Everybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, science, telecommunications, the environment, etc. Authors notice through reading of previous studies that there are different analyzes through HADOOP and its various tools such as the sentiment in real-time and others. However, dealing with this Big data is a challenging task. Therefore, such type of analysis is more efficiently possible only through the Hadoop Ecosystem. The purpose of this paper is to analyze literature related analysis of big data of social media using the Hadoop framework for knowing almost analysis tools existing in the world under the Hadoop umbrella and its orientations in addition to difficulties and modern methods of them to overcome challenges of big data in offline and real –time processing. Real-time Analytics accelerates decision-making along with providing access to business metrics and reporting. Comparison between Hadoop and spark has been also illustrated.
The research material was prune plums (
This work concentrates on the effect of a flex-skin trailing edge flap on the aerodynamic characteristics of SD7037 airfoil at low Reynolds numbers, in the range of 2^10 to 5^10 using computational methods. The study used a range of angle of attack (AOA) associated with the take-off phase and different flap angles. The numerical model was set up in Siemens STAR-CCM+ package using the κ-ω shear stress transport turbulence model and the (γ-Reθ) transition model which ensured the approximate solution of Navier-Stokes equations. The verification of the computational solution was done by the comparison with the available experimental data of the plain flap, and it was discovered that the results matched pretty well at lower AoAs. Results in
... Show MoreIn this study, ultraviolet (UV), ozone techniques with hydrogen peroxide oxidant were used to treat the wastewater which is produced from South Baghdad Power Station using lab-scale system. From UV-H2O2 experiments, it was shown that the optimum exposure time was 80 min. At this time, the highest removal percentages of oil, COD, and TOC were 84.69 %, 56.33 % and 50 % respectively. Effect of pH on the contaminants removing was studied in the range of (2-12). The best oil, COD, and TOC removal percentages (69.38 %, 70 % and 52 %) using H2O2/UV were at pH=12. H2O2/ozone experiments exhibited better performance compared to
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreThis study describes the preparation of a new bidentate Schiff base derived from the condensation of Isatin-3-hydrazone with 2-acetylthiophene and the preparation of new series of complexes with a good yield. The prepared ligand was characterized by IR, UV-Vis, C.H.N.S elemental analysis, 1H and 13C NMR, LC-Mass spectroscopy, and physical measurements. Its complexes were analyzed by C.H.N.S elemental analyses, UV-Vis., FTIR, NMR, LC-Mass Spectra, atomic absorption spectroscopy, magnetic susceptibility, and conductivity measurements The results from spectroscopy and measurement studies showed that the ligand coordinated to the metal ion as a bidentate ligand via oxygen and nitrogen, forming an octahedral geometry around it. In vitro antimicr
... Show MoreSeries of new complexes of the type [M2 (L)Cl4 ] are prepared from the new ligand[N1 ,N4 -bis(benzo[d]thiazol-2- yl)succinamide (L) derived from ethan-1,2-dicarbonyl chloride and 2-aminobenzothiozole,where, M= Ni(ii), Cu(ii) and Zn(ii) alsocomplexes of mix-ligands, the type [M(L)(8-HQ)]Cl, where, M = Ni(ii), Cu(ii) and Zn(ii),8-HQ= 8-Hydroxyquinoline. Chemical forms are obtained from their 1 H, 13CNMR, Mass spectra (for (L)), FT-IR and U.V spectrum, melting point, molar conduct.Using flame (AA), % M is determined in the complexes.The content of C, H, N and S in the (L) and its complexes was specified. Magnetic susceptibility and thermal analysis (TGA) of prepared compounds were measured.The propose geometry for all complexes[M2 (L)Cl4 ] wa
... Show MoreIf the sovereignty of the state is reflected in the taxation of its citizens, this sovereignty can not be completed and completed only if it works on its part to collect its debts, whether voluntary or compulsory, and the debt of the debt arises from the will of the individual and the will of the state alone, The existing management of seizure and collection is based on an unequal relationship between the State and the debtor from which the obligation arises. Naturally, this relationship has obligations and rights on both parties. The researcher used a set of studies and previous research, books and other sources related to the subject of research. This was done through the theoretical and practical aspects, which focused on direct and i
... Show More