Preferred Language
Articles
/
XRfJoo8BVTCNdQwCv3wS
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Leveraging sophisticated AI algorithms, the study focuses on scrutinizingsubtle periodic patterns and uncovering relationships among the collected datasets. Through thiscomprehensive analysis, the research endeavors to pinpoint crime hotspots, detect fluctuations infrequency, and identify underlying causes of criminal activities. Furthermore, the research evaluates theefficacy of the AI model in generating productive insights and providing the most accurate predictionsof future criminal trends. These predictive insights are poised to revolutionize the strategies of lawenforcement agencies, enabling them to adopt proactive and targeted approaches. Emphasizing ethicalconsiderations, this research ensures the continued feasibility of AI use while safeguarding individuals'constitutional rights, including privacy. The anticipated outcomes of this research are anticipated tofurnish actionable intelligence for law enforcement, policymakers, and urban planners, aiding in theidentification of effective crime prevention strategies. By harnessing the potential of AI, this researchcontributes to the promotion of proactive strategies and data-driven models in crime analysis andprediction, offering a promising avenue for enhancing public security in Los Angeles and othermetropolitan areas.

Scopus Crossref
View Publication
Publication Date
Sun Sep 25 2022
Journal Name
Lubricants
Development of Hybrid Intelligent Models for Prediction Machining Performance Measure in End Milling of Ti6Al4V Alloy with PVD Coated Tool under Dry Cutting Conditions
...Show More Authors

Ti6Al4V alloy is widely used in aerospace and medical applications. It is classified as a difficult to machine material due to its low thermal conductivity and high chemical reactivity. In this study, hybrid intelligent models have been developed to predict surface roughness when end milling Ti6Al4V alloy with a Physical Vapor Deposition PVD coated tool under dry cutting conditions. Back propagation neural network (BPNN) has been hybridized with two heuristic optimization techniques, namely: gravitational search algorithm (GSA) and genetic algorithm (GA). Taguchi method was used with an L27 orthogonal array to generate 27 experiment runs. Design expert software was used to do analysis of variances (ANOVA). The experimental data were

... Show More
View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Mustansiriyah Journal Of Arts
The Significance of Utilizing the Social Networking Site (LinkedIn) Among Researchers and Specialists in the Field of Information and Knowledge Technologies
...Show More Authors

This study aims to identify both the importance of using (LinkedIn) and its drawbacks for researchers and specialists in the field of information and knowledge technologies. The study relied mainly on the statistical method (analytical method) from the collection of data tools (questionnaire) that was distributed electronically (Google Forms) to the sample community of (55) instructors. The feedback received illustrates that (46) instructors among those who participated in the questionnaire subscribed to (LinkedIn) and the rest did not. Their data was analyzed statistically, and the general arithmetic mean and the hypothetical mean was extracted for them to achieve the objectives of the study and prove their hypotheses. The site positively

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A Study on the Accuracy of Prediction in Recommendation System Based on Similarity Measures
...Show More Authors

Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
The informatics adequacy on the spraying technology in Iraqi agricultural researches: A literature review
...Show More Authors
Abstract<p>Many of the Iraqi agricultural researches are used spraying technique to add chemical products including pesticides and growth regulators. Various studies were performed to study the effect of these substances at different concentrations to improve plant production. In order to adopt specific criteria of spraying researches and to replicate them easily, it is a necessary to mention all information related to the spraying processes and regulations for improving sprayer’s performance by increasing the amount of pesticide deposited on the target. The current study aims to survey Iraqi researches in details and analyse them randomly. Also, to highlight on the importance of information applied in sprayi</p> ... Show More
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sat Apr 09 2022
Journal Name
Engineering, Technology &amp; Applied Science Research
A Semi-Empirical Equation based on the Strut-and-Tie Model for the Shear Strength Prediction of Deep Beams with Multiple Large Web Openings
...Show More Authors

The behavior and shear strength of full-scale (T-section) reinforced concrete deep beams, designed according to the strut-and-tie approach of ACI Code-19 specifications, with various large web openings were investigated in this paper. A total of 7 deep beam specimens with identical shear span-to-depth ratios have been tested under mid-span concentrated load applied monotonically until beam failure. The main variables studied were the effects of width and depth of the web openings on deep beam performance. Experimental data results were calibrated with the strut-and-tie approach, adopted by ACI 318-19 code for the design of deep beams. The provided strut-and-tie design model in ACI 318-19 code provision was assessed and found to be u

... Show More
View Publication
Scopus (6)
Crossref (9)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Journal Of The College Of Education For Women
The Degree of Using Augmented Reality Technology among students of the Optimum Invesment Project fot Teaching Personnel Program and the difficulties they face at Al-Shaqra University
...Show More Authors

Augmented reality technology is a modern technique used in all fields, including: medicine, engineering and education, and has received attention from officials in the educational process at present; The focus of this research is on the degree of use of augmented reality among field experience students in the project's optimal investment program for teaching staff and their difficulties, applied to a sample of 75 students, through a questionnaire prepared by the researcher as a tool to determine the degree of use, as well as difficulties. The researcher addressed the subject through two main axes to determine the degree of use, as well as the difficulties preventing teachers and learners from using this technique. The results of the rese

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Telematics And Informatics
Modelling the utilization of cloud health information systems in the Iraqi public healthcare sector
...Show More Authors

View Publication
Scopus (70)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 18 2021
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
The Effectiveness of Educational Pillars Based on Vygotsky's Theory in Achievement and Information Processing Among First Intermediate Class Students
...Show More Authors

The aim of the research is to identify the effectiveness of the educational pillars strategy based on Vygotsky's theory in mathematical achievement and information processing of first-grade intermediate students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught traditionally and the other experi-mental taught according to the educational pillars strategy. The research sample consisted of (66) female students from the first intermediate grade, who were inten-tionally chosen after ensuring their equivalence, taking into account several factors, most notably chronological age and their level of mathematics, and they we

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Brokerage Firms under Information Asymmetry and its Effect on Common Stock Trade : Applied Research in the Iraq Stock Exchange
...Show More Authors

The research aims to Applied Study in the nature of the impact of information asymmetry for brokerage firms in the common stock trading, The research included the theoretical concepts associated with each of the brokerage firms ,information asymmetry and common stock trading, It used the financial methods on the practical side of the information asymmetry for brokerage firms based in the sector as well as trading volume and spread for common stock , The community of the research included the Iraq Stock Exchange,the sample of research the companies listed which have been trading on its stock for the period August 2015 until December 2015 as well as brokerage firms

amounting to 47 brokerage firm. The resea

... Show More
View Publication Preview PDF
Crossref