Financial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which consists of 284,807 transactions performed by European cardholders in 2013 was used in this study. The proposed technique was applied to both the raw dataset and the pre-processed dataset. The performance of these techniques is evaluated based on accuracy, and the fastest time it takes to detect fraud. This paper, proposed a technique that uses SVM, MPSO and MMPSO to form an ensemble for the detection of credit card fraud
HM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023
A total of 200 clinical samples included Burns and Wounds infections were collected from Baghdad Governorate. Results showed that rate all isolates of P. mirabilis was 31(15.5%) and rate of Burns infections was 14 (45%) and rate of wounds infection 17 (55%). Where was diagnostic based on conventional biochemical tests and confirmed by the Vitek-2 Compact system and the specific primer of the16SrRNA gene, the ability of bacterial isolates to biofilm formation to be studied. It's considered an important virulence factor in Incidence of diseases and play important role in increasing resistance to antibiotic of encased bacteria, by two methods Congo Red Agar method and Microtiter Plate method. The Congo Red Agar method showed that most isolates
... Show MoreThe lossy-FDNR based aclive fil ter has an important property among many design realizations. 'This includes a significant reduction in component count particularly in the number of OP-AMP which consumes power. However the· problem of this type is the large component spreads which affect the fdter performance.
In this paper Genetic Algorithm is applied to minimize the component spread (capacitance and resistance p,read). The minimization of these spreads allow the fil
... Show MoreThis work is focused on the design parameters and activity of artificial human finger for seven grips. At first, obtained the ideal kinematics of human fingers motion by analyzing the grips video which were recorded using a single digital camera recorder fitted on a tripod in sagital plane while the hand is moving. Special motion analysis software (Dartfish) the finger joint angles were studied using the video recording. Then the seven grips were modeled using static torque analysis, which calculates the amount of torque applied on the fingers joint grip depending on the results of the kinematic analysis. The last step of the work was to design the actuator (Muscle Wire) of artificial finger for the seven grips in a simple design approac
... Show MoreAn indoor spraying robot is built in this research to solve numerous challenges associated with manual spraying. The mechanical, hardware and essential technologies used are all detailed and designed. The proposed spraying robot's conceptual design is split into two parts: hardware and software. The mechanical design, manufacturing, electrical, and electronics systems are described in the hardware part, while the control of the robot is described in the software section. This robot's kinematic and dynamic models were developed using three links that move in the x, y, and z directions. The robot was then designed using SolidWorks software to compute each connection's deflection and maximum stresses. The characteristics of the stepper moto
... Show MoreThere is a variety of artificial foot designs variable for use with prosthetic legs . Most of the design can be divided into two classes, articulated and non-articulated feet. one common non-articulated foot is the SACH . The solid ankle cushion heel foot referred to as the SACH foot has a rigid keel .
One key or the key factor in designing a new prosthesis is in the analysis of a patients response .
This view is the most important because if the foot does not provide functional , practical or cosmetically acceptable characteristics the patient will not feel comfortable with the prosthesis , therefore design and manufacturing a new foot is essential, this foot made from polyethylene, its different shape and characte
... Show MoreThe design of future will still be the most confusing and puzzling issue and misgivings that arouse worry and leading to the spirit of adventures to make progress and arrive at the ways of reviving, creativity and modernism. The idea of prevailing of a certain culture or certain product in design depends on the given and available techniques, due to the fact that the computer and their artistic techniques become very important and vital to reinforce the image in the design. Thus, it is very necessary to link between these techniques and suitable way to reform the mentality by which the design will be reformed, from what has been said, (there has no utilization for the whole modern and available graphic techniques in the design proce
... Show MoreAddresses current research to the subject of metaphor as a field important in the design of industrial product, so it was a problem search: Does industrial product which is designed mainly to reflect the principle of metaphor role in receiving, and how the application of mechanisms theory correct as stipulated in institutions metaphor properly for this orientation in achieving those metaphors. What are the relations of reciprocity that influenced the establishment of the design and construction of the system for industrial product, the objectives of the research were standing on the interactive nature of the relations between the metaphor and the process of industrial product design? And identify strengths and weaknesses in the processes
... Show MoreVariable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio
In this paper it was designed a new fractal optical modulation by using a new iteration of fractal function, the result was analyzed by MTF evaluation, and it compared with results of normal optical modulation.
The normal and fractal optical modulator is a circular disc which has a radius R=9cm, both of them consist of twenty sectors, ten sectors are opaque and the other ten sectors are transmitted for the light.
The fractal optical modulator contains two patterns, the pattern two can be used to detect the target, and pattern one can be used to lock the target
The best similarity of MTF behavior for normal and fractal Reticle was evaluating the power transparent depends on the size o
... Show More