Provides the style of benchmarking the best possible use whenevaluating the performance and evaluation, as well as improved performance,due to its consistency with the principles of good evaluation of theperformance, an extension of the completion of several functions of the timeand cost less, thereby increasing the efficiency of the management of theinstitutions, especially institutions, the media, as it became public the future ofthe message sender to the same time Zaorosaúl new media is challenging thetraditional media of what distinguishes this new interactive media and mass ledto this transition . However, the media Aljdidhoosaúl traditional mediacontinue to coexist and reinforce each Menhmaalakhr, for his wealth offreedom of opinion media among the public the future of the message and thesender has reached the interactive mass is enhanced thanks to the new media byusing the means of non-conventional. Research has come to a set ofconclusions, the most important that when assessing and evaluating performedusing the tool effective and appropriate tool like Almgarnaa to Marjaahllaalamis the new media complement to traditional media and enhanced its strengthsMtlavia weaknesses, because he focuses on the satisfaction of the public (theconsumer (by strengthening the role of the receiver of the message sender hasthis Majolh (new media), a benchmark for the performance of the media ininstitutions media and make it a standard of conduct administrative sensewithin the organizational structure, embodying the administrative contactthrough cognition of the importance of the media, especially interactive mass..
The conventional procedures of clustering algorithms are incapable of overcoming the difficulty of managing and analyzing the rapid growth of generated data from different sources. Using the concept of parallel clustering is one of the robust solutions to this problem. Apache Hadoop architecture is one of the assortment ecosystems that provide the capability to store and process the data in a distributed and parallel fashion. In this paper, a parallel model is designed to process the k-means clustering algorithm in the Apache Hadoop ecosystem by connecting three nodes, one is for server (name) nodes and the other two are for clients (data) nodes. The aim is to speed up the time of managing the massive sc
... Show MoreIn this paper, a design of the broadband thin metamaterial absorber (MMA) is presented. Compared with the previously reported metamaterial absorbers, the proposed structure provides a wide bandwidth with a compatible overall size. The designed absorber consists of a combination of octagon disk and split octagon resonator to provide a wide bandwidth over the Ku and K bands' frequency range. Cheap FR-4 material is chosen to be a substate of the proposed absorber with 1.6 thicknesses and 6.5×6.5 overall unit cell size. CST Studio Suite was used for the simulation of the proposed absorber. The proposed absorber provides a wide absorption bandwidth of 14.4 GHz over a frequency range of 12.8-27.5 GHz with more than %90 absorp
... Show MoreThe unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreCarbon fibre reinforced polymers are widely used to strengthen steel structural elements. These structural elements are normally subjected to static, dynamic and fatigue loadings during their life-time. A number of studies have focused on the characteristics of CFRP sheets bonded to steel members under static, dynamic and fatigue loadings. However, there is a gap in understanding the bonding behaviour between CFRP laminates and steel members under impact loading. This paper shows the effect of different load rates from quasi-static to 300 × 103 mm/min on this bond. Two types of CFRP laminate, CFK 150/2000 and CFK 200/2000, were used to strengthen steel joints using Araldite 420 epoxy. The results show a significant bond strength enhancemen
... Show MoreThe current study was designed to explore the association between the pigments production and biofilm construction in local Pseudomonas aeruginosa isolates. Out of 143 patients suffering from burns, urinary tract infections (UTI), respiratory tract infections and cystic fibrosis obtained from previous study by Mahmood (2015), twenty two isolates (15.38%) were identified from (11) hospitals in Iraq, splitted into three provinces, Baghdad, Al-Anbar and Karbala for the duration of June 2017 to April 2018. Characterization was carried out by using microscopical, morphological and biochemical methods which showed that all these isolates belong to P. aeruginosa. Screening of biofilm production isolates was carried out by usi
... Show MoreThere is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show More