Crime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or living in it to assist people in recognizing between a secured and an unsecured environment. Geo-location, combined with new approaches and techniques, can be extremely useful in crime investigation. The aim is focused on comparative study between three supervised learning algorithms. Where learning used data sets to train and test it to get desired results on them. Various machine learning algorithms on the dataset of Boston city crime are Decision Tree, Naïve Bayes and Logistic Regression classifiers have been used here to predict the type of crime that happens in the area. The outputs of these methods are compared to each other to find the one model best fits this type of data with the best performance. From the results obtained, the Decision Tree demonstrated the highest result compared to Naïve Bayes and Logistic Regression.
In modern hydraulic control systems, the trend in hydraulic power applications is to improve efficiency and performance. “Proportional valve” is generally applied to pressure, flow and directional-control valves which continuously convert a variable input signal into a smooth and proportional hydraulic output signal. It creates a variable resistance (orifice) upstream and downstream of a hydraulic actuator, and is meter in/meter out circuit and hence pressure drop, and power losses are inevitable. If velocity (position) feedback is used, flow pattern control is possible. Without aforementioned flow pattern, control is very “loose” and relies on “visual” feed back by the operator. At this point, we should examine how this valv
... Show MoreAbstract:
Objective: To know the effect of televised media violence on the relationship of Children's primary school with mates and identify association between the demographic characteristics and socioeconomic status for primary school children and their relation with exposure to televised violence media.
Methodology: simple probability sample of 221 children were selected from 1425 children are learning in schools in Al-Nasiriyah City.
Results: Results of the current study showed that (53.8%) of children exposed to Televised media violence be relationship with their mates weak, (46.2%) of them have their relationship with their mates good, as well as the study showed that the presence significant correlation with males genders
Photonic Crystal Fiber Interferometers (PCFIs) are widely used for sensing applications. This work presents the fabrication and the characterization of a relative humidity sensor based on a polymer-coated photonic crystal fiber that operates in a Mach- Zehnder Interferometer (MZI) transmission mode. The fabrication of the sensor involved splicing a short (1 cm) length of Photonic Crystal Fiber (PCF) between two single-mode fibers (SMF). It was then coated with a layer of agarose solution. Experimental results showed that a high humidity sensitivity of 29.37 pm/%RH was achieved within a measurement range of 27–95%RH. The sensor also showed good repeatability, small size, measurement accuracy and wide humidity range. The RH sensitivity o
... Show Moreهدفت هذه الدراسة إلى مقارنة أثر أسلوب التعلم التعاوني بالأسلوب التقليدي في التحصيل الدراسي، وعلاقته بالاتجاه نحو الحاسب الآلي عند طلبة كلية التربية بجامعة بغداد خلال دراستهم لمقرر الحاسب الآلي وقد تضمنت إجراءات الدراسة استخدام الأسلوب التجريبي، وذلك بتوزيع أربع شعب دراسية على مجموعتين: "مجموعة تجريبية" يتم تدريسها باستخدام أسلوب التعلم التعاوني، والمجموعة الثانية: "مجموعة ضابطة" يتم تدريسها بالطريق
... Show MoreSweet pepper (Capsicum annuum L.) is an economically important vegetable crop. Wilt disease caused by Fusarium oxysporum f. sp. capsici is a specific pathogen that affects the pepper. Four isolates of F. oxysporum f. sp. capsici Fo3, Fo6, Fo7 and Fo8 were obtained from diseased pepper plants that were collected from different pepper fields in Baghdad. Fo6 isolate that has high pathogenicity to pepper seeds, Trichoderma harzianum (Th) was tested in vitro against F. oxysporum f. sp. capsici showed a high inhibition rate for the isolate Fo6, the concentration of chelated iron Fe-EDDHA 0.5% reduced the radial growth of Fo6 whi
... Show MoreSince the end of World War II, the United States of America began to look at the Gulf States and Iraq due to the possession of huge quantities of oil, after taking the American oil depletion in order to tighten control over the oil of these countries, has pursued various means, political and military, in the framework of its strategy So that it could achieve this control, which focused on control of production and prices, for the conviction that those who control oil impose control over the political decision of the countries of the world.
لقد أدت التطورات العلمية والتقنية وتطبيقاتها العملية في مختلف ميادين الحياة بشكل عام وميدان التربية والتعليم بشكل خاص إلى ظهور تغيرات في البناء التعليمي وطرائق التدريس بصيغتها الحديثة التي تنسجم في مجملها وروح العصر مما دعى المؤسسات التربوية والتعليمية وبإيعاز إلى الباحثين والمهتمين بهذا الميدان الى ضرورة متابعة الاتجاهات الحديثة ونواحي التجديد لمحتوى العملية التعليمية فيما يتعلق بالمجالات المعر
... Show Moreتعد ظاهرة الارهاب المتزايدة في العالم من اخطر اشكال التهديدات الامنية التي تواجة الدول لانها تستهدف في جانب مهم منها امن واستقرارومستقبل مجتمعاتها لاسيما اذا جمع الفعل الارهابي بين مطامع واهداف القوى الخارجية التي لا تريد استخدام ادواتها المباشرة وانما بالاعتماد على محركات في خلق الازمات داخل الدول المستهدفة
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreBritain found itself at the end of the nineteenth century in front of many obstacles within Europe, it is to hold the coalition Russian Franco in 1894, and what form of threat to the interests of Britain in its colonies outside Europe, as well as the development of other European countries in military and economic aspects such as Germany and the United States and others. As she was defying the fleet of Britain, Germany, and the last has a naval fleet was able to protect all the way Britain and its colonies throughout the nineteenth century