Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, concept drift, and verification latency problems using machine learning and deep learning. It also provides valuable information for academic and industrial researchers and opens new avenues for research aimed at developing robust fraud detection systems.
Computer analysis of simple eye model is performed in the present work by using the Zemax optical design software 2000E . The most important optical parameters of the eye were calculated such as the effective focal length (EFL) , the image spot size at the retina and found to be in a reasonable agreement with the values needed for the laser retinal treatment .The present eye model leads to an effective wavelength and we found the image spot diagram at the surface of the retina and the wavefront error which are provided at zero field angle. This gives a good evidence of the validity of the model in one hand, and can be used to determine the compatibility of any optical design intended for visual applications. By using the pulse fre
... Show MoreIn this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.
Nowadays, it is convenient for us to use a search engine to get our needed information. But sometimes it will misunderstand the information because of the different media reports. The Recommender System (RS) is popular to use for every business since it can provide information for users that will attract more revenues for companies. But also, sometimes the system will recommend unneeded information for users. Because of this, this paper provided an architecture of a recommender system that could base on user-oriented preference. This system is called UOP-RS. To make the UOP-RS significantly, this paper focused on movie theatre information and collect the movie database from the IMDb website that provides informatio
... Show MoreThe aim of this paper is to translate the basic properties of the classical complete normed algebra to the complete fuzzy normed algebra at this end a proof of multiplication fuzzy continuous is given. Also a proof of every fuzzy normed algebra without identity can be embedded into fuzzy normed algebra with identity and is an ideal in is given. Moreover the proof of the resolvent set of a non zero element in complete fuzzy normed space is equal to the set of complex numbers is given. Finally basic properties of the resolvent space of a complete fuzzy normed algebra is given.
The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreAmeloblastic carcinoma is a rare malignant odontogenic tumor that is further classified into being primary or secondary arising from a preexisting benign ameloblastoma. It affects the mandible in two thirds of the patients. there is no standard treatment protocol for this lesion but radical surgical excision with or without radiotherapy is reported in the majority of cases. In this paper we present a case of a 60 year old female diagnosed with ameloblastic carcinoma of the mandible that was treated by radical resection of the mandible with selective neck dissection and postoperative radiotherapy.
A sample of 168 tonsillitic subjects (93 males and 75 females), livin g in Baghdad was evaluated microbiologically. The patients had an age range of 3-35 years. Four bacterial species were isolated and identified. They were P-haemolyt ic Streptococcus ,(39.3%) Staphylococcus
... Show MoreIt is axiomatic that languages mirror the world view of their users. Manipulating honorific forms among people inevitably reflects this truth . Honorifics are conventionalized forms or expressions manifested in all the world's languages and are used to express the social status of the participants in the verbal interaction and to convey indications like politeness and respect . English is no exception. However the question is what exactly creates these forms and their meanings. Although honorifics have been extensively researched from a grammatical and semantic angle , yet they haven’t received that significant attention i
... Show MoreIn this paper a nonlinear adaptive control method is presented for a pH process, which is difficult to control due to the nonlinear and uncertainties. A theoretical and experimental investigation was conducted of the dynamic behavior of neutralization process in a continuous stirred tank reactor (CSTR). The process control was implemented using different control strategies, velocity form of PI control and nonlinear adaptive control. Through simulation studies it has been shown that the estimated parameters are in good agreement with the actual values and that the proposed adaptive controller has excellent tracking and regulation performance.
In this paper it was designed a new fractal optical modulation by using a new iteration of fractal function, the result was analyzed by MTF evaluation, and it compared with results of normal optical modulation.
The normal and fractal optical modulator is a circular disc which has a radius R=9cm, both of them consist of twenty sectors, ten sectors are opaque and the other ten sectors are transmitted for the light.
The fractal optical modulator contains two patterns, the pattern two can be used to detect the target, and pattern one can be used to lock the target
The best similarity of MTF behavior for normal and fractal Reticle was evaluating the power transparent depends on the size o
... Show More