Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
Background: The ideal maxillofacial prosthesis should have fine and thin boundaries that bindwith the surrounding facial structures and possess high tear strength.This study aims to determinethe best percentages of nanofiller (TiO2) and intrinsic pigment (silicone functional intrinsic) thatcould be mixed in as additives to improve the tear strength of Cosmesil M511 andVST50F siliconeelastomers with the least effect on their hardness.Materials and Methods: In this in vitro experimental study, a total of 80 samples, 40 for eachelastomer, were fabricated. Each elastomer sample was split into two equal groups to test for tearstrength and Shore A hardness. Each group consisted of 20 samples, including 10 control sampleswithout additives and 10 e
... Show MoreStatic reservoir modeling is the interacting and analysis of the geological data to visualize the reservoir framework by three-dimensional model and distribute the static reservoir properties. The Petrel E&P software used to incorporate the data. The interpreted log data and core report used in distribution of petrophysical properties of porosity, water saturation and permeability for Zubair reservoir in Luhais oil field.
The reservoir discretized to 274968 cells in increments of 300, 200 and 1 meter in the direction of X, Y, and Z respectively. The geostatistical approach used in the distribution of the properties of porosity and water saturation overall the reservoir units. The permeability has been calculated
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreChlopheniramine maleate ( CPM ) , is one of the H- receptor antagonist , widely used in allergic diseases ,like skin rash and pruritis .CPM 3%w/w was successfully loaded in 2%w/w sodium alginate (SA) as a gel base , and to be considered as a selected formula .It was found that the diffusion of CPM through the skin of albino rat was increased as the concentration of CPM increased from 2 %w/w sodium alginate , More
... Show MoreThe temperature control process of electric heating furnace (EHF) systems is a quite difficult and changeable task owing to non-linearity, time delay, time-varying parameters, and the harsh environment of the furnace. In this paper, a robust temperature control scheme for an EHF system is developed using an adaptive active disturbance rejection control (AADRC) technique with a continuous sliding-mode based component. First, a comprehensive dynamic model is established by using convection laws, in which the EHF systems can be characterized as an uncertain second order system. Second, an adaptive extended state observer (AESO) is utilized to estimate the states of the EHF system and total disturbances, in which the observer gains are updated
... Show MoreThe main purpose of the research is to demonstrate the importance of the insurance sector in the economy through its role in providing security for all economic sectors and thus stimulating the gross domestic product and reducing dependence on the output of the oil sector, which may expose the Iraqi economy to several problems and imbalances, I have found that there is a great weakness in the role of the insurance sector in Iraq at the level of government, companies and individuals, and the reason for this is the lack of policies supporting the insurance sector and the lack of work in the strategy of economic diversity and the decrease of security awareness by individuals so became Developing the sector to ensure the urgent need
... Show More