Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acquisition and pre-processing, feature extraction, model development, visualization and viewing of word cloud model result. The results present an image in a series of text describing the top words. This model can be considered as a simple way to exchange high-level information without overloading the user's details.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop
... Show Moreزمانةوانة بونيادطةرة ئةمريكييةكان لة نيَوانى سالاَنى ( 1925 – 1945 ) بةتيَثةرِبووكات تيؤرى ( فؤنيم)يان ضةسثاند ،بةم جؤرة زمانةوانةكان ئاراستةى كاريان بةرةو مؤرفؤلؤذى طؤرِى بؤية ماوةى نيَوان سالاَنى ( 1940 –1960 ) ليَكؤلَينةوةى مؤرفؤلؤذى بووة خالَى بنةرِةتى (1 ) . جيَى ئاماذةية كة ئةو كةم و كورتيانةى كة لة ثيَناسةى وشةدا دةركةوت هؤكاريَكى سةرةكى بوون بؤ ئةوةى بةدواى جيَطرةوةيةك بطةرِيَن ، كة ئةويش ضةمكى مؤرفيم بو
... Show MoreThe enrollment of students in the university represents a new stage in their life that differ from the previous educational stages that student has previously established. It should be noted that students with special needs at the University of Baghdad are not large numbers. It appears that these students have an excel role in their colleges most often, That is, the handicap was not a barrier to their scientific progress, but rather an incentive for them to excel. The most important conclusion reached by the researcher is that the University of Baghdad had no role in caring for people with special needs and caring for them financially, socially, psychologically, healthily and economically, they need to pay attention to them and take care
... Show MoreThe present study stresses two of the most significant aspects of linguistic approach: Pragmatics” and the “Speech Act Theory”, revealing its importance and the stages and levels of development through Hebrew language’s speech acts analysis including (political speech, the Holy Bible, Hebrew stories).
Chronologically, Pragmatics has always been the center of linguists’ interests due to its importance in linguistic decryptions, particularly, through “Speech Act Theory” that has been initiated and developed by the most prominent philosophers and linguistics.
The prese
... Show MoreThis research reviews the aesthetic variables that were founded according to (theatrical rehearsal) as one of the most important pillars on which the theatrical process is based, because of its necessity in developing theatrical art on several levels that helped the theatrical director in organizing his work, and this became clear through the research chapters represented in the first chapter (methodological framework) and the second chapter, which consisted of the first topic (the duality of watching / rehearsal) and the second topic (the applications of theatrical rehearsal in theatrical experiences), all the way to the third chapter (research procedures), which included the analysis of theatrical rehearsals (sharing on life), and the
... Show MoreThe Messengers and the Imam of the God-fearing, Muhammad is God, his family, and all of his companions. As for what comes after... Fainting is one of the involuntary symptoms and states that occur to a person when carrying out his life’s tasks suddenly due to his loss of sense and movement, so he loses consciousness for a period of time that is short or may be long, and the person is held accountable and responsible for every moment of his life. He is required to perform duties specified by Sharia law, such as prayer, fasting, and Hajj...and fainting prevents him from performing these actions. We must consider the opinions of jurists and know the legal implications resulting from it. It was said that a person has a capacity that enable
... Show More