Database is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r
... Show MoreA factorial experiment (2× 3) in randomized complete block design (RCBD) with three replications was conducted to examine the effect of honeycomb selection method using three interplant distances on the vegetative growth, flowering, and fruit set of two cultivars of bean, Bronco and Strike. Interplant distances used were 75× 65 cm, 90× 78 cm, and 105× 91 cm (row× plant) represent short (high plant density), intermediate (intermediate plant density), and wide (low plant density) distance, respectively. Parameters used for selection were number of days from planting to the initiation of first flower, number of nodes formed prior to the onset of first flower, and number of main branches. Results showed significant superiority of the Strik
... Show Moreمستخلص البحث كان الهدف من البحث هو معرفة نسب نجاح وفشل بعض المهارات الهجومية المركبة من ثلاث مهارات بكرة السلة للشباب.، إذ لوحظ بأنه لا تكتمل عملية التقدم من خلال إتقان المهارات الأساسية الهجومية المفردة فقط وإنما في القدرة على الدقة والثبات في أداء الربط فيما بينها (التركيب)، وعكس ما تقدم يعد واحد من الأسباب التي تسبب ضعفاً في المستوى ومما يزيد من الأخطاء في الأداء تبعاً لذلك. وفي ضوء ما تقدم تم تصوير ست مباري
... Show MoreThe field efficacy of Actellic (organophosphate), Neporex (insect growth regulator) and
Ficam (carbamate), at the application rates of 2-4, 0.4-0.8 and 0.1-0.2 g AI/m2 respectively,
was studied against the larvae of Musca domestica L. Results of treatments involving horse
manure indicated that Actellic and Neporex produced sharp decrease of larval numbers (close
to zero) for 21d. But there was a slight recovery in larval numbers 14 d following treatment
with Ficam. The populations of predator mites were not affected due to insecticidal
applications.
Since the invention of the automobile, no aspect of American life, including crime and its control, has remained untouched by this far-reaching innovation in transportation. Vehicular "hot pursuit"-when suspects in motor vehicles use excessive speed in attempting to elude the police. Unfortunately, accounts of wild chases across crowded inner city streets, through tree-lined suburban boulevards, and over remote country roads are very real and not merely fictional material created for entertaining television and motion picture audiences. The specter of "hot pursuit," complete with screaming sirens and red or blue flashing lights, has become a recurring fact of modem life.1 So, too, are the mishaps involving police vehicles or the vehicles pu
... Show MoreIn this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation) structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of these procedures and compare them using generated data.
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show More