Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acquisition and pre-processing, feature extraction, model development, visualization and viewing of word cloud model result. The results present an image in a series of text describing the top words. This model can be considered as a simple way to exchange high-level information without overloading the user's details.
The main objective of this study is to measure the Impact of global financial crisis on some indicators of the Saudi Arabia's economy using the Mendel-Fleming model, the importance of the study applied by focusing on the theme of general equilibrium in the face of fluctuations in the global economy. Study used a descriptive approach and the methodology of econometrics to construct the model. Study used Eviews Program for data analysis. The Data was collected from the Saudi Arabian Monetary Agency, for the period (1997-2014).Stationery of the variables was checked by Augmented Dickey-Fuller (ADF) and Phillips Perron (PP) unit roots tests. And also the co-integration
... Show MoreThis study aimed at revealing the degree of availability of standards of word problems in mathematics books for the first three grades of the basic stage in Palestine. For this purpose, the researcher prepared an analysis tool and a list of criteria consisting of two areas: linguistic formulation and mathematical content. Every area had seven items. The results of the study showed that the third-grade mathematics book has the highest degree of availability of the standards with 85.75%, and then came the second-grade mathematics book with 83.12%. Finally, the first-grade mathematics book came with 80.13%. In the light of the previous results, the researcher recommended to develop the language of word problems, to take into account their i
... Show MoreOne of the most enduring expressions of urban poverty in developing countries is the proliferation of slums and informal settlements .these settlements have the most deplorable living and environmental conditions within the city and are characterized by inadequate water supply, squalid conditions of environmental sanitation .overcrowded and dilapidated habitation, hazardous location .insecure tenure and vulnerability to serious health risks among many others .its in recognition of the of the development challenges to significantly improve the lives of at least 800000 people allover the country So our objectives in this research are the ensuring of a durable improvement of housing conditions and housing environment of poor people
... Show MoreThere are a number of obstacles in the field of work of social workers that prevent them from performing their full role. Their tasks may sometimes be easy and manageable and at other times they may be difficult and complex, however professional roles are mostly the latter, contribute to the feeling of the inability to provide the work required at the level expected by others. In such cases, the relationship binding specialists to their work is affected negatively and this has devastating effects on the professional process as a whole, including their professional practice. This feeling of helplessness and depletion of energy and effort leads to a state of fatigue and emotional exhaustion that can be defined as job burnout, our study aims t
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More
The reliability of the stress-strength model attracted many statisticians for several years owing to its applicability in different and diverse parts such as engineering, quality control, and economics. In this paper, the system reliability estimation in the stress-strength model containing Kth parallel components will be offered by four types of shrinkage methods: constant Shrinkage Estimation Method, Shrinkage Function Estimator, Modified Thompson Type Shrinkage Estimator, Squared Shrinkage Estimator. The Monte Carlo simulation study is compared among proposed estimators using the mean squared error. The result analyses of the shrinkage estimation methods showed that the shrinkage functions estimator was the best since
... Show MoreThe introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop
... Show MoreThe research aims to reveal the impact of media policy in Iraqi media outlets on the level of objectivity in these outlets. A study from the communicators’ point of view where the researcher used a survey method on the communicators in media outlets to reveal the extent of media policies knowledge as well as the pressures exerted by this policy on communicators in media outlets. It also reveals the extent of their commitment to objectivity, neutrality in dealing with information and the way used to transfer it.
The research sample included (179) respondents from communicators in a range of Media outlets such as (Press, Radio, and Television), The researcher was careful with the diversity of the sample, and