Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based on the percentage of an accuracy measure of the previous work, are surveyed and introduced, with the aim of producing a concise review of using these algorithms in crime prediction. It is expected that this review study will be helpful for presenting such techniques to crime researchers in addition to supporting future research to develop these techniques for crime analysis by presenting some crime definition, prediction systems challenges and classifications with a comparative study. It was proved though literature, that supervised learning approaches were used in more studies for crime prediction than other approaches, and Logistic Regression is the most powerful method in predicting crime.
The main objective of the central bank is to achieve price stability and target in fractionates. Therefore, the bank sought to use modern tools and policies in order to reduce the negative effects of the accumulation of foreign reserves represented by monetary sterilization, similar to developed and developing countries alike, but with different available tools that are possible and imposed by the local financial and monetary environments, such as the window for buying and selling foreign currency, open market operations and deposit facilities. And lending existing. Because any in crease in the monetary base resulting from the accumulation of foreign reserves will affect price stability directly due to the consumer nature of the
... Show MoreThis assay rapidly detects chlorpromazine hydrochloride using its ability to reduce gold ions to form nanoparticles. Its low cost, resilience to interferences and short analysis time could facilitate environmental monitoring and biomedical analysis.
Compelling evidence proved that coronavirus disease (COVID-19) disproportionately affects minorities. The goal of the present study was to explore the effects of intersected discrimination and discrimination types on COVID-19, mental health, and cognition. A sample of 542 Iraqis, 55.7% females, age ranged from 18 to 73, with (M = 31.16, SD = 9.77). 48.7% were Muslims, and 51.3% were Christians (N = 278). We used measures for COVID-19 stressors, executive functions, intersected discrimination (gender discrimination, social groups-based discrimination, sexual orientation discrimination, and genocidal discrimination), posttraumatic stress disorder (PTSD), depression, anxiety, status and death, existential anxieties, and health. We conducted in
... Show MoreThis assay rapidly detects chlorpromazine hydrochloride using its ability to reduce gold ions to form nanoparticles. Its low cost, resilience to interferences and short analysis time could facilitate environmental monitoring and biomedical analysis.
ان وضع معايير دولية محاسبية على شكل نماذج وارشادات عامة تؤدي باصحاب القرارات الاقتصادية استخدام معايير المحاسبة الدولية عند اعداد وتجهيز القوائم والبيانات المالية اصبح مطلب اساسي وضرورة ملحة لمختلف الاطراف في المجتمع الحالي فهذه المعايير قد اثمرت في معالجة الامور المحاسبية على الصعيد المحلي والاقليمي والدولي. وان عدد كبير من الدول اعتمدت هذه المعايير فقد تجاوزت 150 بلدا. مما نتج عنه ازالة الفوارق الكث
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreIn recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show More