Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acquisition and pre-processing, feature extraction, model development, visualization and viewing of word cloud model result. The results present an image in a series of text describing the top words. This model can be considered as a simple way to exchange high-level information without overloading the user's details.
The current study is considered a field study to measure the level of satisfaction of the academic programs of Media Masters students. That was accomplished through surveying the attitudes of the students who are enrolled in the faculties of media at the following universities: (Petra University, The Middle East University (MEU), and Al-Yarmouk University). Those students were enrolled in the master’s program within the formal educational system during the second semester of the academic year (2015 – 2016). This survey aims to identify the services, facilities and academic programs provided by the concerned faculties. It, also, aims to identify the public relations, administrative, educational and services aspects of those faculties.
... Show MoreThe uses of traditional plant extract in the treatment of various diseases have been flourished. The present study, IJSR, Call for Papers, Online Journal
The research aimed to study the job satisfaction of the staff of the Federal board of supreme Audit and its relation to the effectiveness of their performance, The questionnaire was adopted as a main tool in the collection of data and information from a random sample of (54) employees of the Federal board of supreme Audit. In light of this, the data were collected and analyzed and the hypotheses were tested using the statistical program (SPSS).
The researchers reached a number of conclusions, the most important of which were: (1) the respondents' response to the variables of job satisfaction and the effectiveness of the performance were medium; (2) there was a significant relationship between job satisfaction and performance effe
... Show MoreThis study is about the role of the Internet in spreading rumors, especially through social networking sites "Facebook" model as the effectiveness of social networks lies in the speed of transmission of events; these two characteristics are important to the public, making the Internet a strong contender for television and its relationship with the public. That's why we find that the Internet today has become a fertile environment for the growth and spread of rumors. The more limited the platforms and places of publication, the greater the responsibility in the search for the original source in spreading this or that rumor, as the Internet is considered an easy means in the production, spreading and re-spreading of
... Show MoreAbstract
The aim of this research is to concentrate on the of knowledge management activities, initial activities: (Acquisition, Selection, Generation, Assimilation, Emission) knowledge, and support activities: (Measurement, Control, Coordination, Leadership) that is manipulate and controlling in achieving knowledge management cases in organization, that’s is leads to knowledge chain model, then determining the level of membership for these activities to knowledge chain model in a sample of Iraqi organization pushed by knowledge (Universities). The research depends on check list for gaining the data required, theses check list designed by apparently in diagnosing research dimensions and measurem
... Show MorePraise be to God, prayer, and peace be upon the Messenger of Allah and his God and his companions. The field of the judiciary to prove or invalidate some cases in the field of proof of descent and attachment to the plaintiff or exile, and other legal and judicial issues, especially in this era where the spread of previously unknown evidence, such as DNA, which was discovered in 1953, and the genetic fingerprint discovered 1984, blood analysis and a Saliva, sweat, poetry, etc. in the field of forensic evidence, in forensic medicine or medical expertise, it can be used to identify the killer, or verify his identity, using all the evidence in the scene, such as a point of blood or sweat, and the like So, as well as to prove the lineage is u
... Show MoreThe research aims at identify the role of the electronic trading system used in the Iraq stock exchange to promote trading activity for the stocks of listed companies in this market.
To prove the hypothesis of research, it was selected the main trading indicators for the market to be a main field in test the research hypothesis.it was selected as the period of time for (9)years span between the years (2005-2013) because they represent the first two articles of equal time periods represent aperiod that preceded the introduction of electronic trading system while the second represents the period of time that followed
The research found a number of conclusions but the mo
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
This research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show More