Everybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, science, telecommunications, the environment, etc. Authors notice through reading of previous studies that there are different analyzes through HADOOP and its various tools such as the sentiment in real-time and others. However, dealing with this Big data is a challenging task. Therefore, such type of analysis is more efficiently possible only through the Hadoop Ecosystem. The purpose of this paper is to analyze literature related analysis of big data of social media using the Hadoop framework for knowing almost analysis tools existing in the world under the Hadoop umbrella and its orientations in addition to difficulties and modern methods of them to overcome challenges of big data in offline and real –time processing. Real-time Analytics accelerates decision-making along with providing access to business metrics and reporting. Comparison between Hadoop and spark has been also illustrated.
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreThe present research is descriptive and analytical by nature; it practically presents the method of implementing the standard pattern in an unconventional way using the bias-cut line. The study aims at investigating the variables of bias-cut and their suitability for fitting large-shaped Iraqi ladies. It also aims at exploring the artistic and innovative features of the bias-cut. Therefore, one needs to understand the rules and basics of clothing and the nature of the body to reach the maximum degree of control.Consequently, the study is to answer the following questions: What is the effectiveness of tailoring on the bias-cut in fitting a standard template of a large-shaped Iraqi ladies? Is it possible to obtain from the offered possibil
... Show MoreThe research aims at the possibility of measuring the technical and scale efficiency (SE) of the departments of the College of Administration and Economics at the University of Baghdad for a period lasting 8 years, from the academic year 2013-2014 to 2018-2019 using the method of Applied Data Analysis with an input and output orientation to maintain the distinguished competitive position and try to identify weaknesses in performance and address them. Nevertheless, the research problem lies in diagnosing the most acceptable specializations in the labor market and determining the reasons for students’ reluctance to enter some departments. Furthermore, the (Win4DEAp) program was used to measure technical and scale efficiency (SE) and rely on
... Show MoreThis study aims to measure and analyze the direct and indirect effects of the financial variables, namely (public spending, public revenues, internal debt, and external debt), on the non-oil productive sectors with and without bank credit as an intermediate variable, using quarterly data for the period (2004Q1–2021Q4), converted using Eviews 12. To measure the objective of the study, the path analysis method was used using IBM SPSS-AMOS. The study concluded that the direct and indirect effects of financial variables have a weak role in directing bank credit towards the productive sectors in Iraq, which amounted to (0.18), as a result of market risks or unstable expectations in the economy. In addition to the weak credit ratings of borr
... Show MoreIn this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation) structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of these procedures and compare them using generated data.
In this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data sets
A new set of metal complexes by the general formula [M(P)2(H2O)2]Cl2 has been prepared through the interaction of the new Ligand [N1, N4-bis(4-methoxyphenyl)succinamide] (P) derived from succinyl chloride with p-anisidine with the transition metal ions [Cu(II), Mn(II), Cd(II), Co(II) and Ni(II)]. Compounds diagnosed by TGA, 1 H, 13CNMR and Mass spectra (for (P)), Fourier-transform infrared and Electronic spectrum, Magnetic measurement, molar conduct, (%M, %C, %H, %N). These measurements indicate that (P) is associated with the metal ion in a bi-dentate fashion by nitrogen atoms (the amide group), and the octahedral composition of these complexes is suggested. Staphylococcus Aureus (+) and Escherichia Coli (–) were studied for the antibact
... Show More12 membered Schiff base macrocyclic ligands, 6,7,14,15-tetra phenyl-1,2,3,4, 4a,8a, 9,10, 11,12, 12a,16a-dodecahydro dibenzo [b,h] [1,4,7,10] tetraazacyclododecine L1, and 14 membered Schiff base macrocyclic ligands, 6,8,15,17-tetramethyl-1,2,3,4, 4a,7,9a, 10,11,12,13,13a,16,18a-tetra decahydro dibenzo[b,i] [1, 4,8,11] cyclotetradecine tetraaza L2, 7,16-bis(2,4- dichloro benz ylidene)-6,8,15,17-tetra methyl-1,2,3,4, 4a,7,9a, 10, 11,12, 13, 13a,16,18a-tetra deca hydro dibenzo [b,i] [1,4,8,11] tetra azacyclo tetra decine L3 and 6,8,15, 17-tetramethyl-1,2,3, 4,4a,9a,10, 11,12,13,13a,18a-dodecahydro dibenzo [b,i] [1,4,8, 11] tetraazacyclo tetradecine (7,16-diylidene) bis(methanylyli dene) bis (N,N-dimethylaniline) L4 were synthesized by condens
... Show MoreThe present work involved preparation of new substituted and unsubstituted and poly imides (1-17) using reaction of acryloyl chloride with different amides (aliphatic ,aromatic) in the presence of a suitable solvent and amount tri ethyl amine (Et3N) with heating – the structure confirmation of all polymers were proved using FT-IR,1H-NMR,C13NMR and UV spectroscopy ,thermal analysis (TG) for some polymers confirmed their thermal stabilities . Other physical properties including softening and melting points, PH and solubility of the polymers were also measured