In recent years, social media has been increasing widely and obviously as a media for users expressing their emotions and feelings through thousands of posts and comments related to tourism companies. As a consequence, it became difficult for tourists to read all the comments to determine whether these opinions are positive or negative to assess the success of a tourism company. In this paper, a modest model is proposed to assess e-tourism companies using Iraqi dialect reviews collected from Facebook. The reviews are analyzed using text mining techniques for sentiment classification. The generated sentiment words are classified into positive, negative and neutral comments by utilizing Rough Set Theory, Naïve Bayes and K-Nearest Neighbor methods. After experimental results, it was determined that out of 71 tested Iraqi tourism companies, 28% from these companies have very good assessment, 26% from these companies have good assessment, 31% from these companies have medium assessment, 4% from these companies have acceptance assessment and 11% from these companies have bad assessment. These results helped the companies to improve their work and programs responding sufficiently and quickly to customer demands.
In this study, the results of x-ray diffraction methods were used to determine the Crystallite size and Lattice strain of Cu2O nanoparticles then to compare the results obtained by using variance analysis method, Scherrer method and Williamson-Hall method. The results of these methods of the same powder which is cuprous oxide, using equations during the determination the crystallite size and lattice strain, It was found that the results obtained the values of the crystallite size (28.302nm) and the lattice strain (0.03541) of the variance analysis method respectively and for the Williamson-Hall method were the results of the crystallite size (21.678nm) and lattice strain (0.00317) respectively, and Scherrer method which gives the value of c
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe objective of this research is to study the effect of human capital dimensions (knowledge, skills, abilities, value) and his management dimensions (leadership practices, employess engagement, access knowledge, workforce optimization, learning capacity) with the Office of the Inspector General's staff - the Iraqi Ministry of Culture, has depended questionnaire as a tool in data and information related to research collection, as distributed to a sample of (63) individuals were distributed in positions (director, director of the Division of employees) the search data analysis using ready-statistical program (spss) the researcher used hypothesis testing and correlation c
... Show MoreIn this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.
In dealing with media management phenomenon, concept and elements, we have tried, as much as possible, to build an abstract concept that can be analyzed and measured by analyzing the elements and components of the concept mentioned and explain it.
Before further consideration of the management of media campaigns, it is necessary to restore some points of media management so as not to understand the subject of campaign management as if it is independent of the concept of media management and the objectives that we seek to ensure its achievement. As we have noted that the concept of media management frames the administration mentioned as:
- Authority to manage the media institution.
- Operations supervised by the me
... Show MoreTo track scientific developments and achievements, for example, that (achieved) after the Second World War until this moment, make each of us in absolute amazement. He invented the computer, discovered the genetic factor (DNA), and discovered the drawing of the human genetic map, going up to the moon, penetrating outer space by satellites, getting close to distant planets, producing jet planes, microprocessors, and lasers, in addition to enabling a person to create a layer of The material is extremely thin and extremely imaginative. It has also become possible for a person to "dig lines that do not exceed 20 billion meters of thickness." The human being was also able to collect things an atom and build an efficient and high-precision con
... Show MoreThe importance of this research lies in assessing the current state of media in Iraq based on international indicators and standards set by the Research and Scientific Exchange Council and UNESCO. That is to measure the strength and durability of media after 9 April 2003. These indicators are divided into five objectives that measure and describe each of the five research objectives that we seek to test through the points system.
Based on the foregoing, researchers in Iraqi media find that these conditions may lead to further decline unless measures are taken to help avoid mistakes, provide the requirements for development and progress. In addition, care from the State is needed to support this process, which would
... Show MoreIn this research, a new application has been developed for games by using the generalization of the separation axioms in topology, in particular regular, Sg-regular and SSg- regular spaces. The games under study consist of two players and the victory of the second player depends on the strategy and choice of the first player. Many regularity, Sg, SSg regularity theorems have been proven using this type of game, and many results and illustrative examples have been presented