Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, concept drift, and verification latency problems using machine learning and deep learning. It also provides valuable information for academic and industrial researchers and opens new avenues for research aimed at developing robust fraud detection systems.
This research aims to modify the components of stainless steel alloy by the method of surface engineering through the single diffusion coating technique in order to obtain new alloys with high efficiency in resisting harsh environmental conditions. Steam a mixture of sodium chloride ( ) and sodium sulfate ( ) at a temperature of 900 and then compare it with the base alloy. The results showed that the alloys produced in this way are very efficient. The results showed that the aluminum coating showed high efficiency in resisting oxidation and provided better protection for a longer time compared to the uncoated alloy due to the oxide crust layer formed with high adhesion as well as the aluminum-rich phases, whether the phase
... Show MoreObjective: The study the association of procalcitonin (PCT) and c-reactive protein (CRP) levels in COVID-19 patients and it's role as a guide in progress and management of those patients. Methodology: This cross-sectional study analyzed 200 CIOVID-19 patients in a single privet center in Baghdad, Iraq from January 1, 2021 to January 1, 2022. Demographic data like age, sex, and clinical symptoms were recorded. High sensitivity CRP and PCT in the serum were measured via dry fluorescence immunoassay (Lansionbio-China). Results: Out of 200 patients, 50 had moderate Covid and 150 had severe disease. Mean serum PCT levels was 0.039±0.05 ng/mL in the moderate group (range 0.011-0.067) and 0.43±0.21 ng/mL in the severe group (range 0.21
... Show MoreThe analysis of detective novels has taken different aspects. The linguistic analysis of them, for example, has tackled the linguistic systems of morphology, phonology, syntax, semantics, and pragmatics. In line with the linguistic analysis, this study explores the various pragmatic and stylistic devices realized through detective novels for the purpose of misdirecting and deceiving the reader. The problem is that when readers try to reach to the truth, they face difficulties. They might not reach to the right solution or infer wrong conclusions because writers use some techniques to hide the truth and mislead them. This study aims at examining these techniques and devices; namely, Grice's Maxims and ambiguity as pragmatic devices on the
... Show MoreDigital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-
... Show MorePsychological damage is one of the damages that can be compensated under the fault of negligence in the framework of English law, where the latter intends to include an enumeration of civil errors on the basis of which liability can be determined, and aims under each of these errors to protect a specific interest (for example, defamation protects Among the damage to reputation and inconvenience are the rights contained on the land), and the same is true for the rest of the other errors. Compensation for psychological damage resulting from negligence has raised problems in cases where the psychological injury is "pure", that is, those that are not accompanied by a physical injury, which required subjecting them to special requirements by the
... Show MoreIn this paper, a robust adaptive sliding mode controller is designed for a mobile platform trajectory tracking. The mobile platform is an example of a nonholonomic mechanical system. The presence of holonomic constraints reduces the number of degree of freedom that represents the system model, while the nonholonomic constraints reduce the differentiable degree of freedom. The mathematical model was derived here for the mobile platform, considering the existence of one holonomic and two nonholonomic constraints imposed on system dynamics. The partial feedback linearization method was used to get the input-output relation, where the output is the error functions between the position of a certain point on the platform
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreBackground: Management of immature permanent teeth with necrotic pulp is considered challenging to the clinician. Regeneration of pulp tissue is a relatively new approach for management of these teeth that allow continuation of root maturation rather than formation of just a calcific barrier as in apexification. Method: 9 years-old girl with traumatized upper left central incisor. The clinical and radiographical examinations revealed uncomplicated crown fracture, tenderness to percussion, absence of response to cold vitality test. Diagnostic X-ray revealed open apex with periapical radiolucency. Revascularization was suggested to treat the tooth, starting with irrigation of canal with 5% NaOCl + 3% H2O2, followed by 2 weeks of triple antibi
... Show MoreIn this paper, an Integral Backstepping Controller (IBC) is designed and optimized for full control, of rotational and translational dynamics, of an unmanned Quadcopter (QC). Before designing the controller, a mathematical model for the QC is developed in a form appropriate for the IBC design. Due to the underactuated property of the QC, it is possible to control the QC Cartesian positions (X, Y, and Z) and the yaw angle through ordering the desired values for them. As for the pitch and roll angles, they are generated by the position controllers. Backstepping Controller (BC) is a practical nonlinear control scheme based on Lyapunov design approach, which can, therefore, guarantee the convergence of the position tracking
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show More