Preferred Language
Articles
/
XRfJoo8BVTCNdQwCv3wS
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Leveraging sophisticated AI algorithms, the study focuses on scrutinizingsubtle periodic patterns and uncovering relationships among the collected datasets. Through thiscomprehensive analysis, the research endeavors to pinpoint crime hotspots, detect fluctuations infrequency, and identify underlying causes of criminal activities. Furthermore, the research evaluates theefficacy of the AI model in generating productive insights and providing the most accurate predictionsof future criminal trends. These predictive insights are poised to revolutionize the strategies of lawenforcement agencies, enabling them to adopt proactive and targeted approaches. Emphasizing ethicalconsiderations, this research ensures the continued feasibility of AI use while safeguarding individuals'constitutional rights, including privacy. The anticipated outcomes of this research are anticipated tofurnish actionable intelligence for law enforcement, policymakers, and urban planners, aiding in theidentification of effective crime prevention strategies. By harnessing the potential of AI, this researchcontributes to the promotion of proactive strategies and data-driven models in crime analysis andprediction, offering a promising avenue for enhancing public security in Los Angeles and othermetropolitan areas.

Scopus Crossref
View Publication
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Split and Merge Regions of Satellite Images using the Non-Hierarchical Algorithm of Cluster Analysis
...Show More Authors

يعد التقطيع الصوري من الاهداف الرئيسة والضرورية في المعالجات الصورية للصور الرقمية، فهو يسعى الى تجزئة الصور المدروسة الى مناطق متعددة اكثر نفعاً تلخص فيها المناطق ذات الافادة لصور الاقمار الصناعية، وهي صور متعددة الاطياف ومجهزة من الاقمار الصناعية باستخدام مبدأ الاستشعار عن بعد والذي اصبح من المفاهيم المهمة التي تُعتمد تطبيقاته في اغلب ضروريات الحياة اليومية، وخاصة بعد التطورات المتسارعة التي شهد

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 23 2021
Journal Name
Iraqi Journal Of Science
Spatial Analysis of the CO Emission from Nineveh Governorate Using Remote Sensing Techniques and GIS
...Show More Authors

     Carbon Monoxide (CO) has a significant indirect effect on greenhouse gasses due to its ozone and carbon dioxide precursor, and its mechanism of degradation involving the hydroxyl radical (OH) which control the oxidizing ability of the tropospheric. To understand the effect of human activities on atmospheric composition, accurate estimates of the sources of atmospheric carbon monoxide (CO) are necessary. MOPITT (Measurements of Pollution in the Troposphere) is a NASA Terra satellite instrument designed to allow both Thermal-Infra-Red (TIR) and Near-Infra-Red (NIR) observations to be used to collect vertical CO profiles in the Troposphere via the concept of correlation spectroscopy. The objective of the current stu

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
A Comparison of Mishrif Formation Characteristics in Kumait and Dujaila Oil Fields, Southern Iraq, Using Seismic Inversion Method and Petrophysical Properties Analysis
...Show More Authors

A comparison was conducted between two wells, Kt-1and Kt-2, in Kumait and two wells, Du-1and Du-2, in Dujaila oil fields that belong to Mishrif formation, southern Iraq.  Seismic inversion method was employed to detect oil and water reservoirs. The comparison included the behavior of acoustic impedance (AI) of fluids and the lithology with related petrophysical properties. The values of water saturation, Shale volume (Vsh), and effective porosity were compared between the AI,  two fluid reservoirs. It was found that the AI value for the oil reservoir unit is relatively low to medium, whereas it was relatively medium for the water reservoir. Effective porosity value showed, in general, an increase in the oil reservoir and

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Nov 27 2019
Journal Name
Iraqi Journal Of Science
A Practical Geotechnical Analysis of in situ Stress Variations and Hydraulic Stability of Small Weirs Using SEEP/W and SIGMA/W Simulation
...Show More Authors

     Geotechnical soil problems underneath foundation of hydraulic structures occurs due to engineering soil properties, geological setting and hydraulic properties of the projects. Two finite element programs of Geoslope 2012 software, SIGMA/W and SEEP/W, were used for analysis of in situ stresses, load deformation behavior, seepage quantity and vertical gradient below Teeb weir foundation, to compute factors of safety against seepage uplift. The site soil is a granular (gravel, sand and silt), weakly cemented soil cohered by gypsum and clay materials. The area has low lying topography, with slightly tectonic activities. The model results show that the upstream side stresses are reduced while the pore pressure are in

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Nov 12 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Application of Discrete Logarithms in Information - Hiding and Knapsack Problem with New Properties of Sk-Sets
...Show More Authors

Discrete   logarithms  are applied      in many    cryptographic problems  . For instance ,   in public   key .  and for construction of sets with disti nct sums of  k-clcments.  The   purpose o r  this   paper

is  to  modify  the  method ol' informationl1·iding  using        discrete logarithms  , introduce new properties of St - sets ,   uscdthe direct product   of    groups   to construct  cyclic group and finally, present modified   method   for   knapsack &

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Al–bahith Al–a'alami
Axiology of Electronic programs in updating the methodology of information and communication sciences Tropes 8.4 Case Study
...Show More Authors

The study aims to display the scientific benefit offered by modern electronic programs for various scientific research methods, while determining the positive scientific role played by these programs in modernizing the methodologies and logic of scientific thinking, especially with the rapid development of the sciences and their curricula.
These programs link accurately with scientific results. The importance of the study is to provide practical mechanisms to highlight the scientific projection of the electronic programs in various steps of scientific research.
A case study was used for Tropes version 8.4, which analyzes written, audio and visual semantic texts and presents a set of statistical results that facilitate the difficult

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Indian Journal Of Natural Sciences
Geology and Structure Analysis of Shaqlawa – Merawa Area, Northern Iraq Using Remote Sensing, GIS and Field Observations
...Show More Authors

This study appears GIS techniqueand remote sensing data are matching with the field observation to identify the structural features such as fault segments in the urban area such as the Merawa and Shaqlawa Cities. The use of different types of data such as fault systems, drainage patterns (previously mapped), lineament, and lithological contacts with spatial resolution of 30m was combined through a process of integration and index overlay modeling technique for producing the susceptibility map of fault segments in the study area. GIS spatial overlay technique was used to determine the spatial relationships of all the criteria (factors) and subcriteria (classes) within layers (maps) to classify and map the potential ar

... Show More
View Publication
Publication Date
Thu Aug 31 2017
Journal Name
Journal Of Engineering
Study and Analysis of Concentric Shell and Double Tube Heat Exchanger Using - Al 2 O 3 Nanofluid
...Show More Authors

    Heat exchanger is an important device in the industry for cooling or heating process. To increase the efficiency of heat exchanger, nanofluids are used to enhance the convective heat . transfer relative to the base fluid. - Al2O3/water nanofluid is used as cold stream in the shell and double concentric tube heat exchanger counter current to the hot stream basis oil. These nanoparticles were of particle size of 40 nm and it was mixed with a base fluid (water) at volume
concentrations of 0.002% and 0.004%. The results showed that each of Nusselt number and overall heat transfer coefficient increased as nanofluid concentrations increased. The pressure drop of nanofluid increased slightly than the base fluid because

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
A Smishing Detection Method Based on SMS Contents Analysis and URL Inspection Using Google Engine and VirusTotal
...Show More Authors

    Smishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
2018 International Conference On Advanced Science And Engineering (icoase)
Real-Time Face Tracking and Recognition System Using Kanade-Lucas-Tomasi and Two-Dimensional Principal Component Analysis
...Show More Authors

View Publication
Scopus (12)
Crossref (6)
Scopus Crossref