Preferred Language
Articles
/
yBdqOI8BVTCNdQwCSWP6
Credit Card Fraud Detection Challenges and Solutions: A Review
...Show More Authors

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, concept drift, and verification latency problems using machine learning and deep learning. It also provides valuable information for academic and industrial researchers and opens new avenues for research aimed at developing robust fraud detection systems.

Scopus Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Land Magnetic survey along a profile from Akaz to Rutba town and its applications
...Show More Authors

A land magnetic survey was carried out along regional profile, which is located at the north part of the Iraqi western desert. It starts from al –Qaam City (at north) toward Rutba City (at south) with a total length of 238km. The survey was carried out along the paved road between the two cities, About 113 measuring points were done with inter-station distance of 2 km (for 198 km) and 2 to 5km (for 40km). Two proton magnetometers were used in this survey. One of them is used for base station monitoring, which was fixed as of Salah Aldin field (Akkas). Its readings were used for diurnal corrections. All magnetic measurements were corrected for normal and topographic corrections. The readings were reduced to a certain base level. The resu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
A Study of structural and electrical properties ofCuIn (Sex Te1-x) 2 thin films
...Show More Authors

structural and electrical of CuIn (Sex Te1-x)2

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Engineering
Parameters Affecting the Strength and Behavior of RC Dapped-End Beams: A Numerical Study
...Show More Authors

The finite element method has been used in this paper to investigate the behavior of precast reinforced concrete dapped-ends beams (DEBs) numerically. A parametric investigation was performed on an experimental specimen tested by a previous researcher to show the effect of numerous parameters on the strength and behavior of RC dapped-end beams. Reinforcement details and steel arrangement, the influence of concrete compressive strength, the effect of inclined load, and the effect of support settlement on the strength of dapped-ends beams are examples of such parameters. The results revealed that the dapped-end reinforcement arrangement greatly affects the behavior of dapped end beam. The failure load decreases by 25% when

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 05 2003
Journal Name
. Sc. Conf. Of The College 5th Of Eng. Univ. Of Baghdad 2003
COMPUTATIONAL AND EXPERIMENTAL INVESTIGATION OF THE AERODYNAMIC CHARACTERISTICS FOR A FORWARD SWEPT WING AIRCRAFT
...Show More Authors

The aerodynamic characteristics of the forward swept wing aircraft have been studied theoretically and experimentally. Low order panel method with the Dirichlet boundary condition have been used to solve the case of the steady, inviscid and compressible flow. Experimentally, a model was manufactured from wood to carry out the tests. The primary objective of the experimental work was the measurements of the wake dimensions and orientation, velocity defect along the wake and the wake thickness. A blower type low speed (open jet) wind tunnel was used in the experimental work. The mean velocity at the test section was (9.3 m/s) and the Reynolds number based on the mean aerodynamic chord and the mean velocity was (0.46x105). The measurements sho

... Show More
View Publication
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
The other day in the Holy Quran and the four Gospels: A comparative study
...Show More Authors

The other day in the Holy Quran and the four Gospels

View Publication Preview PDF
Publication Date
Fri Mar 01 2013
Journal Name
Zanco Journal Of Medical Sciences
Epidemiology of viral hepatitis B and C in Iraq: a national survey 2005-2006
...Show More Authors

Background and objective: Viral Hepatitis Type B&C is serious public health challenge throughout the world.Hepatitis B and C viruses still remain to be the major causes of chronic hepatitis.It is estimated that around 350-400 million people in the world are chronic carriers of HBV, which represents approximately 7% of the total populationwhereas infection with HCV is found in approximately 3% of the world population, which represents 160 million people. Hepatitis B infection has a wide range of seroprevalence in the Mediterranean countries ranging from intermediate (=>2% ) to high prevalence ( =>7%). World Health Organization estimated a prevalence rate for HCV infection of about 4.6% in Eastern Mediterranean in 1999. During the eightieths

... Show More
View Publication
Crossref (18)
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
A study of the Effect of Air Inlet and Exit on Indoor Air Movement
...Show More Authors

This work consists of a numerical simulation to predict the velocity and temperature distributions, and an experimental work to visualize the air flow in a room model. The numerical work is based on non-isothermal, incompressible, three dimensional, k turbulence model, and solved using a computational fluid dynamic (CFD) approach, involving finite volume technique to solve continuity, momentum and energy equations, that governs the room’s turbulent flow domain. The experimental study was performed using (1/5) scaled room model of the actual dimensions of the room to simulate room air flow and visualize the flow pattern using smoke generated  from burnt herbs and collected in a smoke generator to delivered through

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Safety Science
Perceived management commitment and psychological empowerment: A study of intensive care unit nurses’ safety
...Show More Authors

View Publication
Scopus (42)
Crossref (36)
Scopus Clarivate Crossref