Getting knowledge from raw data has delivered beneficial information in several domains. The prevalent utilizing of social media produced extraordinary quantities of social information. Simply, social media delivers an available podium for employers for sharing information. Data Mining has ability to present applicable designs that can be useful for employers, commercial, and customers. Data of social media are strident, massive, formless, and dynamic in the natural case, so modern encounters grow. Investigation methods of data mining utilized via social networks is the purpose of the study, accepting investigation plans on the basis of criteria, and by selecting a number of papers to serve as the foundation for this article. Afterward a watchful evaluation of these papers, it has beeniscovered that numerous data extraction approaches were utilized with social media data to report a number of various research goals in several fields of industrial and service. Though, implementations of data mining are still raw and require more work via industry and academic world to prepare the work sufficiently. Bring this analysis to a close. Data mining is the most important rule for uncovering hidden data in large datasets, especially in social network analysis, and it demonstrates the most important social media technology.
The aim of the current research is to explore the health, psychological, and social implications of Internet addiction. Internet addiction is a new type of addiction, which negatively affects an individual’s life and creates social problems, psychological and nervous disorders. The research is divided into three sections: The first section is devoted to the definition of the research and includes the research problem, its importance in addition to the objectives, and the search terms were defined in it. The second section included the concept of addiction on the Internet and the causes, symptoms of addiction, forms, and previous studies were reviewed. As for the third topic, it deals with the theories explaining Internet addiction and
... Show MoreThis study deals with the role that social work profession plays in all its fields to reduce social extremismat home, or school or within society. The study aims to: examine the historical roots of social work in the Iraqi society, investigate the objectives of the developmental role of social work, review the theories of social extremism, its characteristics, and causes, and to analyze the developmental role of social work to limit social extremism. To meet the objectives of the study, a descriptive analytical approach has been adopted. It involves using the social sampling survey method, i.e., a questionnaire tool in the University of Baghdad community-College of Media. The sample was randomly selected to include (100) students from th
... Show MoreUnderstanding sedimentation behavior and its transport capacity in the Tigris River is of significant importance owing to the detrimental consequences caused by it. This study investigates the sediment amounts transported along the reach of the Tigris River in Baghdad. The CCHE2D model which is a common tool developed by the National Center for Computational Hydrological Science and Engineering (NCCHE) was applied to investigate the flow pattern and sediment amounts within 7 km reach. The model was initially calibrated and validated under steady-state conditions at the Sarai gauging station (upstream) and its performance was evaluated around the Abu Nawas water treatment plant (downstream). The result shows that the water surfac
... Show MoreIs in this research review of the way minimum absolute deviations values based on linear programming method to estimate the parameters of simple linear regression model and give an overview of this model. We were modeling method deviations of the absolute values proposed using a scale of dispersion and composition of a simple linear regression model based on the proposed measure. Object of the work is to find the capabilities of not affected by abnormal values by using numerical method and at the lowest possible recurrence.
Grass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents
... Show MoreIn this study, a one-dimensional model represented by Butler-Volmer-Monod (BVM) model was proposed to compute the anode overpotential and current density in a mediator-less MFC system. The system was fueled with various organic loadings of real field petroleum refinery oily sludge to optimize the favorable organic loading for biomass to operate the suggested system. The increase in each organic loading showed higher resistance to electrons transport to the anode represented by ohmic loss. On the contrary, both activation and mass transfer losses exhibited a noticeable decrement upon the increased organic loadings. However, current density was improved throughout all increased loads achieving a maximum current density of 5.2 A/m3
... Show MoreWellbore instability problems cause nonproductive time, especially during drilling operations in the shale formations. These problems include stuck pipe, caving, lost circulation, and the tight hole, requiring more time to treat and therefore additional costs. The extensive hole collapse problem is considered one of the main challenges experienced when drilling in the Zubair shale formation. In turn, it is caused by nonproductive time and increasing well drilling expenditure. In this study, geomechanical modeling was used to determine a suitable mud weight window to overpass these problems and improve drilling performance for well development. Three failure criteria, including Mohr–Coulomb, modifie
This study is to investigate the possibility of using activated carbon prepared from Iraqi date-pits (ADP) which are produced from palm trees (Phoenix dactylifera L.) as low-cost reactive material in the permeable reactive barrier (PRB) for treating lead (Pb<sup>+2</sup>) from the contaminated groundwater, and then compare the results experimentally with other common reactive materials such as commercial activated carbon (CAC), zeolite pellets (ZP). Factors influencing sorption such as contact time, initial pH of the solution, sorbent dosage, agitation speed, and initial lead concentration has been studied. Two isotherm models were used for the description of sorption data (Langmuir and Freundlich). The maximum lead sorp
... Show MoreThis study aimed to reveal the extent to which the values of social peace are included in the content of social and national studies textbooks of the middle stage in kingdom of Saudi Arabia. To achieve this goal, the researcher used the descriptive analytical approach. The study sample consisted of all developed social and national studies textbooks of the middle stage in kingdom of Saudi Arabia in first and second semester of student books in edition of 1439-1440. The study tool was the analysis card. The study reached the following results: 1-The content of social and national studies textbooks of the middle stage in kingdom of Saudi Arabia as a whole included (38) social peace values of total (40) values, corresponding to the inclusio
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More