Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acquisition and pre-processing, feature extraction, model development, visualization and viewing of word cloud model result. The results present an image in a series of text describing the top words. This model can be considered as a simple way to exchange high-level information without overloading the user's details.
The purpose of the research is to identify the social capital of the Municipality of Samawah Municipality by defining the level of its three dimensions (the structural dimension, the relational dimension and the cognitive dimension) and identifying the appropriate means that contribute to increasing the structural empowerment of the workers in the Municipality of Samawah. Between the social capital and the structural empowerment of the workers. From the perspective of social capital, the researchers examined the correlation and the effect of dimensions (structural, relational, cognitive) on the structural empowerment of the workers and with data collected from a sample of (168) Samawah, which is part of the Ministry of Constructi
... Show MoreA medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show MoreThe study aims to examine the problem of forced displacement and its social and economic problems in light of the Syrian crisis. Such an aim helps to know the difficulties and challenges facing the children of displaced families in learning, and the reasons for their lack of enrolment. It also clarifies whether there are significant statistical differences at among the attitudes of the children of the displaced families towards education regarding the following variables: (the work of the head of the family, the economic level of the family, and the work of the children). The study has adopted the descriptive-analytical approach; a questionnaire was adopted as a tool to collect information. The study was applied to a sample o
... Show MoreCzerwi’nski et al. introduced Lucky labeling in 2009 and Akbari et al and A.Nellai Murugan et al studied it further. Czerwi’nski defined Lucky Number of graph as follows: A labeling of vertices of a graph G is called a Lucky labeling if for every pair of adjacent vertices u and v in G where . A graph G may admit any number of lucky labelings. The least integer k for which a graph G has a lucky labeling from the set 1, 2, k is the lucky number of G denoted by η(G). This paper aims to determine the lucky number of Complete graph Kn, Complete bipartite graph Km,n and Complete tripartite graph Kl,m,n. It has also been studied how the lucky number changes whi
... Show MoreWhen we talk about the foresight in films, it is necessary to talk about dreams because foresight represents one of its distinct types. The Precognitive vision has become a possible material in dealing with as subjects in the film industry that adopt these ideas with their philosophical and scientific orientations, because they represent the imagination that predictors are specialized with. It can be invested through the introduction of a vision of another kind to achieve its goals and ambitions in the film industry and in particular the huge institutions of production as in Hollywood. The cinema works in the light of those concepts of production which found the prognostic dream (the foresight) as a distinctive genre in its films,
Th
This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show MoreThe issue, the existence of God Almighty, and the creativity of the universes including the whale, and assets and how diversified, and faith in him and his lordship and divinity, is a delicate issue, and very important and dangerous, and it occupied human thought old and new, and still occupy it until God takes the land and on it. Many complex issues of thought, behavior, and ethics have resulted in the belief of many communities in the existence of the Almighty, having ruled their minds, depicting their beliefs and distancing their thoughts about slippage and abuse. When they looked at the wonders of creatures and the minutes of the assets, they thought about the planetary and astronomical motion systems. His existence was denied by ath
... Show MoreThis research aims at identifying the level of quality of University environment according to the viewpoint of female students taking the College of Sciences for Woman an example, as represented in the college units as registration unit and the unit of students' affairs, the curricula, instructors, study halls, the college library, scientific labs, computer access, stationary and photocopying services, health care center, the unit of artistic, cultural and sportive activity, the canteen, the college gardens, college buildings and equipment and bathrooms. To achieve the objectives of the research, the researcher prepared a questionnaire to identify the viewpoints of female students concerning the extent of the availability of the standards o
... Show MoreThe research addresses smart city concept as it is the latest urban design trends, by the investment of the capabilities of human, and artificial intelligence for the sake of the advancement of the city. The concept of a smart city is described as one of the most important manifestations of the information revolution, with the end of the twentieth, and the beginning of twenty – first century, The research attributes the emergence of the concept to: deficiencies of means, and traditional methods in building and development of cities, as well as The significant increase in the number of city and global metropolises dwellers. So, smart city approach has been adopted, along with innovative principles and methods which cons
... Show MoreDirectional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show More