Preferred Language
Articles
/
jcois-2113
Ruling on selling big data (Authentical Fiqh Study): Ruling on selling big data (Authentical Fiqh Study)
...Show More Authors

Abstract:

Research Topic: Ruling on the sale of big data

Its objectives: a statement of what it is, importance, source and governance.

The methodology of the curriculum is inductive, comparative and critical

One of the most important results: it is not permissible to attack it and it is a valuable money, and it is permissible to sell big data as long as it does not contain data to users who are not satisfied with selling it

 Recommendation: Follow-up of studies dealing with the provisions of the issue

Subject Terms

Judgment, Sale, Data, Mega, Sayings, Jurists

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 09 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
STRATEGIC VIGILANCE AND ITS IMPACT ON THE QUALITY OF MANAGEMENT DECISION SURVEY STUDY IN THE SUPREME JUDICIAL COUNCIL (DEPARTMENT OF FINANCE & ADMINISTRATION): STRATEGIC VIGILANCE AND ITS IMPACT ON THE QUALITY OF MANAGEMENT DECISION SURVEY STUDY IN THE SUPREME JUDICIAL COUNCIL (DEPARTMENT OF FINANCE & ADMINISTRATION)
...Show More Authors

The Objective of the research is to identify the Strategic Vigilance and effect in the Managerial Decision Quality, by knowing the interest of the organization influence the Strategic Vigilance in the Managerial Decision Quality, adopted four dimensions of the Strategic Vigilance is (Environmental Vigilance, Commercial, Competitiveness & Technology) to indicate the extent individually and collectively impact in the Managerial Decision Quality, The questionnaire was used as a main tool to survey the views of a sample of 45 managers, was named Supreme Judicial Council society for research, and the statistical program SPSS, and research found a clear positive impact dimensions Strategic Vigilance in the Manageri

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
الرواة الذين حكم البخاري بضعفيم في تارخيه الكبري ًالضعفاء الصغري وقواهم ابو حاتم فيما رواه عنه ابنه في كتابه الجرح والتعديل
...Show More Authors

Narrators who ruled Bukhari weak
In its great history, the small weak
And their strength Abu Hatim narrated by his son in his book wound and amendment

View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Study of Television Advertising and its Impact on Consumer Behavior in a Sample of Children Aged 9-12 Years
...Show More Authors

The aim of this study was to study TV advertising and consumer behavior in children and to meet the needs of children. The study included 100 children from Baghdad who were randomly selected from different regions ranging in age from 9-12 years of both males and females. The current research was based on the interview and the completion of special forms prepared for this purpose. This age group was selected for the rare studies conducted on television advertising and limited to different sectors. Data on age and sex were documented, as the results of this study proved The afternoon period was the preferred period for watching the TV show in males, where it was 22%, while the morning period was the female favorite, and it was 23%. The ind

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study of the Effect of Exhaust Gas Recirculation (EGR) and Injection Timing on Emitted Emissions at Idle Period
...Show More Authors

Abstract

Heavy-duty diesel vehicle idling consumes fossil fuel and reduces atmospheric quality at idle period, but its restriction cannot simply be proscribed. A comprehensive tailpipe emissions database to describe idling impacts is not yet available. This paper presents a substantial data set that incorporates results from DI multi-cylinders Fiat diesel engine. Idle emissions of CO, hydrocarbon (HC), oxides of nitrogen (NOx), smoke opacity, carbon dioxide (CO2) and noise have been reported, when three EGR ratios (10, 20 and 30%) were added to suction manifold.

CO2 concentrations increased with increasing idle time and engine idle speed, but it didn’t show clear effect for IT adva

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
Alternative Sanctions and their Impact on Societal Security: A Field Study in the Directorate of Juveniles Reformatory in Baghdad
...Show More Authors

Crime is one of the most severe challenges facing States, and strives to find preventive measures, reduce its seriousness, and prevent them; due to developments, crimes have increased, and emerging new patterns of crimes, there is an urgent need to prevent crimes and reduce their effects. Modernizing its punitive system and diverting it to correctional rehabilitative justice to redress the prejudice caused by the crime and rehabilitate the convicted person by using alternative measures to short-term imprisonment. This research emphasizes alternative sanctions' value to minimizing short-term imprisonment penalties and their impact on societal security through several goals like, the negative consequences, justifications, and alternatives

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The risks of derivatives contracts and their reflections on the global financial crisis Analytical study in (Toronto – Dominion) bank
...Show More Authors

The research tacklets the role of risks arising from the excessive use of derivative contracts for trading in financial crises, including the recent global financial crisis in (2008) which is known the mortgage crisis.

   In order to prove the hypothesis of the research, the risk index of derivative contracts has been chosed as expressed in the measure of (value at risk) to be the main field for testing the hypothesis of research. The duration of the contract  has been also chased  for (15) years between the years (2001- 2015), the period preceding the global financial crisis, while the second represents the period of time that followed. The research reached a number of conclusions, bu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
IMPLEMENTATION OF THE SKIP LIST DATA STRUCTURE WITH IT'S UPDATE OPERATIONS
...Show More Authors

A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.

View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
2015 Ieee Conference On Computational Intelligence In Bioinformatics And Computational Biology (cibcb)
Granular computing approach for the design of medical data classification systems
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Oct 09 2023
Journal Name
2023 Ieee 34th International Symposium On Software Reliability Engineering Workshops (issrew)
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF