Preferred Language
Articles
/
bsj-6310
A Crime Data Analysis of Prediction Based on Classification Approaches
...Show More Authors

Crime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or living in it to assist people in recognizing between a secured and an unsecured environment.  Geo-location, combined with new approaches and techniques, can be extremely useful in crime investigation. The aim is focused on comparative study between three supervised learning algorithms. Where learning used data sets to train and test it to get desired results on them. Various machine learning algorithms on the dataset of Boston city crime are Decision Tree, Naïve Bayes and Logistic Regression classifiers have been used here to predict the type of crime that happens in the area. The outputs of these methods are compared to each other to find the one model best fits this type of data with the best performance. From the results obtained, the Decision Tree demonstrated the highest result compared to Naïve Bayes and Logistic Regression.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Developing Load Balancing for IoT - Cloud Computing Based on Advanced Firefly and Weighted Round Robin Algorithms
...Show More Authors

The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities.   Cloud computing can be used to store big data.  The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Strategic planning of human resources and its impact on the stages of a career path :A field research in the Ministry of Health
...Show More Authors

Abstract

The objective of this research is to analyze the relationship between the strategic planning for human resources and career path, and I have tested Search the Ministry of  Health and some health centers headquarters in the Karkh district, that is applied in sample Consist of (45) Deputy Director, Head of Depts, Departmental Manager, and health center Manager.

Find interested in studying the two subjects are important and vital, at the level of organizations at the present time, namely the strategic planning of human resources and career path. To achieve the objectives of the research was designed Qusestionnair (31) items to collect  Primary data. and collected t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 17 2022
Journal Name
Iraqi Journal Of Laser
PDF S and U shape offset studying of the refractive index sensor based on coreless fiber: Aya R. Mejble* Hanan J.Taher
...Show More Authors

Abstract:  Two different shapes of offset optical fiber was studied based on coreless fiber for refractive index (RI)/concentration (con.) measurement, and compare them. These shapes are U and S-shapes, both shapes structures were formed by one segment of coreless fiber (CF) was joined between two single mode (SMF) lead in /lead out with the same displacement (12.268µm) at both sides, the results shows the high sensitive was achieved in a novel S-shape equal 98.768nm/RIU, to our knowledge, no one has ever mentioned or experienced it, it’s the best shape rather than the U-shape which equal 85.628nm/RIU. In this research, it was proved that the offset form has a significant effect on the sensitivity of the sensor. Addi

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Used Approaches In Formulating Accounting Standards in Iraq & Their Develop Importance: filed Study
...Show More Authors

This research aims to show the most important approaches applicable in forming the accounting standards , the  importance approaches used to formulate local accounting standards & the  need to cancel or develop the unified accounting system in Iraq besides activate the local auditing & accounting standards council to issue accounting standards able to save the relevance & Reliable accounting information that serve the decisions of stockholders and others of stakeholders in the incorporate companies , especially the companies listed in the Iraq securities exchange , So this study based partially on analyzing the questionnaire form which has been designed to inquiry the specialists and experts opinion about the accoun

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Analysis of Temperature and Residual Stress Distribution in CO2 Laser Welded Aluminum 6061 Plates Using FEM
...Show More Authors

This paper develops a nonlinear transient three-dimensional heat transfer finite element model and a rate independent three-dimensional deformation model, developed for the CO2 laser welding simulations in Al-6061-T6 alloy. Simulations are performed using an indirect coupled thermal-structural method for the process of welding. Temperature-dependent thermal properties of Al-6061-T6, effect of latent heat of fusion, and the convective and radiative boundary conditions are included in the model. The heat input to the model is assumed to be a Gaussian heat source. The finite element code ANSYS12, along with a few FORTRAN subroutines, are employed to obtain the numerical results. The benefit of the proposed methodology is that it

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Intelligent Dust Monitoring System Based on IoT
...Show More Authors

Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun May 08 2011
Journal Name
Journal Of Planner And Development
The use of GIS in the analysis of existing condition of spatial distribution of wire communications network in the city of Baghdad
...Show More Authors

The increasing efficiency of the telecommunications network in the city contributes to the increase in spatial interaction between activities (to influence and mutual influence) This study is based on the idea that the upgrading of telephone services provided to citizens are done exclusively through the growth and development of all levels of the service using advanced technologies to know the problems and appropriate solutions in short time and less cost. Thus, crystallized the objectives of the study which was built for the importance of GIS in the planning of services in general, and infrastructure services, in particular, including telephone services, which is represent a point of contact between individuals on the one hand a

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 26 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Dual use of Altman financial failure prediction analysis and stress tests to achieve integration in banking risk management : Analytical study of the National Bank of Iraq
...Show More Authors

The research aims to demonstrate the dual use of analysis to predict financial failure according to the Altman model and stress tests to achieve integration in banking risk management. On the bank’s ability to withstand crises, especially in light of its low rating according to the Altman model, and the possibility of its failure in the future, thus proving or denying the research hypothesis, the research reached a set of conclusions, the most important of which (the bank, according to the Altman model, is threatened with failure in the near future, as it is located within the red zone according to the model’s description, and will incur losses if it is exposed to crises in the future according to the analysis of stress tests

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref