Preferred Language
Articles
/
3PpChpkBMF18lwyZjcqD
A Developmental-Longitudinal Study of Request External Modifiers in Authentic and Elicited Data
...Show More Authors

Crossref
View Publication
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Big-data Management using Map Reduce on Cloud: Case study, EEG Images' Data
...Show More Authors

Database is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
Moderation in Omani External political behavior (1970-2020)
...Show More Authors

Receipt date:08/26/2020 accepted date:9/8/2020 Publication date:12/31/2021

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

        The research entitled (Moderation in Omani External Political Behavior 1970-2020. contained introduction and two sections conclusion and recommendations. The introduction included a general overview of the topic, and the importance of the political behavior o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 21 2022
Journal Name
Environmental Science And Pollution Research
Development of new computational machine learning models for longitudinal dispersion coefficient determination: case study of natural streams, United States
...Show More Authors

View Publication
Crossref (27)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
European Journal Of General Medicine
The Value of Longitudinal Strain versus Coronary Angiography in Detection of Coronary Artery Disease
...Show More Authors

Aims: The aim of this study was to evaluate the value and accuracy of longitudinal strain in detection of coronary artery disease compared to coronary angiography. Results: The left ventricular longitudinal strain-speckle tracking showed evidence of stenosis of left anterior descending artery, circumflex artery and right coronary artery in (86.1%), (76.4%), and (84.7%) respectively. For the stenosis in left anterior descending artery, the current study showed that the longitudinal strain was a good predictor for presence of significant stenosis with a sensitivity of (93.8%), specificity (75%) and accuracy (91.7%) compared with coronary angiography. For the stenosis in right coronary artery, the left ventricular longitudinal strain had

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sat Jul 01 2017
Journal Name
2017 Computing Conference
Protecting a sensitive dataset using a time based password in big data
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Xi'an University Of Architecture & Technology
The Effect of (Landa) Model on Acquiring Grammatical Concepts Upon His Request to the College of Administration and Economics University of Bagdad
...Show More Authors

The current research aims to identify the impact of the (Landa) model on acquiring grammatical concepts among students of the College of Administration and Economics, University of Baghdad, and to achieve the research goal, the researcher has set the following hypotheses: There are no statistically significant differences at the level of significance (0.05) between the average degrees Students of the experimental group who studied the Arabic language according to the (Landa) model and the marks of the students of the control group who studied the same subject in the usual way in the post test, there are no statistically significant differences at the level of significance (0.05) in the average differences between the test scores before and

... Show More
Preview PDF
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Comparative Study in Attitudes towards the Covid-19 Vaccine According to Locus of Control (Internal - External) of University Students
...Show More Authors

Abstract

The current research aims to identify the attitudes towards the Covid-19 vaccine and the Locus of Control (internal, external) among university students, to identify the significance of the difference in attitudes towards the Covid-19 vaccine, the significance of the difference in the Locus of Control (internal, external) according to the gender variable (male, female), and to identify the significance of the difference in students’ attitudes towards Covid-19 vaccine according to the Locus of Control (internal, external). To achieve the objective of the research, the researcher developed two scales, a scale of (20) items to identify the attitudes toward a covid-19 vaccine, and a scale of the locus of c

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Revealing the potentials of 3D modelling techniques; a comparison study towards data fusion from hybrid sensors
...Show More Authors
Abstract<p>The vast advantages of 3D modelling industry have urged competitors to improve capturing techniques and processing pipelines towards minimizing labour requirements, saving time and reducing project risk. When it comes to digital 3D documentary and conserving projects, laser scanning and photogrammetry are compared to choose between the two. Since both techniques have pros and cons, this paper approaches the potential issues of individual techniques in terms of time, budget, accuracy, density, methodology and ease to use. Terrestrial laser scanner and close-range photogrammetry are tested to document a unique invaluable artefact (Lady of Hatra) located in Iraq for future data fusion sc</p> ... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Suggested Model For Using Customer's Data Management Information System/ A Case Study In Al-Rasheed Bank/General Agent Office/ Nothren Reigon
...Show More Authors

This study aim to  identify the concept of  web based information systems since its one of the important topics that is  usually omitted by our organizations, in addition to,  designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.

This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat

... Show More
View Publication Preview PDF
Crossref