Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based on the percentage of an accuracy measure of the previous work, are surveyed and introduced, with the aim of producing a concise review of using these algorithms in crime prediction. It is expected that this review study will be helpful for presenting such techniques to crime researchers in addition to supporting future research to develop these techniques for crime analysis by presenting some crime definition, prediction systems challenges and classifications with a comparative study. It was proved though literature, that supervised learning approaches were used in more studies for crime prediction than other approaches, and Logistic Regression is the most powerful method in predicting crime.
Within the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo
... Show MoreTight reservoirs have attracted the interest of the oil industry in recent years according to its significant impact on the global oil product. Several challenges are present when producing from these reservoirs due to its low to extra low permeability and very narrow pore throat radius. Development strategy selection for these reservoirs such as horizontal well placement, hydraulic fracture design, well completion, and smart production program, wellbore stability all need accurate characterizations of geomechanical parameters for these reservoirs. Geomechanical properties, including uniaxial compressive strength (UCS), static Young’s modulus (Es), and Poisson’s ratio (υs), were measured experimentally using both static and dynamic met
... Show MoreThe idea of carrying out research on incomplete data came from the circumstances of our dear country and the horrors of war, which resulted in the missing of many important data and in all aspects of economic, natural, health, scientific life, etc.,. The reasons for the missing are different, including what is outside the will of the concerned or be the will of the concerned, which is planned for that because of the cost or risk or because of the lack of possibilities for inspection. The missing data in this study were processed using Principal Component Analysis and self-organizing map methods using simulation. The variables of child health and variables affecting children's health were taken into account: breastfeed
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThis paper presents theoretical parametric study of the curvature ductility capacity for reinforced concrete column sections. The study considers the behavior of concrete and reinforcing steel under different strain rates. A computer program has been written to compute the curvature ductility taking into account the spalling in concrete cover. Strain rate sensitive constitutive models of steel and concrete were used for predicting the moment-curvature relationship of reinforced concrete columns at different rate of straining. The study parameters are the yield strength of main reinforcement, yield strength of transverse reinforcement, compressive strength of concrete, spacing of ties and the axial load. The results indicated that hi
... Show MoreA three-stage learning algorithm for deep multilayer perceptron (DMLP) with effective weight initialisation based on sparse auto-encoder is proposed in this paper, which aims to overcome difficulties in training deep neural networks with limited training data in high-dimensional feature space. At the first stage, unsupervised learning is adopted using sparse auto-encoder to obtain the initial weights of the feature extraction layers of the DMLP. At the second stage, error back-propagation is used to train the DMLP by fixing the weights obtained at the first stage for its feature extraction layers. At the third stage, all the weights of the DMLP obtained at the second stage are refined by error back-propagation. Network structures an
... Show MoreThe importance of the research is evident in the use of exercises with the training device, which is one of the modern techniques in teaching the abilities of players, especially in teaching the skill of the backhand, and in improving the accuracy of the performance of players and increasing the contribution to the formation of a base for the game for players who have a good level of learning and upgrading the game to reach a certain achievement, and the research issue was represented in the lack of accuracy in sending balls to the required areas to achieve points, especially in the performance of the skill of the backhand due to the speed of play during the course of the match, and the study aimed to introduce modern technology usi
... Show MoreThe present work involved a study the effect of cobalt(II) complex with formula [CoL(H2O)NO3] .4ETOH where L=Nitro [5-(P-nitro phenyl) -4-phenyl-1,2,4 traizole-3-dithiocarbamato hydrazide] aqua. (4) Ethanol and anti-cancer drug - cyclophosphamide on specific activity of two liver enzymes (GPT,ALP) by utilizing an in vivo system in female mice. On the enzymatic level an inhibition in the activity of GPT was noticed in different body organs such as liver, kidney and lung. The inhibition was noticed in both test and cyclophosphamide drug (cp). Mice were treated with three doses of cyclophosphamide (90,180, 250) ?g/ mouse for three days. The same doses were used for the cobalt (II) complex. The liver shows the highest rate of(GPT) inhibition co
... Show More