Everybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, science, telecommunications, the environment, etc. Authors notice through reading of previous studies that there are different analyzes through HADOOP and its various tools such as the sentiment in real-time and others. However, dealing with this Big data is a challenging task. Therefore, such type of analysis is more efficiently possible only through the Hadoop Ecosystem. The purpose of this paper is to analyze literature related analysis of big data of social media using the Hadoop framework for knowing almost analysis tools existing in the world under the Hadoop umbrella and its orientations in addition to difficulties and modern methods of them to overcome challenges of big data in offline and real –time processing. Real-time Analytics accelerates decision-making along with providing access to business metrics and reporting. Comparison between Hadoop and spark has been also illustrated.
The silicon carbide/carbon fiber (SiC/CF) hybrid fillers were introduced to improve the electrical and thermal conductivities of the epoxy resin composites. Results of Fourier transform infrared spectroscopy revealed that the peaks at 3532 and 2850 cm−1 relate to carboxylic acid O–H stretching and aldehyde C–H stretching appearing deeper with an increased volume fraction of SiC. Scanning electron microscopic image shows a better interface bonding between the fiber and the matrix when the volume fraction of SiC particles are increased. As frequency increases from 102 Hz to 106 Hz, dielectric constants decrease slightly. Dissipation factor (tan δ) values keep low a
... Show MoreMultimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were thro
... Show MoreThe use of external posttensioning technique for strengthening reinforced concrete girders has been considerably studied by many researchers worldwide. However, no available data are seen regarding strengthening full-scale composite prestressed concrete girders with external posttensioned technique under static and repeated loading. In this research, four full-scale composite prestressed I-shape girders of 16 m span were fabricated and tested under static and repeated loading up to failure. Accordingly, two girders were externally strengthened with posttensioned strands, while the other two girders were left without strengthening. The experimental tests include deflection, cracking load, ultimate strength and strains at midspan, a
... Show MoreThe process for preparing activated carbon (AC) made from tea residue was described in this paper. Investigated were the physicochemical characteristics and adsorption efficiency of the produced AC. Activation with potassium hydroxide (KOH) and carbonization at 350 °C are the two key steps in the manufacturing of AC. The activated carbon was used to adsorb Tetracycline (TC). Different parameters were studied at room temperature to show their effects on the adsorption efficiency of TC. These parameters are the initial concentration of adsorbate TC, solution acidity pH, time of adsorption, and adsorbent dosage. The prepared active carbon was characterized using Fourier transform infrared spectroscopy (FTIR), scanning electron microscopy (
... Show More
Concentrated research topic in addressing variable vital to the work of offices of inspectors general, construction and scale effectiveness and efficiency is the organizational structure, which are important as is obvious to any researcher in the management and organization and this variable would affect the exercise task supervision and inspection of financial and administrative corruption and combat efficiently, Thus this effect will be placed in the fold ability to achieve goals. That the creation of the organizational structure and requirements to achieve harmony between its properties is creating step towards success. This research aims to analyze the characteristics and style o
In this study, the chamomile flowers (Matricaria recutitaL) which grow in Iraqi Kurdistan region during the seasons of (2008) are collected. The percentage of essential oil was determined by using steam distillation and the extraction of flowers performed with petroleum ether (70-80) ºC and methanol 70% using ultrasonic extraction. Total phenolic compounds were determined from methanol extracts by using Folin-Ciocalteu method. The extracts were evaluated by thin layer chromatography, ultraviolet absorption and the biological activities were evaluated through their antibacterial action against two types of bacteria using hole method. The flowers showed a composition of 0.071% ash, 0.4% essential oil, 3.2% non oily compounds, 4% oil, 1.9% mo
... Show MoreAbstract This study seeks to deal academically with how the EU treats clandestine immigration, through adopting a purley security approach, based on the European understanding of security threats posed to the security of communities and States in EU at all levels. So they agreed upon criminalizing this threat within the bloc while using repressive tools and steps to limit illegal immigrants flow to European territories. Accordingly, the EU gave the phenomen a security character. So it takes it from low politics level , that of employment and economic field to that of high politics, as a new security problem lying within a new security language embraced by ruling European elites, in other words EU touched on this issue as a speech act emp
... Show More
The main aim of this study is to evaluate the remaining oil in previously produced zones, locate the water productive zone and look for any bypassed oil behind casing in not previously perforated intervals. Initial water saturation was calculated from digitized open hole logs using a cut-off value of 10% for irreducible water saturation. The integrated analysis of the thermal capture cross section, Sigma and Carbon/oxygen ratio was conducted and summarized under well shut-in and flowing conditions. The logging pass zone run through sandstone Zubair formation at north Rumaila oil field. The zones where both the Sigma and the C/O analysis show high remaining oil saturation simila
... Show MoreCorrelation and path coefficient analysis were worked out for ten morphological traits in 30 three-way crosses of maize. Phenotypic and genotypic correlation analysis indicated that ear length; row numbers per ear, grain numbers per row, leaf area and leaves numbers had a positive significant correlation with grain yield per plant. Further partitioning of correlation coefficients into direct and indirect effects showed that traits days to silking, row numbers per row and leaves numbers had a positive direct effect on grain yield per plant. The traits ear length, grain numbers per row and leaf area had a maximum total effect on grain yield. Furthermore, PCA analysis has gave interested
In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show More