Preferred Language
Articles
/
bsj-5611
Tourism Companies Assessment via Social Media Using Sentiment Analysis
...Show More Authors

In recent years, social media has been increasing widely and obviously as a media for users expressing their emotions and feelings through thousands of posts and comments related to tourism companies. As a consequence, it became difficult for tourists to read all the comments to determine whether these opinions are positive or negative to assess the success of a tourism company. In this paper, a modest model is proposed to assess e-tourism companies using Iraqi dialect reviews collected from Facebook. The reviews are analyzed using text mining techniques for sentiment classification. The generated sentiment words are classified into positive, negative and neutral comments by utilizing Rough Set Theory, Naïve Bayes and K-Nearest Neighbor methods. After experimental results, it was determined that out of 71 tested Iraqi tourism companies, 28% from these companies have very good assessment, 26% from these companies have good assessment, 31% from these companies have medium assessment, 4% from these companies have acceptance assessment and 11% from these companies have bad assessment. These results helped the companies to improve their work and programs responding sufficiently and quickly to customer demands.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة بين الطريقة التقليدية Classical Method وطريقة تحليل الطيف Spectral Analysis لإيجاد ثابت التمهيد التكيفي عند وجود قيم شاذة Outlier Values
...Show More Authors

   In this paper , two method which deal with finding the optimal value for adaptive smoothing constant, are compared .This constant is used in adaptive Single Exponential Smoothing (ASES).

The comparing is between a method uses time domain and another uses frequency domain when the data contain outlier value for autoregressive model of order one AR(1) , or Markov Model, when the time series are stationary and non stationary with deferent samples .    

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Use of One-Way Multivariate Analysis of Variance in the Impact of the Database on the Fields of Banking Service in Some Iraqi Banks
...Show More Authors

 The purpose of this paper is to recognize the impact of database levels on fields of banking service (provision of remittance services and transfer of funds, save financial deposits, provision of personal loans services) in some of Iraqi banks using one-way multivariate analysis of variance. The paper population consisted of (120) employees, then a random stratified sample of (104) employees was taken. A questionnaire paper consists of (24) items were designed in order to analyze by one-Way multivariate analysis of variance (MANOVA) using SPSS.One of the main findings of the current paper is that there is an impact of database on fields of banking service in Iraqi banks (Al Rafidain and Al Rasheed).

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jun 15 2020
Journal Name
Al-adab Journal
تفاعلية الجمهور مع التطبيقات الإعلانية في الفضائيات عبر أجهزة الهاتف المحمول
...Show More Authors

يهدف البحث إلى تحقيق عدد من الأهداف: الكشف عن مدى تفاعلية الجمهور إزاء استخدام التطبيقات الإعلانية في الفضائيات عبر أجهزة الهاتف المحمول. التعرف على تفضيلات الجمهور بين التطبيقات. الوقوف على أهم الموضوعات التي يفضل الجمهور التفاعل معها في التطبيقات الإعلانية. الكشف عن أبرز المعوقات التي تواجه مستخدمي التطبيقات الإعلانية في الفضائيات عبر الهاتف المحمول. الوقوف على مدى مساهمة التطبيقات الإعلانية في الفضائي

... Show More
View Publication
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
Diffusion of Italian language through literary texts: Diffusione dell’italiano attraverso i testi letterari
...Show More Authors

  This work intends to illustrate the methods of using the authentic literary text in the process of spreading Italian, especially in Baghdad where there is a strong propensity to learn the Italian language. The concept of the language that arises from literature is an idea closely linked to the mentality of the Arab learner towards Italian culture: an idea also created by the first Arabisations of literary texts in the early years of the previous century. The research was carried out in Baghdad by two researchers, an Italianist from Baghdad and an Italian mother language linguist, with the aim of bringing together the two sectors in favor of the diffusion of the Italian language. The study also aims to clarify the models from Italian l

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Nov 06 2025
Journal Name
Al–bahith Al–a'alami
International Public Relations methods in building the state's image through Cyberspace
...Show More Authors

The researcher has studied in his research (International Public Relations methods in building the state's image through Cyberspace)
, analytical study of the Facebook and twitter pages for British foreign office , the role was played by the International Public Relations in building the mental image of British , especially after the new media and internet have became influential role in political life . and became an important tools used by political institutions as ministries of foreign affairs in the twenty: one century .
The researcher identified the problem of this study with the following question:
(what is the role of the International Public Relations in building the mental image of state through Cyberspace)
To answer

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 27 2022
Journal Name
Al–bahith Al–a'alami
Motives for public exposure to advertisement through smart phone applications and its purchasing decisions relationship (A research drawn from a Master Degree thesis)
...Show More Authors

Advertisement on smart phone shopping apps are a new way of driving users to satisfy their needs and influence their purchasing decisions, In this way, the research could be aimed to know The role of the relationship between the motivations for audience exposure to shopping apps advertisement and purchasing decisions, In order to achieve the objectives of the research, the researcher adopted the survey method and used the questionnaire and the scale to collect data and information, The researcher chose the "random sample multi stages", The sample size was (475) respondents from Baghdad city center (18 years and above) women and men.

View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Variable Selection Using aModified Gibbs Sampler Algorithm with Application on Rock Strength Dataset
...Show More Authors

Variable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Kinetic Study of the Leaching of Iraqi Akashat Phosphate Ore Using Lactic Acid
...Show More Authors

     In the present work, a kinetic study was performed to the extraction of phosphate from Iraqi Akashat phosphate ore using organic acid. Leaching was studied using lactic acid for the separation of calcareous materials (mainly calcite). Reaction conditions were 2% by weight acid concentration and 5ml/gm of acid volume to ore weight ratio. Reaction time was taken in the range 2 to 30 minutes (step 2 minutes) to determine the reaction rate constant k based on the change in calcite concentration. To determine value of activation energy when reaction temperature is varied from 25 to 65 , another investigation was accomplished. Through the kinetic data, it was found that selective leaching was controlled by

... Show More
View Publication Preview PDF
Crossref (1)
Crossref