Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based on the percentage of an accuracy measure of the previous work, are surveyed and introduced, with the aim of producing a concise review of using these algorithms in crime prediction. It is expected that this review study will be helpful for presenting such techniques to crime researchers in addition to supporting future research to develop these techniques for crime analysis by presenting some crime definition, prediction systems challenges and classifications with a comparative study. It was proved though literature, that supervised learning approaches were used in more studies for crime prediction than other approaches, and Logistic Regression is the most powerful method in predicting crime.
Background and objectives: This study aimed at testing the effect of plastic sleeve or barrier, used to cover the guide of the light cure unit to prevent cross-infection, on the shear bond strength and site of bond failure of stainless steel and ceramic orthodontic brackets. Materials and methods: Forty orthodontic brackets; twenty stainless steel and twenty ceramic brackets bonded to forty extracted human maxillary first premolars using light cure adhesive cured with and without the use of a protective plastic barrier on the guide. Comparing the effect of this barrier on the shear bond strength and adhesive remnant index was performed using an independent t-test and Chi-square test. Results: The protective barrier had decreased the shear b
... Show MoreBackground: Impression materials, impression trays, and poured stone cast have been said to be the main source of cross infection between patients and dentists. However, it was observed that disinfection of the impression is not performed systematically in routine dental practice. Disinfection of alginates either by immersion or spray technique was found to cause dimensional inaccuracies, although with proper disinfection of alginates there were small dimensional changes. A variety of fluoride releasing products designed for topical use is currently available. Following their use, varied amount of fluoride is systemically absorbed depending on the fluoride concentration and the manner of its use. The objective of this study was to evaluate
... Show MoreThe paper presents research results of the vibration transmitted from the steering wheel of the tractor with a 2-wheel drive to the driver’s hands. The vibration measurements were carried out on the tractor randomly chosen from the collage of agriculture / university of Baghdad. Before testing the tractor was examined and adjusted following the producer’s recommendations. The vibration levels were measured during the operation tillage at idling and at full load .The field was 31.7 m above level sea. Soil was treated at soil constant moisture (17-20 %) with depth of plowing (17 cm). During operation the weather temperature was measured (15 C) and humidity was ( 27 % ) The vibration level on the steering wheel was measured and analyzed .T
... Show MorePiperine, a crystalline alkaloid compound isolated from Piper nigrum, piper longum, and other types of piper, has had many fabulous pharmacological advantages for preventing and treating some specific diseases, such as analgesic, anti-inflammatory, hepatoprotective, antimetastatic, antithyroid, immunomodulatory, antitumor, rheumatoid arthritis, osteoarthritis, Alzheimer's, and improving the bioavailability of other drugs. However, its potential for clinical use through oral usage is hindered by water solubility and poor bioavailability. The low level of oral bioavailability is caused by low solubility in water and is photosensitive, susceptible to isomerization by UV light, which causes piperine concentration to decrease. Many different
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreA comparison between the resistance capacity of a single pile excited by two opposite rotary machines embedded in dry and saturated sandy soil was considered experimentally. A small-scale physical model was manufactured to accomplish the experimental work in the laboratory. The physical model consists of: two small motors supplied with eccentric mass 0·012 kg and eccentric distance 20 mm representing the two opposite rotary machines, an aluminum shaft with 20 mm in diameter as the pile, and a steel plate with dimensions of (160 × 160 × 20 mm) as a pile cap. The experimental work was achieved taking the following parameters into consideration, pile embedment depth ratio (L/d; length to diameter) and operating freq
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreDouble drum dryer is operated for producing pregelatinized maize starches using feed starch slurries of different
solids(7, 10 and13 g/100 g )content . Steam pressure (2,3,and 4 bar), the level of pool between the drums (4,7,and 10
cm) , and speed of drums rotation (3,4,and 6 rpm) are varied together with the feed solids content in a practical range of
values. The response of the dryer is registered by measuring several output variables, i.e. external drum temperature,
product moisture content, mass flow rate.
Background: Obesity is becoming the healthcare epidemic world wide.Obesity is associated with reduced life expectancy, increased morbidity and mortality, and greater healthcare costs.Bariatric surgery is the only effective treatment for morbid obesity and is gaining increasing popularity. There has been a steady rise in the numbers and types of bariatric operations done worldwide in recent years butnon of prove to be ideal .Animal studies and use of animal models are significant element in the evolution of medical knowledge and the use of animals as a model for bariatric surgery is of importance to study the mechanisms of these operationsa and also help to develop new technique in management of obesity.Objectives:Study of effects of slee
... Show MoreThe study aims to reach a common point that achieves a balance between two interests, which are generally in conflict with the public interest and the interest of the individual owner of private property, by extrapolating the provisions of the constitutional judiciary that include the protection of private property, and this protection extends to every right of financial value and is not limited to a specific type, but It included everything that can be estimated with money, as ownership is no longer an advantage for the owner, but rather has become a right for him and a social function. The tax is imposed on what is derived from it, but if there is a need to prejudice it, the conditions, limits and restrictions expressly stipulated in the
... Show More