. This paper, proposed a technique that uses SVM, MPSO and MMPSO to form an ensemble for the detection of credit card fraud

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 02 2012
Journal Name
Journal Of Planner And Development
the planning and design characteristics of Iraqs mud building and settlement
...Show More Authors

The Mesopotamian soil is muddy and fertile, and so from ancient eras Iraqis used mud in their building, settlements and architecture in different methodologies according to the nature and the function of the building that was either in its pure form or by mixing it with other materials such as straw . also as raw bricks in different ways either for the whale building or parts of it, or for the finishing parts such as roofing for instance. In this research these different forms and methodologies will permeate through out a chosen examples of historical building, rural buildings and settlements and ancient buildings as well as some current uses of mud in the structures and building in standing cities, this in order to conclude some

... Show More
View Publication
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Network Self-Fault Management Based on Multi-Intelligent Agents and Windows Management Instrumentation (WMI)
...Show More Authors

This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jun 28 2023
Journal Name
The Iraqi Journal Of Veterinary Medicine
Haemoglobin Epsilon as a Biomarker for the Molecular Detection of Canine ‎Lymphoma
...Show More Authors

Lymphoma is a cancer arising from B or T lymphocytes that are central immune system ‎components. It is one of the three most common cancers encountered in the canine; ‎lymphoma affects middle-aged to older dogs and usually stems from lymphatic tissues, ‎such as lymph nodes, lymphoid tissue, or spleen. Despite the advance in the management of ‎canine lymphoma, a better understanding of the subtype and tumor aggressiveness is still ‎crucial for improved clinical diagnosis to differentiate malignancy from hyperplastic ‎conditions and to improve decision-making around treating and what treatment type to use. ‎This study aimed to evaluate a potential novel biomarker related to iron metabolism,

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Mar 14 2019
Journal Name
Al-khwarizmi Engineering Journal
Sculptured Surface Design and Implementation by Lofting Design Method Using Cross-sectional B-Spline Curves
...Show More Authors

This research presents a particular designing strategy for a free form of surfaces, constructed by the lofting design method. The regarded surfaces were created by sliding a B-spline curves (profile curves), in addition to describing an automatic procedure for selective identification of sampling points in reverse engineering applications using Coordinate Measurement Machine. Two models have been implemented from (Ureol material) to represent the different cases of B-spline types to clarify its scope of application. The interior data of the desired surfaces was designed by MATLAB software, which then were transformed to UG-NX9 software for connecting the sections that were designed in MATLAB program and obtaining G-code programs for the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Analytic Solutions For Integro-Differential Inequalities Using Modified Adomian Decomposition Method
...Show More Authors

   This paper applies the Modified Adomian Decomposition Method (MADM) for solving Integro-Differential Inequality, this method  is one of effective to construct analytic approximate solutions for linear and nonlinear integro-differential inequalities without solving many integrals and transformed or discretization. Several examples are presented, the analytic results show that this method is a promising and powerful for solving these problems.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Mar 09 2017
Journal Name
University Of Baghdad
Synthesis of modified Graphene Oxide and its application as Electrochemical Sensor
...Show More Authors

This study involved preparation of Graphene oxide (GO) and reduced graphene oxide (RGO) using Hummer method and chemical method respectively. These carbon nanomaterials were used as starting material to make novel functionalize with thiocarbohydrazide (TCH) which was prepared by reacting CS2 with hydrazine to form GO or RGO- 4-amino,5-substituted 1H,1,2,4 Triazole 5(4H) thion (ASTT) ,(GOT) and( RGOT) respectively via cyclocondensation reaction. Also MnO2 nanorod was prepared to form hybridized with GOT and RGOT. A commercial multiwall carbon nanotube (MWCNT) and functionalization with carboxylic groups' (f-MWCNT) and its nanocomposite with GOT were also prepared. All carbon nanomaterials were characterized with different techniques such as

... Show More
Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Global Pharma Technology
Modified ZnO for efficient photo-catalysis by Silver/Graphite oxide nanoparticles
...Show More Authors

Scopus (4)
Scopus
Publication Date
Thu Mar 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Adsorption of Anionic Dye from Equeous Solution by Modified Synthetic Zeolite
...Show More Authors

        The adsorption of Congo red (CR) dye on modified synthetic zeolite 5A  , the general name of which is Linde Type A (LTA)which is modified by amino mercepto thiadiazole (AMT)  and have been characterized  by using fourier transform infrared (FT-IR) , x-ray diffraction (XRD) spectroscopies, atomic force microscopy (AFM) and scanning electron microscope (SEM) analysis.In this work Modified zeolite was utilized as adsorbent to remove (CR) dye from aqueous solution by adsorption. Batch experiments were conducted to study the effects contact time , initial concentration of adsorbate and temperature on dye adsorption. The equilibrium adsorption data were analyzed by using several isotherm models ( Freu

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Applying A* Path Planning Algorithm Based on Modified C-Space Analysis
...Show More Authors

In this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons

... Show More
View Publication Preview PDF
Crossref (4)
Crossref