Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acquisition and pre-processing, feature extraction, model development, visualization and viewing of word cloud model result. The results present an image in a series of text describing the top words. This model can be considered as a simple way to exchange high-level information without overloading the user's details.
Vascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show Moreفدهي قوس يف ةيداصتقلاا تادحولا ضعب يف نيرمثتسملا تارارق ىلع ءارضخلا ةبساحملا ريثأت ةسارد ىلا ثحبلا نم يلمعلا بناجلا تانايب عمج ىلع دامتعلااب ناثحابلا ماق ثحبلا فده قيقحتلو ، ةيلاملا قارولأل قارعلا نايبتسا ميمصت للاخ ىلا اهميدقتو يف ) نيرمثتسملاو , نييلخادلا نيققدملاو , نيبساحملاو , نييلاملا ءاردملا( ثحبلا ةنيع يف ةلجسملا تاكرشلا ضعب ةيلاملا قارولأل قارعلا قوس متو ثحبلا ناونعب قلعتت يتلا جئاتنلا جارخت
... Show MoreThe research aims to measure the impact of managerial ability on income persistence for the industrial sector companies listed in the Iraqi Stock Exchange. The managers of these companies have managerial ability that may have an impact on achieving their objectives, setting their future policies and investing opportunities. Which may be reflected in many areas, including the level of profitability achieved and the possibility of continuity or sustainability? A model was used to measure managerial ability as well as a model to measure the income persistence in order to determine the relationship between them, The researchers found the absence of a statistically significant between managerial ability and the income persistence, which requi
... Show MoreAccording to the current situation of peroxidase (POD), the relevant studies on this enzyme indicated its importance as a tool in clinical biochemistry and different industrial fields. Most of these studies used the fruits and vegetables as source of this enzyme. So that in order to couple the growing requirements for POD with the recent demands for reduc-ing disposal volume by recycling the plant waste, the aim of the present study was to extract POD through management of municipal bio-waste of Iraqi maize species. A simple, green and economical method was used to extract this enzyme. Our results revealed that maize cobs are rich sources of POD, where the activity of this enzyme was found to be 7035.54 U/g of cobs. In pilot experiments thi
... Show MoreOne of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show More