Preferred Language
Articles
/
XRfJoo8BVTCNdQwCv3wS
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Leveraging sophisticated AI algorithms, the study focuses on scrutinizingsubtle periodic patterns and uncovering relationships among the collected datasets. Through thiscomprehensive analysis, the research endeavors to pinpoint crime hotspots, detect fluctuations infrequency, and identify underlying causes of criminal activities. Furthermore, the research evaluates theefficacy of the AI model in generating productive insights and providing the most accurate predictionsof future criminal trends. These predictive insights are poised to revolutionize the strategies of lawenforcement agencies, enabling them to adopt proactive and targeted approaches. Emphasizing ethicalconsiderations, this research ensures the continued feasibility of AI use while safeguarding individuals'constitutional rights, including privacy. The anticipated outcomes of this research are anticipated tofurnish actionable intelligence for law enforcement, policymakers, and urban planners, aiding in theidentification of effective crime prevention strategies. By harnessing the potential of AI, this researchcontributes to the promotion of proactive strategies and data-driven models in crime analysis andprediction, offering a promising avenue for enhancing public security in Los Angeles and othermetropolitan areas.

Scopus Crossref
View Publication
Publication Date
Sat Nov 08 2025
Journal Name
Journal Of Baghdad College Of Dentistry
A Clinical Method for Prediction of Alveolar Bone Mineral Density in the Area between the Second Premolar and First Molar in Iraqi Adults with Class I Occlusion
...Show More Authors

Background: Orthodontic mini-implants are increasingly used in orthodontics and the bone density is a very important factor in stabilization and success of mini-implant. The aim of this study was to observe the relationship among maximum bite force (MBF); body mass index (BMI); face width, height and type; and bone density in an attempt to predict bone density from these variables to eliminate the need for CT scan which have a highly hazard on patient. Materials and Methods: Computed tomographic (CT) images were obtained for 70 patients (24 males and 46 females) with age range 18-30 years. The maxillary and mandibular buccal cortical and cancellous bone densities were measured between 2nd premolar and 1st molar at two levels from the alveol

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 27 2020
Journal Name
Journal Of Physics: Conference Series
Investigation of the State Vectors and Prediction of the Orbital Elements for Spot-6 Satellite during 1300 periods with Perturbations
...Show More Authors
Abstract<p>Computer simulations were carried out to investigate the dependence of the main perturbation parameters (Sun and Moon attractions, solar radiation pressure, atmosphere drag, and geopotential of Earth) on the orbital behavior of satellite. In this simulation, the Cowell method for accelerations technique was adopted, the equation of motion with perturbation was solved by 4<sup>th</sup> order Runge-Kutta method with step (1/50000) of period to obtain the state vectors for position and velocity. The results of this simulation have been compared with data that available on TLEs (NORD data in two line elements). The results of state vectors for satellites (Cartosat-2B, Gsat-14 an</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Sep 22 2016
Journal Name
Applied Sciences
Analysis and Evaluation of Performance Gains and Tradeoffs for Massive MIMO Systems
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
Wavelet Analysis For Sunspot Time Series
...Show More Authors

Abstract

In this research we study the wavelet characteristics for the important time series known as Sunspot, on the aim of verifying the periodogram that other researchers had reached by the spectral transform, and noticing the variation in the period length on one side and the shifting on another.

A continuous wavelet analysis is done for this series and the periodogram in it is marked primarily. for more accuracy, the series is partitioned to its the approximate and the details components to five levels, filtering these components by using fixed threshold on one time and independent threshold on another, finding the noise series which represents the difference between

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
The Role of Transition of Workforce between Companies in Transferring Technology
...Show More Authors

The transition of professionals between different sectors is considered as one of sources of
acquisition of technology and will lead to add the practical experience to them. This experience
depending on different factors like: the scientific degree and practical experience by the
professionals, the technology possessed by the transferor sector, the duration that spent by
experienced in transferor sector, the type of work performed by professional….etc.
The research aims to verify the affect of these factors in technology transfer process.
Research reached that the technology transfer process which is depending on the Iraqi competencies
in work is unsatisfied level between Iraqi organizations because there are dif

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 03 2023
Journal Name
International Journal Of Advances In Science, Engineering And Technology
VISUAL INTERACTION TECHNOLOGY IN THE PEDIATRIC MEDICALDEPARTMENTS OF THE EDUCATIOAL HOSPITAL.
...Show More Authors

Publication Date
Thu Apr 21 2022
Journal Name
Neuroquantology
New Record of the Species Margarinotus punctiventer, Marseul, 1854 (Histeridae, Coleoptera) with Forensic Study from Sulaymaniyah, City Iraq.
...Show More Authors

Publication Date
Wed Nov 23 2022
Journal Name
Neuroquantology2
New record of the species Hydroteae crytoneurina (Zetterstdt, 1845) (Diptera, Muscidae) with forensic study from Sulaymaniyah City-Iraq
...Show More Authors

Publication Date
Tue Oct 26 2021
Journal Name
Series On Biomechanics
Monitoring and analysis of plantar pressure map and foot motions using a wearable sensing system
...Show More Authors

Peer-Reviewed Journal

View Publication
Scopus (4)
Scopus