Recently, the phenomenon of the spread of fake news or misinformation in most fields has taken on a wide resonance in societies. Combating this phenomenon and detecting misleading information manually is rather boring, takes a long time, and impractical. It is therefore necessary to rely on the fields of artificial intelligence to solve this problem. As such, this study aims to use deep learning techniques to detect Arabic fake news based on Arabic dataset called the AraNews dataset. This dataset contains news articles covering multiple fields such as politics, economy, culture, sports and others. A Hybrid Deep Neural Network has been proposed to improve accuracy. This network focuses on the properties of both the Text-Convolution Neural Network (Text-CNN) and Long Short-Term Memory (LSTM) architecture to produce efficient hybrid model. Text-CNN is used to identify the relevant features, whereas the LSTM is applied to deal with the long-term dependency of sequence. The results showed that when trained individually, the proposed model outperformed both the Text-CNN and the LSTM. Accuracy was used as a measure of model quality, whereby the accuracy of the Hybrid Deep Neural Network is (0.914), while the accuracy of both Text-CNN and LSTM is (0.859) and (0.878), respectively. Moreover, the results of our proposed model are better compared to previous work that used the same dataset (AraNews dataset).
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show Moreيستعرض المقال تطور مؤتمرات القمة العربية منذ أول قمة عام 1946 حتى قمة المنامة 2024. ويسلط الضوء على القضايا التي تناولتها القمم، مثل فلسطين، سوريا، والسودان. كما يشير إلى أهمية قمة جدة 2023 التي شهدت عودة سوريا للجامعة العربية. وتستعد بغداد لاستضافة القمة الرابعة والثلاثين في 17 مايو 2025، وسط تحديات إقليمية كبيرة. وتعد القمة فرصة للعراق لاستعادة دوره العربي وتعزيز التعاون المشترك لمواجهة الأزمات السياسية والاقتصادي
... Show MoreDBN Rashid, 2012 - Cited by 2
The research aimed to modeling a structural equation for tourist attraction factors in Asir Region. The research population is the people in the region, and a simple random sample of 332 individuals were selected. The factor analysis as a reliable statistical method in this phenomenon was used to modeling and testing the structural model of tourism, and analyzing the data by using SPSS and AMOS statistical computerized programs. The study reached a number of results, the most important of them are: the tourist attraction factors model consists of five factors which explain 69.3% of the total variance. These are: the provision of tourist services, social and historic factors, mountains, weather and natural parks. And the differenc
... Show MoreNovel derivatives of 1-(´1, ´3, ´4, ´6-tetra benzoyl-β-D-fructofuranosyl)-1H- benzotriazole and 1-(´1, ´3, ´4, ´6-tetra benzoyl-β-D-fructofuranosyl)-1H- benzotriazole carrying Schiff bases moiety were synthesised and fully characterised. The protection of D- fructose using benzoyl chloride was synthesized, followed by nucleophilic addition/elimination between benzotria- zole and chloroacetyl chloride to give 1-(1- chloroacetyl)- 1H-benzotriazole. The next step was condensation reaction of protected fructose and 1-(1-chloroacetyl)-1H- benzotriazole producing a new nucleoside analogue. The novel nucleoside analogues underwent a second conden- sation reaction with different aromatic and aliphatic amines to provide new Schiff b
... Show MoreAbstract Purpose of research: The purpose of the article is to conduct a comparative analysis of the concept and types of puns in the Russian and Arabic languages. The main focus is on identifying similarities and differences in the definition of a pun, as well as analyzing its various types in both languages. The purpose of the study is to understand how puns are used to achieve comic or semantic effect in different cultural contexts. Methods: The study includes an analysis of literature providing information about puns in Russian and Arabic. For comparative analysis, methods were used to compare concepts, definitions and types of puns in both languages. The phonetic, semantic and syntactic aspects of the pun are considered, and cultural f
... Show MoreThe current research aims to analyze the mathematics book for the first intermediate grade according to the dimensions of mathematical power by answering the following question: What is the percentage of the availability of the dimensions of mathematical power included in the content of the mathematics textbook for first-grade students, average, in its first, and second parts for the academic year 2020-2021, approved by the Iraqi Ministry of Education / General Directorate of Curricula? The research community was determined by middle school mathematics books, and middle school students for middle ,and high school day schools affiliated to the Directorate of Education in Dhi Qar, and by the intentional test, the research sample was s
... Show MoreThe game theory has been applied to all situations where agents’ (people or companies) actions are utility-maximizing, and the collaborative offshoot of game theory has proven to be a robust tool for creating effective collaboration strategies in a broad range of applications. In this paper first, we employ the Banzhaf values to show the potential cost to waste producers in the case of a cooperation and to reduce the overall costs of processing non-recyclable waste during cooperation between producers. Secondly, we propose an application of the methodology to study a case for five waste producers' waste management in the Al-Mahmudiya factory with the aim of displaying the potential cost to waste producers in case of cooperatio
... Show More