Preferred Language
Articles
/
MxeEP48BVTCNdQwCLmYJ
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based on the percentage of an accuracy measure of the previous work, are surveyed and introduced, with the aim of producing a concise review of using these algorithms in crime prediction. It is expected that this review study will be helpful for presenting such techniques to crime researchers in addition to supporting future research to develop these techniques for crime analysis by presenting some crime definition, prediction systems challenges and classifications with a comparative study. It was proved though literature, that supervised learning approaches were used in more studies for crime prediction than other approaches, and Logistic Regression is the most powerful method in predicting crime.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Finding the best estimation of generalized for failure rates by using Simulation
...Show More Authors

The statistical distributions study aimed to obtain on best descriptions  of variable sets phenomena, which each of them got one behavior of that distributions .  The estimation operations study for that distributions considered of important things which could n't canceled in variable behavior study, as result  this research came as trial for reaching to best method for information distribution estimation which is generalized linear failure rate distribution, throughout studying the theoretical sides by depending on statistical posteriori methods  like greatest ability, minimum squares method and Mixing method (suggested method).        

The research

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 28 2021
Journal Name
Misan Journal For Physical Education Sciences
The Effectiveness of Using Generative Learning Model in Learning Kinetic Series on Rings and Horizontal Bar In Artistic Gymnastics for men
...Show More Authors

The aim of this study was to identify the effectiveness of using generative learning model in learning kinetic series on rings and horizontal bar in artistic gymnastics for men ,Also, the two groups were better in learning the two series of movements on the rings and horizontal bar . The experimental method was used to design two parallel groups with pretested and posttest .The sample included third graders at the College of Physical Education and Sports Sciences - University of Baghdad ,The third class (d) was chosen to represent the control group that applied the curriculum in the college, with (12) students per group. After conducting the tribal tests, the main experiment was carried out for (8) weeks at the rate of two units per week di

... Show More
Preview PDF
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
A Study of Feminist Stylistic Analysis of Language Issues of Gender Representation in Selected Literary text
...Show More Authors

Stylistics is the analysis of the language of literary texts integrated within  various approaches to create a framework of different devices that describe and distinct a particular work. Therefore, feminist stylistics relied on theories of feminist criticism tries to present a counter- image of a woman both in language use and society, to draw attention , raise awareness and change ways that gender represents. Feminist stylistic analysis is related not only to describe sexism in a text, but also to analyze the way that point of view, agency, metaphor, and transitivity choices are  unanticipatedly and carefully connected to issues of gender(Mills,1995:1)            &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 05 2011
Journal Name
International Journal Of Chemical Reactor Engineering
Mass Transport Properties of a Flow-Through Electrolytic Reactor Using Zinc Reduction System
...Show More Authors

An electrolytic process for the removal of Zn(II) from aqueous solution using a parallel amalgamated copper screens cathode operated in the flow through mode is proposed. The current-potential curves recorded at a rotating amalgamated copper disc electrode were used to determine diffusion coefficient of Zn(II). The performance of electrolytic reactor was investigated by using different flow rates at initial zinc ion concentration(48 mg/L). Taking into account the residential Zn(II) concentration, the best results were obtained for cathode potential of (-1.35 V vs. SCE) at flow rate (320 L/h). Zinc ion concentration was found to decrease from 48 mg/L to 1 mg/L during 120 min. of electrolysis. The experimental data are well correlate

... Show More
View Publication
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
International Communications In Heat And Mass Transfer
A comparative study of twisted and straight fins in enhancing the melting and solidifying rates of PCM in horizontal double-tube heat exchangers
...Show More Authors

View Publication
Scopus (80)
Crossref (73)
Scopus Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Swarm And Evolutionary Computation
A new multi-objective evolutionary framework for community mining in dynamic social networks
...Show More Authors

View Publication
Scopus (26)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 08 2023
Journal Name
University Of Thi-qar Journal Of Agricultural Research
A review: Machine relationship with the tractor and its effect on the productivity and compaction of agricultural soil
...Show More Authors

The influence of process speed (PS) and tillage depth (TD) , on growth of corn (Zea mays L) yield, for Maha cultivar, were tested at two ranges of PS of 2.483 and 4.011 km.hr-1, and three ranges of TD of 15,20 and 25cm. The experiments were conducted in a factorial experiment under complete randomized design with three replications. The results showed that the PS of 2.483 km.hr-1 was significantly better than the PS of 4.011km.hr-1 in all studied conditions. The , slippage ratio (SR) and the machine efficiency (ME), the physical soil characteristics represented by the soil density and porosity (SBD and TSP), and the plant characteristics represented the roots dry weight, PVI and the crop productivity (CP), except adjective of the fu

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Tue Apr 25 2023
Journal Name
Journal Of Periodontal Research
Salivary E‐cadherin as a biomarker for diagnosis and predicting grade of periodontitis
...Show More Authors
Abstract<sec><title>Objectives

To determine the abilities of salivary E‐cadherin to differentiate between periodontal health and periodontitis and to discriminate grades of periodontitis.

Background

E‐cadherin is the main protein responsible for maintaining the integrity of epithelial‐barrier function. Disintegration of this protein is one of the events associated with the destructive forms of periodontal disease leading to increase concentration of E‐cadherin in the oral biofluids.

Materials and Methods

A total of 63 patients with periodontitis (case) and 35

... Show More
View Publication
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref