Most companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Making (MCDM) methods, the Analytic Hierarchy Process (AHP) is preferred for handling complicated decision-making challenges using several criteria. The Consistency Ratio (CR) scores were used to examine pair-wise comparisons to evaluate the AHP. This study used two judgment scales to get the most consistent judgment. Firstly, the Saaty judgment scale (SS), then the Generalized Balanced Scale (GBS). It investigated whether two different AHP judgment scales would affect decision-making. The main criteria for prioritizing pre-processing techniques in sentiment analysis are Punctuation, Spelling, Number, and Context. These four criteria also contain sub-criteria. GBS pair-wise comparisons are closer to the CR value than SS, reducing the alternatives’ weight ratios. This paper explains how AHP aids logical decision-making. Prioritizing pre-processing techniques with AHP can be a paradigm for other sentiment analysis stages. In short, this paper adds another contribution to the Big Data Analytics domain.
The human intellect and his ability to complex thinking is a characteristic that Allah has given him above all his creatures. Islam came to encourage the utilization of the mind by thought, contemplation and consideration of the kingdom of Allah, His signs and religion, and He gave us a set of legislation that preserves the mind and protects it from falling into error or deviation.
This research deals with one of the most important components of civilizations in general and Islamic civilization in particular, which is thinking and what is related to it. It is an essential and influential component in man's dealing with life around him and the for
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreThis paper aims at studying the illocutionary speech acts: direct and indirect to show the most dominant ones in a presidential speech delivered by the USA president. The speech is about the most critical health issue in the world, COVID-19 outbreak. A descriptive qualitative study was conducted by observing the first speech delivered by president Trump concerning coronavirus outbreak and surveying the illocutionary acts: directive, declarative, commissive, expressive, and representative. Searle's (1985) classification of illocutionary speech acts is adopted in the analysis.
What are the main types of the illocutionary speech acts performed by Trump in his speech?; Why does
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreThe research deals with an important issue that many people are working on, namely the sanctification of the texts on which the timings of the time and the different conditions of the place took place. Do not live up to the ranks of perfection and perfection, and every effort has explanations according to the mind machine, which is not protected by infallibility from error. The great downfall is to put these intellectual efforts in the Bible without separating them from the Word of God. The situation and the place on the adherents of a religion and mixed with the trick of the average individual only to be subject to the words of the teachers of Sharia and docility.
The study aimed to reveal the degree of inclusion of media concepts in the books of social and national studies in general education in light of the criteria of media education and the nature of the Saudi society. Additionally, to identify the estimations of the participants in the study of the importance of including media concepts in these books, and to build a matrix of the range and sequence of media concepts in the books of social and national studies in the grades of Saudi general education. The study followed the descriptive approach in both descriptive analysis of the textbooks and descriptive survey of the study participants who were (203) students in the schools of boys and girls in general education in Makkah. The study used t
... Show MoreThe current research aims to know the measurement of the fifth- secondary stage female students' affliction with the social phobia . The research is confined to General directorate of Education in Baghdad / Al-Karkh/2 / for the academic year 2015-2016 and fifth-secondary stage female students. It has been used descriptive method and exposed theoretical sides and previous studies concerning with the social phobia.The procedures of the research include the application of the social phobia scale on random sample of fifth- secondary stage female students ( both branches scientific and literary). The current study has concluded that the fifth- secondary stage female students have&nbs
... Show MoreIn the present paper, the features of democratization of vocabulary in the language of mass media are tackled. Particularly, the functions of this phenomenon in the context of language as an ontological reality are analysed. As well, the growing role of the language of the media, and the language of politics as an integral part pertaining to it, is noted. Further, attention is paid to the excessive saturation of the language of the media along with the literary language, by means of evaluation which may include negative results.
In this concern, scholars had different views, specifically in relation to the use of colloquial vocabulary along with some vernacular profess
... Show MoreAbstract
The following research is marked by "social intelligence and its role in demonstration the potential abilities for individuals." The discussion dealt with the concepts of contemporary is very important because of their significant role in influencing the work of the Organization, as adopted link between the concepts of social intelligence and the potential role of the first to show the second .The research hypotheses tested in three health institutions in the city of Mosul, the research community is represented (Al-Salam Hospital and General Hospital and the son of ether), while the sample were the leaders of these institutio
... Show MoreIn this paper, an intelligent tracking control system of both single- and double-axis Piezoelectric Micropositioner stage is designed using Genetic Algorithms (GAs) method for the optimal Proportional-Integral-Derivative (PID) controller tuning parameters. The (GA)-based PID control design approach is a methodology to tune a (PID) controller in an optimal control sense with respect to specified objective function. By using the (GA)-based PID control approach, the high-performance trajectory tracking responses of the Piezoelectric Micropositioner stage can be obtained. The (GA) code was built and the simulation results were obtained using MATLAB environment. The Piezoelectric Micropositioner simulation model with th
... Show More