Preferred Language
Articles
/
bsj-5251
Detecting Textual Propaganda Using Machine Learning Techniques
...Show More Authors

Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation.  Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annotating the text, feature engineering is performed using techniques like term frequency/inverse document frequency (TF/IDF) and Bag of words (BOW). The relevant features are supplied to support vector machine (SVM) and Multinomial Naïve Bayesian (MNB) classifiers. The fine tuning of SVM is being done by taking kernel Linear, Poly and RBF. SVM showed better results than MNB by having precision of 70%, recall of 76.5%, F1 Score of 69.5% and overall Accuracy of 69.2%.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Study the Nuclear Structure of Some Even-Even Ca Isotopes Using the Microscopic Theory
...Show More Authors

The root-mean square-radius of proton, neutron, matter and charge radii, energy level, inelastic longitudinal form factors, reduced transition probability from the ground state to first-excited 2+ state of even-even isotopes, quadrupole moments, quadrupole deformation parameter, and the occupation numbers for some calcium isotopes for A=42,44,46,48,50 are computed using fp-model space and FPBM interaction. 40Ca nucleus is regarded as the inert core for all isotopes under this model space with valence nucleons are moving throughout the fp-shell model space involving 1f7/2, 2p3/2, 1f5/2, and 2p1/2 orbits. Model space is used to present calculations using FPBM intera

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Nasaq Journal
Iraqi EFL Students’ Attitudes towards Online Learning
...Show More Authors

Online learning is not a new concept in education, but it has been used extensively since the Covid-19 pandemic and is still in use now. Every student in the world has gone through this learning process from the primary to the college levels, with both teachers and students conducting instruction online (at home). The goal of the current study is to investigate college students’ attitudes towards online learning. To accomplish the goal of the current study, a questionnaire is developed and adjusted before being administered to a sample of 155 students. Additionally, validity and reliability are attained. Some conclusions, recommendations, and suggestions are offered in the end.

Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Mon Jul 28 2025
Journal Name
Journal Of Physical Education
The Effect of Constructive Learning Model on Cognitive Achievement and Learning dribbling Skill in Soccer for Secondary School Students
...Show More Authors

The research aimed at identifying the effect of using constructive learning model on academic achievement and learning soccer dribbling Skill in 2nd grade secondary school students. The researcher used the experimental method on (30) secondary school students; 10 selected for pilot study, 20 were divided into two groups. The experimental group followed constructive learning model while the controlling group followed the traditional method. The experimental program lasted for eight weeks with two teaching sessions per week for each group. The data was collected and treated using SPSS to conclude the positive effect of using constructive learning model on developing academic achievement and learning soccer dribbling Skill in 2nd grade seconda

... Show More
View Publication
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Techniques of Acting Performance in Fantasy Theatrical Show
...Show More Authors

View Publication
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Application Artificial Forecasting Techniques in Cost Management (review)
...Show More Authors

For the duration of the last few many years many improvement in computer technology, software program programming and application production had been followed with the aid of diverse engineering disciplines. Those trends are on the whole focusing on synthetic intelligence strategies. Therefore, a number of definitions are supplied, which recognition at the concept of artificial intelligence from exclusive viewpoints. This paper shows current applications of artificial intelligence (AI) that facilitate cost management in civil engineering tasks. An evaluation of the artificial intelligence in its precise partial branches is supplied. These branches or strategies contributed to the creation of a sizable group of fashions s

... Show More
View Publication Preview PDF
Publication Date
Wed May 31 2023
Journal Name
Iraqi Geological Journal
A Survey of Infill Well Location Optimization Techniques
...Show More Authors

The maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Fol

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Computer-based plagiarism detection techniques: A comparative study
...Show More Authors

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and

... Show More
Publication Date
Wed Jan 20 2021
Journal Name
Plant Archives
New Irrigation Techniques for Precision Agriculture: A Review
...Show More Authors

Precision irrigation applications are used to optimize the use of water resources, by controlling plant water requirements through using different systems according to soil moisture and plant growth periods. In precision irrigation, different rates of irrigation water are applied to different places of the land in comparison with traditional irrigation methods. Thus the cost of irrigation water is reduced. As a result of the fact that precise irrigation can be used and applied in all irrigation systems, it spreads rapidly in all irrigation systems. The purpose of the Precision Agriculture Technology System (precision irrigation) , is to apply the required level of irrigation according to agricultural inputs to the specified location , by us

... Show More
Preview PDF