Preferred Language
Articles
/
bsj-6108
New and Existing Approaches Reviewing of Big Data Analysis with Hadoop Tools
...Show More Authors

Everybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, science, telecommunications, the environment, etc. Authors notice through reading of previous studies that there are different analyzes through HADOOP and its various tools such as the sentiment in real-time and others. However, dealing with this Big data is a challenging task. Therefore, such type of analysis is more efficiently possible only through the Hadoop Ecosystem. The purpose of this paper is to analyze literature related analysis of big data of social media using the Hadoop framework for knowing almost analysis tools existing in the world under the Hadoop umbrella and its orientations in addition to difficulties and modern methods of them to overcome challenges of big data in offline and real –time processing. Real-time Analytics accelerates decision-making along with providing access to business metrics and reporting. Comparison between Hadoop and spark has been also illustrated.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
استخدام ادوات التحليل المالي كمؤشرات لتحديد واحتساب ضريبة الدخل: دراسة تطبيقية في الهيئة العامة للضرائب
...Show More Authors

A financial analysis tool such as financial rations concentrates on explanation of financial statement and using them in the evaluation of company profiles and fixing taxable profits, by analyzing final calculation, explaining their results and studying relationships between a group of financial lists 'elements in a specific period and the trend of their relationships in percentage from so, financial analysis is considered on important instrument for tax analytical test procedures through studying and evaluating financial data in order to get proper information which is needed to make sure of credibility and reliability of statements submitted by the taxpayer and the satisfaction of the tax analyzer in the credibility of these statements

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
ESTIMATED NON-PARAMETRIC AND SEMI-PARAMETRIC MODEL FOR LONGITUDINAL DATA
...Show More Authors

View Publication
Scopus
Publication Date
Thu Nov 01 2012
Journal Name
2012 International Conference On Advanced Computer Science Applications And Technologies (acsat)
Data Missing Solution Using Rough Set theory and Swarm Intelligence
...Show More Authors

This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Data Acquisition System for Wind Speed, Direction and Temperature Measurements
...Show More Authors

This paper describes the use of microcomputer as a laboratory instrument system. The system is focused on three weather variables measurement, are temperature, wind speed, and wind direction. This instrument is a type of data acquisition system; in this paper we deal with the design and implementation of data acquisition system based on personal computer (Pentium) using Industry Standard Architecture (ISA)bus. The design of this system involves mainly a hardware implementation, and the software programs that are used for testing, measuring and control. The system can be used to display the required information that can be transferred and processed from the external field to the system. A visual basic language with Microsoft foundation cl

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Mar 31 2020
Journal Name
College Of Islamic Sciences
Ruling on conducting a marriage contract through modern means of communication Juristic study
...Show More Authors

 

This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.

It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values ​​and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Biochemical And Cellular Archives
SYNTHESIS, SPECTRAL AND THERMAL CHARACTERIZATION OF NI(II), CU(II) AND ZN(II) COMPLEXES WITH NEW LIGAND TOWARDS POTENTIAL BIOLOGICAL APPLICATION
...Show More Authors

Series of new complexes of the type [M2 (L)Cl4 ] are prepared from the new ligand[N1 ,N4 -bis(benzo[d]thiazol-2- yl)succinamide (L) derived from ethan-1,2-dicarbonyl chloride and 2-aminobenzothiozole,where, M= Ni(ii), Cu(ii) and Zn(ii) alsocomplexes of mix-ligands, the type [M(L)(8-HQ)]Cl, where, M = Ni(ii), Cu(ii) and Zn(ii),8-HQ= 8-Hydroxyquinoline. Chemical forms are obtained from their 1 H, 13CNMR, Mass spectra (for (L)), FT-IR and U.V spectrum, melting point, molar conduct.Using flame (AA), % M is determined in the complexes.The content of C, H, N and S in the (L) and its complexes was specified. Magnetic susceptibility and thermal analysis (TGA) of prepared compounds were measured.The propose geometry for all complexes[M2 (L)Cl4 ] wa

... Show More
Publication Date
Sun Jun 05 2022
Journal Name
Egyptian Journal Of Chemistry
Synthesis, Characterization, and Biological Activity of New Metal Ions Complexes with Schiff Base Derived from 2-Acetylthiophene and Isatin-3-Hydrazone
...Show More Authors

This study describes the preparation of a new bidentate Schiff base derived from the condensation of Isatin-3-hydrazone with 2-acetylthiophene and the preparation of new series of complexes with a good yield. The prepared ligand was characterized by IR, UV-Vis, C.H.N.S elemental analysis, 1H and 13C NMR, LC-Mass spectroscopy, and physical measurements. Its complexes were analyzed by C.H.N.S elemental analyses, UV-Vis., FTIR, NMR, LC-Mass Spectra, atomic absorption spectroscopy, magnetic susceptibility, and conductivity measurements The results from spectroscopy and measurement studies showed that the ligand coordinated to the metal ion as a bidentate ligand via oxygen and nitrogen, forming an octahedral geometry around it. In vitro antimicr

... Show More
Publication Date
Sat Aug 31 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Credit Card Fraud Detection Using an Autoencoder Model with New Loss Function
...Show More Authors

View Publication
Crossref
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref