Preferred Language
Articles
/
XRfJoo8BVTCNdQwCv3wS
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Leveraging sophisticated AI algorithms, the study focuses on scrutinizingsubtle periodic patterns and uncovering relationships among the collected datasets. Through thiscomprehensive analysis, the research endeavors to pinpoint crime hotspots, detect fluctuations infrequency, and identify underlying causes of criminal activities. Furthermore, the research evaluates theefficacy of the AI model in generating productive insights and providing the most accurate predictionsof future criminal trends. These predictive insights are poised to revolutionize the strategies of lawenforcement agencies, enabling them to adopt proactive and targeted approaches. Emphasizing ethicalconsiderations, this research ensures the continued feasibility of AI use while safeguarding individuals'constitutional rights, including privacy. The anticipated outcomes of this research are anticipated tofurnish actionable intelligence for law enforcement, policymakers, and urban planners, aiding in theidentification of effective crime prevention strategies. By harnessing the potential of AI, this researchcontributes to the promotion of proactive strategies and data-driven models in crime analysis andprediction, offering a promising avenue for enhancing public security in Los Angeles and othermetropolitan areas.

Scopus Crossref
View Publication
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Swab – Surge Pressure Investigation, and the Influence Factors, Prediction and Calculation (Review)
...Show More Authors

Surge pressure is supplemental pressure because of the movement of the pipes downward and the swab pressure is the pressure reduction as a result of the drill string's upward movement. Bottom hole pressure is reduced because of swabbing influence. An Investigation showed that the surge pressure has great importance for the circulation loss problem produced by unstable processes in the management pressure drilling (MPD) actions. Through Trip Margin there is an increase in the hydrostatic pressure of mud that compensates for the reduction of bottom pressure due to stop pumping and/or swabbing effect while pulling the pipe out of the hole. This overview shows suggested mathematical/numerical models for simulating surge pressure problems ins

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 03 2023
Journal Name
International Journal Of Advances In Science, Engineering And Technology
VISUAL INTERACTION TECHNOLOGY IN THE PEDIATRIC MEDICALDEPARTMENTS OF THE EDUCATIOAL HOSPITAL.
...Show More Authors

Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
The Role of Transition of Workforce between Companies in Transferring Technology
...Show More Authors

The transition of professionals between different sectors is considered as one of sources of
acquisition of technology and will lead to add the practical experience to them. This experience
depending on different factors like: the scientific degree and practical experience by the
professionals, the technology possessed by the transferor sector, the duration that spent by
experienced in transferor sector, the type of work performed by professional….etc.
The research aims to verify the affect of these factors in technology transfer process.
Research reached that the technology transfer process which is depending on the Iraqi competencies
in work is unsatisfied level between Iraqi organizations because there are dif

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Bitcoin Prediction with a hybrid model
...Show More Authors

. In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction a

... Show More
View Publication
Scopus (10)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Bitcoin Prediction with a hybrid model
...Show More Authors

In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction acc

... Show More
Scopus (10)
Scopus
Publication Date
Thu Sep 01 2022
Journal Name
Computers And Electrical Engineering
Automatic illness prediction system through speech
...Show More Authors

View Publication
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jul 08 2024
Journal Name
Journal Of Microbiology, Biotechnology And Food Sciences
SYNERGISTIC EFFECTS OF NEEM OIL AND GENTAMICIN ON PSEUDOMONAS AERUGINOSA VIA PHZM GENE DOWNREGULATION: A COMPREHENSIVE REVIEW
...Show More Authors

Exploring the antibacterial potential of neem oil (Azadirachta indica) in combination with gentamicin (GEN) against pathogenic molds, especially Pseudomonas aeruginosa, has drawn concern due to the quest for natural treatment options against incurable diseases. Prospective research directions include looking for natural cures for many of the currently incurable diseases available now. microbial identification system, were used to identify the isolates. The research utilized a range of methods, such as the diffusion agar well (AWD) assays, TEM (transmission electron microscopy) analysis, minimum inhibitory concentration (MIC) assays, and real-time PCR (RT-qPCR) to analyze bacterial expression and the antibacterial action of neem oil (Azadira

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Sep 22 2016
Journal Name
Applied Sciences
Analysis and Evaluation of Performance Gains and Tradeoffs for Massive MIMO Systems
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
Wavelet Analysis For Sunspot Time Series
...Show More Authors

Abstract

In this research we study the wavelet characteristics for the important time series known as Sunspot, on the aim of verifying the periodogram that other researchers had reached by the spectral transform, and noticing the variation in the period length on one side and the shifting on another.

A continuous wavelet analysis is done for this series and the periodogram in it is marked primarily. for more accuracy, the series is partitioned to its the approximate and the details components to five levels, filtering these components by using fixed threshold on one time and independent threshold on another, finding the noise series which represents the difference between

... Show More
View Publication Preview PDF
Crossref