Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, concept drift, and verification latency problems using machine learning and deep learning. It also provides valuable information for academic and industrial researchers and opens new avenues for research aimed at developing robust fraud detection systems.
The current theoretical research targeted to construct a model of terrorist personality and its differentiation from psychopathic personality . Several assumptions or theories of perspectives of psychopathic personality have been compared with the terrorist personality studies that concerned . The suggested theoretical model is interrupting the terrorist personality . The conclusions , discussions are mentioned. Finally, recommendation is suggested .
Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show MoreThe research dealt with a topic that has been practiced and transmitted news in satellite channels in recent years a lot. That is to say the role of satellite channels in the culture of a protest. In general, this study aims to reach to know the extent of the impact of television, especially the impact of the programs that bear the contents of protest and remonstration on the public; and what can be resulted out of these programs as cognitive, emotional and behavioral effects as a result of the individual's exposure to these programs and their impact from the culture of pretense. In addition to that, the research was interested in explaining the role of Iraqi satellite channels in developing and cultivating such culture; and following up
... Show MoreMusic and singing are always associated with the movement of society and the emergence of cultural and artistic activities other.
The social and political transformations of the 1930s helped to disseminate the study Music and music in the city of Baghdad and across Iraq This is the beginning of a new era of musical art alongside other arts.
While achieving musical arts A new step was advanced by publishing a technical study among the younger generation they were looking for to contribute to the musical field On the other hand, the city of Baghdad during the period of research many musical and musical performances Egyptian teams have provided many artistic activities and events which have had a significant impact on the development
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MorePiezoelectric structures are nowadays used in many different applications. A better understanding of the influence of material properties and geometrical design on the performance of these structures helps to develop piezoelectric structures specifically designed for their application. Different equivalent circuits have been introduced in the literature to investigate the behaviour of piezoelectric transducers. The model parameters are usually determined from measurements covering the characteristic frequencies of the piezoelectric transducer. This article introduces an analytical technique for calculating the mechanical and electrical equivalent system parameters and characteristic frequencies based on material properties and geom
... Show MoreIn recent years the interest in fractured reservoirs has grown. The awareness has increased analysis of the role played by fractures in petroleum reservoir production and recovery. Since most Iraqi reservoirs are fractured carbonate rocks. Much effort was devoted to well modeling of fractured reservoirs and the impacts on production. However, turning that modeling into field development decisions goes through reservoir simulation. Therefore accurate modeling is required for more viable economic decision. Iraqi mature field being used as our case study. The key point for developing the mature field is approving the reservoir model that going to be used for future predictions. This can
Let R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative