Preferred Language
Articles
/
tRdQPo4BVTCNdQwCrD6b
Data Analytics and Blockchain: A Review
...Show More Authors

Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and exploring how specific features of this new technology may transform traditional business methods. The primary objectives of this study are to summarize the significant Blockchain techniques used thus far, identify current challenges and barriers in this field, determine the limitations of each paper that could be used for future development, and assess the extent to which Blockchain and data analytics have been effectively used to evaluate performance objectively. Moreover, we aim to identify potential future research paths and suggest new criteria in this burgeoning discipline through our review. Index Terms— Blockchain, Distributed Database, Distributed Consensus, Data Analytics, Public Ledger.

Crossref
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Thu May 20 2021
Journal Name
International Journal Of Research In Social Sciences And Humanities
SUBJECT REVIEW: ACCULTURATION AND SECOND LANGUAGE ACQUISITION
...Show More Authors

This paper aims to give an overview of acculturation in the literature by means of its explicit definitions, main characteristics, and categorical process. It also foreshadows the significance of acquiring novice culture with particular connection to second language acquisition. Schumann and John Berry underscored acculturation each with its own model of acculturation. In the case of this review, you will realize that Schumann's two main aspects are firmly rooted in berry's model of acculturation as an exclusive description in relation to second language acquisition. Steven Krashen outlined acquiring language from the intellectual and linguistic view of learning, whereas Micheal Long demanded for communication in social perspective. It has

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication
Publication Date
Fri Jul 15 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
SUBJECT REVIEW: APPLIED LINGUISTICS AND LANGUAGE TEACHING
...Show More Authors

Language mirrors understanding of the same or other culture. Meaning is hardly encoded in the world community. Some linguists cannot solve language problems because of its abstractedness. Language communicators learn the second or foreign language at schools for three reasons. First, English is not their first language. Second, they have little or no educational background in experiencing what they know in another language. Third, they have not improved their communication skills in English. Analyzing the language as a mean of communication would not be learned enough without its practice. This paper gives an exclusive preview of applied linguistics. It defines the conversion of different areas of the study of language with second o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 03 2019
Journal Name
Al-kindy College Medical Journal
Low Back Pain and Obesity (Review Article)
...Show More Authors

Low back pain a major causes of morbidity throughout the world and it is a most debilitating condition ,and can lead to decreased physical function ,compromised quality of life, and psychological distress. Obesity is nowadays a pandemic condition. Obese subjects are commonly characterized by musculoskeletal disorders and particularly by non-specific LBP. However, the relationship between obesity and LBP remain to date unsupported by objective measurements of mechanical behavior of spine and it is morphology in obese subjects.                                     Key words: obesity, low back pain,  

Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Wed Apr 03 2019
Journal Name
Al-kindy College Medical Journal
Low Back Pain and Obesity (Review Article)
...Show More Authors

Low back pain a major causes of morbidity throughout the world and it is a most debilitating condition ,and can lead to decreased physical function ,compromised quality of life, and psychological distress.

Obesity is nowadays a pandemic condition. Obese subjects are commonly characterized by musculoskeletal disorders and particularly by non-specific LBP. However, the relationship between obesity and LBP remain to date unsupported by objective measurements of mechanical behavior of spine and it is morphology in obese subjects.                                   &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
DEO: A Dynamic Event Order Strategy for t-way Sequence Covering Array Test Data Generation
...Show More Authors

Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of

... Show More
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Sensors
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
...Show More Authors

Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost

... Show More
View Publication Preview PDF
Scopus (35)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
DEO: A Dynamic Event Order Strategy for t-way Sequence Covering Array Test Data Generation
...Show More Authors

Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of cove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref