Preferred Language
Articles
/
ijs-2747
A Parallel Clustering Analysis Based on Hadoop Multi-Node and Apache Mahout

     The conventional procedures of clustering algorithms are incapable of overcoming the difficulty of managing and analyzing the rapid growth of generated data from different sources. Using the concept of parallel clustering is one of the robust solutions to this problem. Apache Hadoop architecture is one of the assortment ecosystems that provide the capability to store and process the data in a distributed and parallel fashion. In this paper, a parallel model is designed to process the k-means clustering algorithm in the Apache Hadoop ecosystem by connecting three nodes, one is for server (name) nodes and the other two are for clients (data) nodes. The aim is to speed up the time of managing the massive scale of healthcare insurance dataset with the size of 11 GB and also using machine learning algorithms, which are provided by the Mahout Framework. The experimental results depict that the proposed model can efficiently process large datasets. The parallel k-means algorithm outperforms the sequential k-means algorithm based on the execution time of the algorithm, where the required time to execute a data size of 11 GB is around 1.847 hours using the parallel k-means algorithm, while it equals 68.567 hours using the sequential k-means algorithm. As a result, we deduce that when the nodes number in the parallel system increases, the computation time of the proposed algorithm decreases.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 01 2022
Journal Name
Jordan Journal Of Mechanical And Industrial Engineering
Empact of Discrete Multi-arc Rib Roughness on the Effective Efficiency of a Solar Air Heater

Artificial roughness on the absorber plate of a Solar Air Heater (SAH) is a popular technique for increasing its effective efficiency. The study investigated the effect of geometrical parameters of discrete multi-arc ribs (DMAR) installed below the SAH absorber plate on the effective efficiency. The effects of major roughness factors, such as number of gaps (Ng = 1-4), rib pitch (p/e = 4-16), rib height (e/D = 0.018-0.045), gab width (wg/e = 0.5-2), angle of attack ( = 30-75), and Reynolds number (Re= 2000-20000) on the performance of a SAH are studied. The performance of the SAH is evaluated using a top-down iterative technique. The results show that as Re rises, SAH-effective DMAR's efficiency first ascends to a specified value o

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Karbala Journal Of Physical Education Sciences
The effect of using a designed device to develop the technical performance of the descending landing skill facing with half a cycle on the parallel device of the technical men's

The research included five sections containing the first section on the introduction of the research and its importance and was addressed to the importance of the game of gymnastic and skilled parallel effectiveness and the importance of learning, but the problem of research that there is a difference in learning this skill and difficulty in learning may be one of the most important reasons are fear and fear of falling and injury, And a lack of sense of the movement of the movement is one of the obstacles in the completion of the skill and the goal of research to design a device that helps in learning the skill of descending Almtor facing with half a cycle according to the typical locomotor track on the parallel device of the technical men'

... Show More
Preview PDF
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Scopus (14)
Crossref (5)
Scopus Crossref
View Publication
Publication Date
Thu Jun 16 2022
Journal Name
Al-khwarizmi Engineering Journal
Path Planning and Obstacle Avoidance of a Mobile Robot based on GWO Algorithm

planning is among the most significant in the field of robotics research.  As it is linked to finding a safe and efficient route in a cluttered environment for wheeled mobile robots and is considered a significant prerequisite for any such mobile robot project to be a success. This paper proposes the optimal path planning of the wheeled mobile robot with collision avoidance by using an algorithm called grey wolf optimization (GWO) as a method for finding the shortest and safe. The research goals in this study for identify the best path while taking into account the effect of the number of obstacles and design parameters on performance for the algorithm to find the best path. The simulations are run in the MATLAB environment to test the

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
A Pseudo-Random Number Generator Based on New Hybrid LFSR and LCG Algorithm

      In many areas, such as simulation, numerical analysis, computer programming, decision-making, entertainment, and coding, a random number input is required. The pseudo-random number uses its seed value. In this paper, a hybrid method for pseudo number generation is proposed using Linear Feedback Shift Registers (LFSR) and Linear Congruential Generator (LCG). The hybrid method for generating keys is proposed by merging technologies. In each method, a new large in key-space group of numbers were generated separately. Also, a higher level of secrecy is gained such that the internal numbers generated from LFSR are combined with LCG (The adoption of roots in non-linear iteration loops). LCG and LFSR are linear structures and outputs

... Show More
Scopus (8)
Crossref (5)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
Crossref
View Publication
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Scopus (1)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Sun Dec 29 2019
Journal Name
Iraqi Journal Of Science
Phylogenetic tree analysis based on the 16S sequence alignment for Klebsiella spp. isolated from different sources

16S ribosomal RNA (16S rRNA) gene sequences used to study bacterial phylogeny and taxonomy have been by far the most common housekeeping genetic marker utilized for identification and ancestor determination. This study aimed to investigate, for the first time, the relationship between Klebsiella spp. isolated from clinical and environmental samples in Iraq.

Fifty Klebsiella spp. isolates were isolated from clinical and environmental sources. Twenty-five isolates were collected from a fresh vegetable (Apium graveolens) and 25 from clinical samples (sputum, wound swab, urine). Enteric bacteria were isolated on selective and differential media and identified by an automatic identification system, vitek-2.

... Show More
Scopus (4)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Sep 29 2019
Journal Name
Iraqi Journal Of Science
Phylogenetic tree analysis based on the 16S sequence alignment for Klebsiella spp. isolated from different sources

16S ribosomal RNA (16S rRNA) gene sequences used to study bacterial phylogeny and taxonomy have been by far the most common housekeeping genetic marker utilized for identification and ancestor determination. This study aimed to investigate, for the first time, the relationship between Klebsiella spp. isolated from clinical and environmental samples in Iraq.

     Fifty Klebsiella spp. isolates were isolated from clinical and environmental sources. Twenty-five isolates were collected from a fresh vegetable (Apium graveolens) and 25 from clinical samples (sputum, wound swab, urine). Enteric bacteria were isolated on selective and differential media and identified by an automatic identif

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
View Publication Preview PDF