Crime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or living in it to assist people in recognizing between a secured and an unsecured environment. Geo-location, combined with new approaches and techniques, can be extremely useful in crime investigation. The aim is focused on comparative study between three supervised learning algorithms. Where learning used data sets to train and test it to get desired results on them. Various machine learning algorithms on the dataset of Boston city crime are Decision Tree, Naïve Bayes and Logistic Regression classifiers have been used here to predict the type of crime that happens in the area. The outputs of these methods are compared to each other to find the one model best fits this type of data with the best performance. From the results obtained, the Decision Tree demonstrated the highest result compared to Naïve Bayes and Logistic Regression.
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreIncreased attention to corporate governance with the increasing need for investors and other parties in the Iraqi market for securities of the information credible and confidence and greater transparency in the disclosure as well as the systems of governance lead to raise the value of the company and that by reducing the cost of capital and reduce the cost of financing, as well as that there are indications modern measurement can be adopted by the Iraqi market for securities for the purpose of evaluating the performance of listed companies and then raise their value.
The research problem is that there is no framework or structure of the legal and local rules for the application of corporate governance in Iraq obliges
... Show MoreDigital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-
... Show MoreOne of the most important human diseases that need to be considered in terms of development of the medical engineering devices is cardiovascular disease which is a significant cause of death globally recently. Valvular heart disease is normally treated by restoring or altering heart valves with an artificial one. But the new prosthetic valve designs necessitate testing for durability estimate and failure method. It is significant to simulate the circulation system by the building of a pulse duplicator system. This study is stated by clarifying the parameter and implementation steps of the pulse duplicator system in which the different researchers have utilized the system and tried to explain the design steps of using this system wit
... Show MoreThis study attempts to provide an approach analysis for the news, depending on the bases and principles which conceptuality semiotic researchers of this field first of them «A. J. Gremas» for the theory of «narrative discourse analysis», to more clarify we tried to apply it on a published press- news, to concludes the most important steps and methods that are necessary to follows gain more understanding of the press- news.
Hepatitis, an inflammation of the liver, has a number of infectious and non-infectious causes. Two of the viruses that cause hepatitis (hepatitis A and E) can be transmitted through water and food; hygiene is therefore important in their control. First, to assess the importance of HAV and HEV as a possible diagnosis for clinically diagnosed patients with acute viral hepatitis. Second, to assess the prevalence of hepatitis A and E in all provinces of Iraq and study its association with age, gender. This study consisted of two groups: The first group consisted of 2975 patients with a clinical diagnosis of acute viral hepatitis. The second group consisted of a total of 9610 persons, which were recruited by surveying a nationally representative
... Show MoreBackground: Type 2 diabetes mellitus (T2DM) characterized by insulin resistance (IR) and progressive decline in functional beta (β) cell mass partially due to increased β cell apoptosis rate. Pancreatic stone protein /regenerating protein (PSP/reg) is produced mainly by the pancreas and elevated drastically during pancreatic disorder. Beta cells are experiencing apoptosis that stimulate the expression of PSP/reg gene in surviving neighboring cells, and that PSP/reg protein is subsequently secreted from these cells which could play a role in their regeneration.
Objectives: To analyze serum levels of PSP/reg protein in T2DM patients and evaluate its correlation with the microvasc
... Show MoreThe sustainable competitive advantage for organizations is one of the requirements for value creation, which centered on the possession of scarce resources that achieve maximum flows to invest in intellectual capital, if what has been interest in them, measured and employed the way properly and style, so I figured the need for new technologies to enable organizations to measure the intellectual and physical assets and to assess its performance accordingly, so it sheds search light on the measurement of the added value of existing knowledge using the standard value-added factor is the intellectual (value added intellectual coefficient) (VAIC) and to develop a set of assumptions about the extent of the difference between the sample
... Show MoreThis study compared in vitro the microleakage of a new low shrink silorane-based posterior composite (Filtek™ P90) and two methacrylate-based composites: a packable posterior composite (Filtek™ P60) and a nanofill composite (Filtek™ Supreme XT) through dye penetration test. Thirty sound human upper premolars were used in this study. Standardized class V cavities were prepared at the buccal surface of each tooth. The teeth were then divided into three groups of ten teeth each: (Group 1: restored with Filtek™ P90, Group 2: restored with Filtek™ P60, and Group 3: restored with Filtek™ Supreme XT). Each composite system was used according to the manufacturer's instructions with their corresponding adhesive systems. The teeth were th
... Show More