Everybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, science, telecommunications, the environment, etc. Authors notice through reading of previous studies that there are different analyzes through HADOOP and its various tools such as the sentiment in real-time and others. However, dealing with this Big data is a challenging task. Therefore, such type of analysis is more efficiently possible only through the Hadoop Ecosystem. The purpose of this paper is to analyze literature related analysis of big data of social media using the Hadoop framework for knowing almost analysis tools existing in the world under the Hadoop umbrella and its orientations in addition to difficulties and modern methods of them to overcome challenges of big data in offline and real –time processing. Real-time Analytics accelerates decision-making along with providing access to business metrics and reporting. Comparison between Hadoop and spark has been also illustrated.
Dust storms are typical in arid and semi-arid regions such as the Middle East; the frequency and severity of dust storms have grown dramatically in Iraq in recent years. This paper identifies the dust storm sources in Iraq using remotely sensed data from Meteosat-spinning enhanced visible and infrared imager (SEVIRI) bands. Extracted combined satellite images and simulated frontal dust storm trajectories, using the Hybrid Single Particle Lagrangian Integrated Trajectory (HYSPLIT) model, are used to identify the most influential sources in the Middle East and Iraq. Out of 132 dust storms in Iraq during 2020–2023, the most frequent occurred in the spring and summer. A dust source frequency percentage map (DSFPM) is generated using ArcGIS so
... Show MoreMultiple sclerosis (MS) is a chronic, inflammatory demyelinating disease of central nervous system with complex etiopathogenesis that impacts young adults (Lee et al., 2015), and MS impacts younger and middle aged character and leads to a range of disabilities that can alter their daily routines (Yara et al, 2010). Although, the exact cause of MS is still undetermined, the disease is mediated by adaptive immunity through the infiltration of T cells into the central nervous system (Bjelobaba et al, 2017). MS causes the Focal neurological symptomsand biochemical changes in the molecular level and the variation of neural cells such as loss or alteration of sensation, motor function, visible signs such as blurred vision or transient blindness,
... Show MoreEsculin (ESCN) is used in the pharmaceutical industry with intravenous effect, stimulant and anti-inflammatory capillaries, like vitamin P. It is a significant component of many anti-inflammatory remedies such as esqusan, esflazid and anavenol [14]. It is also found in numerous other remedies available in the market such as proctosone, anustat, and ariproct.
To determine experimental conditions, to elucidate retention behavior of esculin in HILIC mode. Moreover, to suggest new ways to separate and determinate esculin in ointments.
Two hydrophilic c
Structural buildings consist of concrete and steel, and these buildings have confronted many challenges from various aggressive environments against the materials manufactured from them. It contains high water levels and buildings whose concrete cover may be damaged and thus lead to the deterioration and corrosion of steel. It was important to have an alternative to steel, such as the glass fiber reinforced polymer (GFRP), which is distinguished by its great effectiveness in resisting corrosion, as well as its strong tensile resistance. Still, one of its drawbacks is that it has a low modulus of elasticity. This research article aims to conduct a numerical study using the nonlinear fi
Local and global bifurcations of food web model consists of immature and mature preys, first predator, and second predator with the current of toxicity and harvesting was studied. It is shown that a trans-critical bifurcation occurs at the equilibrium point
Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreThe question of estimation took a great interest in some engineering, statistical applications, various applied, human sciences, the methods provided by it helped to identify and accurately the many random processes.
In this paper, methods were used through which the reliability function, risk function, and estimation of the distribution parameters were used, and the methods are (Moment Method, Maximum Likelihood Method), where an experimental study was conducted using a simulation method for the purpose of comparing the methods to show which of these methods are competent in practical application This is based on the observations generated from the Rayleigh logarithmic distribution (RL) with sample sizes
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreThe development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste
... Show More