Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation. Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annotating the text, feature engineering is performed using techniques like term frequency/inverse document frequency (TF/IDF) and Bag of words (BOW). The relevant features are supplied to support vector machine (SVM) and Multinomial Naïve Bayesian (MNB) classifiers. The fine tuning of SVM is being done by taking kernel Linear, Poly and RBF. SVM showed better results than MNB by having precision of 70%, recall of 76.5%, F1 Score of 69.5% and overall Accuracy of 69.2%.
Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreWind energy is one of the most common and natural resources that play a huge role in energy sector, and due to the increasing demand to improve the efficiency of wind turbines and the development of the energy field, improvements have been made to design a suitable wind turbine and obtain the most energy efficiency possible from wind. In this paper, a horizontal wind turbine blade operating under low wind speed was designed using the (BEM) theory, where the design of the turbine rotor blade is a difficult task due to the calculations involved in the design process. To understand the behavior of the turbine blade, the QBlade program was used to design and simulate the turbine rotor blade during working conditions. The design variables suc
... Show MoreRenewable energy technology is growing fast especially photovoltaic (PV) system to move the conventional electricity generation and distribution towards smart grid. However, similar to monthly electricity bill, the PV energy producers can only monitor their energy PV generation once a month. Any malfuntion in PV system components may reduce the performance of the system without notice. Thus, developing a real-time monitoring system of PV production is very crucial for early detection. In addition, electricity consumption is also important to be monitored more frequently to increase energy savings awareness among consumers. Hardware based Internet-of-Thing (IoT) monitoring and control system is widely used. However, the implementation of
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThe simulation of passively Q-switching is four non – linear first order differential equations. The optimization of passively Q-switching simulation was carried out using the constrained Rosenbrock technique. The maximization option in this technique was utilized to the fourth equation as an objective function; the parameters, γa, γc and β as were dealt with as decision variables. A FORTRAN program was written to determine the optimum values of the decision variables through the simulation of the four coupled equations, for ruby laser Q–switched by Dy +2: CaF2.For different Dy +2:CaF2 molecules number, the values of decision variables was predicted using our written program. The relaxation time of Dy +2: CaF2, used with ruby was
... Show MoreThe most important contemporary issues which related to the survey of the influence of communication development technology to land use sustainability. The research aims to explain the changes that happened in the quality & land use activities performance by understanding the transformations due to modern technology and its impact on current uses and its impact on changing functional relationships between those uses to create new combinations or hybrid uses.Research will follow the analytical descriptive approach in presenting the problem of research. Research has several conclusions & recommendations, one of conclusions is the change of the place concept and its relation to changing the concept of land use and its sustai
... Show MoreABSTRACT
This study aimed to choose top stocks through technical analysis tools specially the indicator called (ratio of William index), and test the ability of technical analysis tools in building a portfolio of shares efficient in comparison with the market portfolio. These one technical tools were used for building one portfolios in 21 companies on specific preview conditions and choose 10 companies for the period from (March 2015) to (June 2017). Applied results of the research showed that Portfolio yield for companies selected according to the ratio of William index indicator (0.0406) that
... Show MoreThe utilization of artificial intelligence techniques has garnered significant interest in recent research due to their pivotal role in enhancing the quality of educational offerings. This study investigated the impact of employing artificial intelligence techniques on improving the quality of educational services, as perceived by students enrolled in the College of Pharmacy at the University of Baghdad. The study sample comprised 379 male and female students. A descriptive-analytical approach was used, with a questionnaire as the primary tool for data collection. The findings indicated that the application of artificial intelligence methods was highly effective, and the educational services provided to students were of exceptional
... Show Moreالمقدمة
ما كان للعرب في تاريخهم الطويل قبل الإسلام، وبعده أن يبدعوا ما أبدعوه في صنع الحضارة وتاريخها ، لولا اعتمادهم أنظمة تربوية سليمة في التنشئة والتعليم، ولولا ان عصورهم قد عرفت مربين ، ومعلمين، وعلماء اسهموا في تقديم نظريات تربوية آثرت في تقدم الفكر التربوي وفي تقدم الإنسان.
فمن الطبيعي أن تكون للعرب تربية منظمة، ولمفكريهم عناية بهذه التربية في كل حقب تاريخهم الطويل، ما د
... Show MoreThe status of science and scientists in the Arab Islamic state a prominent place was a signal the Koran to this position by encouraging people to seek knowledge as well asgive a prominent place for science and scientists, as confirmed by the Sunnah to this position through the Hadith as well as through height and this is what encourages peopleto take care of these things are important to the progress of the state and society and to