Twitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based data provided by Twitter API, Twitter places and Geocode parameters. We studied these methods to determine their accuracy and their suitability for research. The study concludes that the places method is the more accurate, but it excludes a lot of the data, while the geocode method provides us with more data, but special attention needs to be paid to outliers. Copyright © Research Institute for Intelligent Computer Systems, 2018. All rights reserved.
The thermal distribution in the diseased tissue treated by different methods faces the problem of an uncontrollable defused heat. In the present article, we use a plasmonic bowtie nanoantenna working in the near infrared region to enhance the temperature confinement in the tissue. The Computer Simulation Technology Studio Suite package version 2019 was used to execute the design of both plasmonic nanoantenna and the tissue. Gold nanostructure and silicon carbide dioxide are the components the plasmonic nanoantenna in the bowtie shape. The results showed that the distance between the tumor tissue and the antenna is important to determine the intensity field where the maximum field is 5.9*107 V/m at a distance of 100 nm. The maximum
... Show Moreتعتبر المعادلات التفاضلية الموجية من اهم المواضيع التي تمثل على سبيل المثال الحركة الموجية للاهتزازات الأرضية . ومن هنا فان ايجاد حلول تقريبيه لمثل هذه المعادلات بدقة وسرعه عالية وبشكل اسرع من الحلول التحليلية والمعقدة , اصبح ممكنا من خلال استخدام الذكاء الاصطناعي واساليب التعلم الالي. في هذا البحث هناك ثلاثة أهداف الأول هو تحويل مشكلة القيمة الأولية للمعادلة الموجية إلى شكلها القانوني وإيجاد حلها ا
... Show MoreThe adsorption of hexavalent chromium by preparing activated carbon from date seeds with zinc chloride as chemical activator and granular date seeds was studied in a batch system. The characteristics of date seeds and prepared activated carbon (ZAC) were determined and found to have a surface area 500.01 m2/g and 1050.01 m2/g , respectively and iodine number of 485.78 mg/g and 1012.91 mg/g, respectively. The effects of PH value (2-12), initial sorbate concentration(50-450mg/L), adsorbent weight (0.004-0.036g) and contact time (30-150 min) on the adsorption process were studied . For Cr(VI) adsorption on ZAC, at 120 min time contact, pH solution 2 and 0.02 adsorbent weight will ach
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show MoreIn this work, an optical fiber biomedical sensor for detecting the ratio of the hemoglobin in the blood is presented. A surface plasmon resonance (SPR)-based coreless optical fiber was developed and implemented using single- and multi-mode optical fibers. The sensor is also utilized to evaluate refractive indices and concentrations of hemoglobin in blood samples, with 40 nm thickness of (20 nm Au and 20 nm Ag) to increase the sensitivity. It is found in practice that when the sensitive refractive index increases, the resonant wavelength increases due to the decrease in energy.
Within this work, to promote the efficiency of organic-based solar cells, a series of novel A-π-D type small molecules were scrutinised. The acceptors which we designed had a moiety of N, N-dimethylaniline as the donor and catechol moiety as the acceptor linked through various conjugated π-linkers. We performed DFT (B3LYP) as well as TD-DFT (CAM-B3LYP) computations using 6-31G (d,p) for scrutinising the impact of various π-linkers upon optoelectronic characteristics, stability, and rate of charge transport. In comparison with the reference molecule, various π-linkers led to a smaller HOMO–LUMO energy gap. Compared to the reference molecule, there was a considerable red shift in the molecules under study (A1–A4). Therefore, based on
... Show More<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T
... Show More