Database is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG researchers and specialist with an easy and fast method of handling the EEG big data.
This research mainly aims to analyze local development strategy in Baghdad Governance, build the Strategic Model based on the study area's spatial interaction, and achieve the Trinity of Excellence based on the global model of excellence.
This research applied SWOT strategic analysis for the strengths and weaknesses of the internal environment and opportunities and threats of the external environment for the provincial council. In conclusion, the research specifies appropriate alternatives and choosing the best in line with the reality of the Baghdad Provincial Council. Also, the strategic goals in the national plan and the spatial interaction of the development goals,
... Show MoreThe exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show MoreInundation floodingmap aimedto find outearly warningsto avoidenvironmental damageandhumanin terms of theheight ofthe wave ofwater, speed time arrival, effects of inundation sideanddepth of the water/ distanceand reduce the impact of the flood wave after obtaining the process of collapse of the dam in the lower part of the river to the dam area. The study has been using a numerical model one-dimensional depends on the development of equations (Saint-Venant) so that parts of the river, any river channel main banks of the right and left treated as separate parts, that’s the difference in the characteristics of the hydraulic and engineering, along the line of the flow will take into account in each section of the sections and flow in the riv
... Show MorePeer-Reviewed Journal
من اهداف بعض التجارب هي معرفة تاثير التسلسلات المختلفة لبعض الادوية او التغذية او تجارب التعلم. وفي بعض الاحيان قد تكون الوحدات التجريبية نادرة لهذا نقوم باستخدام الوحدات التجريبية على نحو متكرر. او بسبب الميزانية المحدودة فان صاحب التجربة يخضع كل وحدة تجريبية لاختبارات عديدة ويطلق على هذا النوع من التجارب التي يتم فيها استخدام الوحدات التجريبية (الاشخاص) Subject على نحو متكرر
... Show MoreHousing finance is one of the main components of housing, and it is relied upon to help families buy, build, add building, and housing improve. Accordingly, different countries all over the world set policies and strategies for the purpose of organizing and developing the financial sector to solve quantitative and qualitative housing problems.
This research aims to identify housing finance policies and strategies in Iraq and Baghdad governorate.
The most prominent sources of housing financing are the Real Estate Bank and the Housing Fund, and accordingly the focus has been on the role of these two institutions in filling
... Show MoreIncreased interest in the subject of the image because of its great and growing link to the life of the individual and society and its impact on the overall political, economic and cultural conditions. This interest is no longer confined to the images of people or institutions, but has become beyond that to the images of countries and peoples and the impact on bilateral relations between them,
However, we find that the image of the Iraqi abroad remained vague and has not been scientifically recognized and the most that we can generalize are the features of the image of Arabs and Muslims abroad; and assume that the image of the Iraqi applies to them as the Iraqi is in the end an Arab or Muslim.
Based on this, the research
... Show MoreThe research aims to clarify the COBIT5 framework for IT governance and to develop of a criterion based on Balanced Scorecard that contributes in measuring the performance of IT governance. To achieve these goals, the researchers adopted the deductive approach in the design of balanced scorecard to measure the IT governance at the Bank of Baghdad that was chosen because it relied heavily on IT.
The research has reached a number of conclusions, the most important of which is that the performance of IT department in the Bank of Baghdad falls within the good level that requires constant monitoring, the most committed items of Balanced Scorecard by the Bank were customer, internal operation, growth and finally the financial item; IT
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More