Over the last period, social media achieved a widespread use worldwide where the statistics indicate that more than three billion people are on social media, leading to large quantities of data online. To analyze these large quantities of data, a special classification method known as sentiment analysis, is used. This paper presents a new sentiment analysis system based on machine learning techniques, which aims to create a process to extract the polarity from social media texts. By using machine learning techniques, sentiment analysis achieved a great success around the world. This paper investigates this topic and proposes a sentiment analysis system built on Bayesian Rough Decision Tree (BRDT) algorithm. The experimental results show the success of this system where the accuracy of the system is more than 95% on social media data.
After the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show MoreThe Asymmetrical Castellated concavely – curved soffit Steel Beams with RPC and Lacing Reinforcement improves compactness and local buckling (web and flange local buckling), vertical shear strength at gross section (web crippling and web yielding at the fillet), and net section ( net vertical shear strength proportioned between the top and bottom tees relative to their areas (Yielding)), horizontal shear strength in web post (Yielding), web post-buckling strength, overall beam flexure strength, tee Vierendeel bending moment and lateral-torsional buckling, as a result of steel section encasement. This study presents two concentrated loads test results for seven specimens Asymmetrical Castellated concavely – curved soffit Steel Be
... Show MoreThe Zubair Formation is the most significant sandstone reservoir in Iraq which deposited during the Barremian. The study area is located in the central part of Iraq at the Kifl oil field, in the northern part of the Mesopotamian Zone.
The petrographic study showed that quartz mineral is the main component of the sandstone in Zubair Formation with very low percentage of feldspar and rare rock fragments to classified as quartz arenite sandtone. There are five lithologic changes (lithofacies) that have characterized the studied succession: - well sorted quartz arenite, poorly sorted quartz arenite, poorly sorted graywacke, sandy shale, and shale. These lithofacieses were deposited in the deltaic environments as three associate
... Show MoreThe current research attempts to examine the relationship between social-psychological conflict and their relation to family upbringing approaches among the adolescents of intermediate stage according to sex and economical level. To do this, the researcher prepared a questionnaire to measure social-psychological conflict that consisted of (32) item divided on four dimensions, and also she prepared a questionnaire to measure family upbringing approaches which composed of (28) item divided on four dimensions. The sample was (260) male and female student from intermediate stage chosen randomly. The results revealed that there were significant differences between social-psychological conflict which went to male, there was a negative correlat
... Show MoreThe study aims to indicate the role of the mechanisms and principles of corporate governance in the activation of social responsibility reports, and increase disclosure, to achieve sustainability, legitimacy, and integrity of the business. Through the presentation of the conceptual framework for corporate governance and social responsibility, identify the key dimensions of social responsibility and the statement of the relationship between the mechanisms of governance and social responsibility reports in accordance with these dimensions. To prove the hypothesis research has selected a sample of listed companies in the Iraqi market for securities,
... Show MorePerformance issues could be appearing from anywhere in a computer system, finding the root cause of those issues is a troublesome issue due to the complexity of the modern systems and applications. Microsoft builds multiple mechanisms to make their engineers understand what is happening inside All Windows versions including Windows 10 Home and the behavior of any application working on it whether Microsoft services or even third-party applications, one of those mechanisms is the Event Tracing for Windows (ETW) which is the core of logging and tracing in Windows operating system to trace the internal events of the system and its applications. This study goes deep into internal process activities to investigat
... Show MoreManipulation is a discursive concept which plays a key role in political discourse by which politicians can impose some impact on their recipients through using linguistic features, most prominent of which are personal pronouns (Van Dijk, 1995). The aim of this study is to investigate how politicians utilize the personal pronouns, namely; We and I and their possessive forms as a tool of manipulating the audience's mind based on Van Dijk's "ideological square" which shows positive-self representation and negative-other representation (Van Dijk,1998:p.69). To this end, American President Donald Trump's 2020 State of the Union speech was chosen to be the data of analysis. Only (8)
... Show More