Database is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG researchers and specialist with an easy and fast method of handling the EEG big data.
This research aims to explore the status effects of the Sudden, and gradual of AI-Driven Cyber Security (AIDC), Big data analytics and Business Intelligence (BI) The strategic flexibility (SF) and entrepreneurship (ENT) on Iraqi internet services providers ISPs. The work fills an important lacunae in what the advanced dimensions of technology have with regard to its influencing both SF and ENT outcomes in developing economy context, where empirical evidences are scant. A cross-sectional survey based on a quantitative research methodology was conducted on 113 professionals in Iraqi telecommunication sector. A partial least squares structural equation modeling (PLS-SEM) approach was adopted to examine 10 hypotheses concerning the relationship
... Show MoreCloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show MoreThe topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and a
... Show MoreAccording to the measuring the relationship between organizational loyalty and job satisfaction among staff members at one college in the higher education ministry in Iraq by using exploratory factor analysis methods to extraction the components which have the major effects on the variables related to organizational loyalty and job satisfaction .
The research contains four basic topics، the first section related to methodology and regarding the conceptual framework it is discussed in the second section، and the third section concentrated at the presentation and the analysis Scientific results and practical results are section presented in the fourth.
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreMost recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or
... Show MoreThe integration of Artificial Intelligence with Big Data Analytics is one of the most groundbreaking developments that could change the face of educational sustainability in higher education.. Using AI and Big Data technologies not only makes the educational process more efficient but also changes the way people learn and thus opens the door for educators and institutions to make decisions based on the data. The document imparts the manner that the use of AI and the digital revolution can remove student requirements, execute the efficiency of the curriculum, and acquire the balance of educational resources through a majority of instances and the latest developments in that field. Furthermore, the paper, along with the issues of morality wit
... Show MoreIndicative supervision represents the comparison between direct intervention (acquisition, nationalism) and participation through rules.
The last financial crisis reflected our needs for different approaches of supervision consist with our goals, but the crisis reveals also number of sounds requested and pressured toward direct control (Intervention via forces) through government acquisition and nationalization.
This study attempts to deal with crisis lessons, in the field of choice between indicative and direct supervision which government authorities used to reduce the bad effect on the monetary firms.
Iraqi banks suffered from high levels of direct co
... Show MoreThe research aims to measure the efficiency of health services Quality in the province of Karbala, using the Data Envelopment analysis Models in ( 2006). According to these models the degree of efficiency ranging between zero and unity. We estimate Scale efficiency for two types of orientation direction, which are input and output oriented direction.
The results showed, according Input-oriented efficiency that the levels of Scale efficiency on average is ( 0.975), in the province of Karbala. While the index of Output-oriented efficiency on average is (o.946).