Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, concept drift, and verification latency problems using machine learning and deep learning. It also provides valuable information for academic and industrial researchers and opens new avenues for research aimed at developing robust fraud detection systems.
Clinical keratoconus (KCN) detection is a challenging and time-consuming task. In the diagnosis process, ophthalmologists must revise demographic and clinical ophthalmic examinations. The latter include slit-lamb, corneal topographic maps, and Pentacam indices (PI). We propose an Ensemble of Deep Transfer Learning (EDTL) based on corneal topographic maps. We consider four pretrained networks, SqueezeNet (SqN), AlexNet (AN), ShuffleNet (SfN), and MobileNet-v2 (MN), and fine-tune them on a dataset of KCN and normal cases, each including four topographic maps. We also consider a PI classifier. Then, our EDTL method combines the output probabilities of each of the five classifiers to obtain a decision b
Chest X-rays have long been used to diagnose pneumothorax. In trauma patients, chest ultrasonography combined with chest CT may be a safer, faster, and more accurate approach. This could lead to better and quicker management of traumatic pneumothorax, as well as enhanced patient safety and clinical results.
The purpose of this study was to assess the efficacy and utility of bedside US chest in identifying traumatic pneumothorax and also its capacity to estimate the extent of the lesion in comparison to the gold standard modality chest computed tomography.
The present study is an attempt for detection of A. baumannii by conventional and PCR methods using species-specific primers for these A. baumannii. A total of 87 samples were collected from hospitals in Baghdad (Al-Rasafa and Al-Karkh Hospitals) during the period from 2019 to 2020.The samples included: 40 specimens, from wounds, respiratory infections (sputum), burns, CSF and 47 samples from the hospital environment (swabs), while samples collected from intensive care unit including patient beds, surgical instruments and appliances, emergency lobby and baby incubators. A. baumannii isolate identification depending on the morphologic characteristics on the culture media including, blood agar, MacConkey agar, as well as t
... Show MoreWildfire risk has globally increased during the past few years due to several factors. An efficient and fast response to wildfires is extremely important to reduce the damaging effect on humans and wildlife. This work introduces a methodology for designing an efficient machine learning system to detect wildfires using satellite imagery. A convolutional neural network (CNN) model is optimized to reduce the required computational resources. Due to the limitations of images containing fire and seasonal variations, an image augmentation process is used to develop adequate training samples for the change in the forest’s visual features and the seasonal wind direction at the study area during the fire season. The selected CNN model (Mob
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MorePersistence of antibiotics in the aquatic environment has raised concerns regarding their potential influence on potable water quality and human health. This study analyzes the presence of antibiotics in potable water from two treatment plants in Baghdad City. The collected samples were separated using a solid-phase extraction method with hydrophilic-lipophilic balance (HLB) cartridge before being analyzed. The detected antibiotics in the raw and finished drinking water were analyzed and assessed using high-performance liquid chromatography (HPLC), with fluorometric detector and UV detector. The results confirmed that different antibiotics including fluoroquinolones and
Background: One of the drawbacks of vital teeth bleaching is color stability. The aim of the present study was to evaluate the effects of tea and tomato sauce on the color stability of bleached enamel in association with the application of MI Paste Plus (CPP-ACPF). Materials and Methods: Sixty enamel samples were bleached with 10% carbamide peroxide for two weeks then divided into three groups (A, B and C) of 20 samples each. After bleaching, the samples of each group were subdivided into two subgroups (n=10). While subgroups A1, B1 and C1 were kept in distilled water, A2, B2, and C2 were treated with MI Paste Plus. Then, the samples were immersed in different solutions as follow: A1 and A2 in distilled water (control); B1 and B2 in black
... Show MoreThe leaves of globe artichoke, Cynara scolymus Family Asteraceae/ compositea have long – used in traditional medicine and now included in British and European Pharmacopeia, the British Harbal Pharmacopeia and complete German Commission E monographs.The plant originally comes from Mediterranean region and North Africa and cultivated around the world. The flowers are used worldwide for nutrition purposes and the leaves for medical purposes including hepatic affections. The plant wildly distributed in Iraq in the watery lines and boundary of the field.The plant contains many phytochemicals such as the bitter phenolic acids whose choleretic and hypocholestremic as these compounds are antioxidant. Other materials to h
... Show More