The aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached several results, namely the application of ornamentation and geometric abstraction through the entrance of mathematical abstraction based on individual perception in Kant's philosophy of sublimeness. Community icons and inherited traditions were also utilized through the entrance of life events based on collective experience in pragmatic philosophy. Both approaches lead to Aesthetic excitement and a sense of pleasure due to its access to human realities.
Abstract
The research aims at the relationship between Servant leadership dimensions test as an independent variable and an organizational trust as a variable dependent. Thus it was necessary to answer the following question: Is there a correlation relationship and impact between Servant leadership dimensions and organizational trust? To investigate the contents of the answer, the researcher selected a group of employees in Oil Products Distribution Company / Baghdad. The researcher adopted the analytical descriptive approach in completing his research which dealt with a random sample of (190) individuals representing the research society out of the total number of (376) person from the middle and high Leaders. Depending
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreThis work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera
... Show MoreThe estimation of the parameters of Two Parameters Gamma Distribution in case of missing data has been made by using two important methods: the Maximum Likelihood Method and the Shrinkage Method. The former one consists of three methods to solve the MLE non-linear equation by which the estimators of the maximum likelihood can be obtained: Newton-Raphson, Thom and Sinha methods. Thom and Sinha methods are developed by the researcher to be suitable in case of missing data. Furthermore, the Bowman, Shenton and Lam Method, which depends on the Three Parameters Gamma Distribution to get the maximum likelihood estimators, has been developed. A comparison has been made between the methods in the experimental aspect to find the best meth
... Show MoreThis research aims at identifying the level of Moral Awareness and the level of Authoritarian Parenting Style of Secondary School Students in Baghdad. Additionally, the study seeks to identify the significant difference between these two variables in term of gender (male-female), as well as the correlation between Moral Awareness and Authoritarian Parenting Style. To do this, the researchers have adopted the scale of moral awareness prepared by the (Assl 2014), which the number of its items was finalized of (28) items. As for the Authoritarian Parenting Style scale, the researcher designed a questionnaire of (22) items as the number of its finalized form. The two instruments were applied on a sample of (140) male and female Students who
... Show MoreCompression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil
... Show MoreAbstract: -
The concept of joint integration of important concepts in macroeconomic application, the idea of cointegration is due to the Granger (1981), and he explained it in detail in Granger and Engle in Econometrica (1987). The introduction of the joint analysis of integration in econometrics in the mid-eighties of the last century, is one of the most important developments in the experimental method for modeling, and the advantage is simply the account and use it only needs to familiarize them selves with ordinary least squares.
Cointegration seen relations equilibrium time series in the long run, even if it contained all the sequences on t
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreAqueous extract of poppy plant) Papaver nudicaule) with five concentrations (50, 100, 150, 200 and 250) mg/l were used to anesthetize fingerlings of the common carp Cyprinus carpio (Mean total length 8.91 ± 0.31 cm and mean total weight 7.72 ± 1.19 gm) instead of the traditional use of MS-222. Results showed that extracted solution of poppy have partial and overall anesthesia effect on these fishes with inverse relationship between the concentrations used and the time needed to reach partial and overall anesthesia, and also direct relationship between concentrations used and time needed for fish recovery. Best results were obtained by using a concentration of 250 mg/l, where time for partial anesthesia was 8 ± 1.52 m
... Show More