Twitter popularity has increasingly grown in the last few years, influencing life’s social, political, and business aspects. People would leave their tweets on social media about an event, and simultaneously inquire to see other people's experiences and whether they had a positive/negative opinion about that event. Sentiment Analysis can be used to obtain this categorization. Product reviews, events, and other topics from all users that comprise unstructured text comments are gathered and categorized as good, harmful, or neutral using sentiment analysis. Such issues are called polarity classifications. This study aims to use Twitter data about OK cuisine reviews obtained from the Amazon website and compare the effectiveness of three commonly used supervised learning classifiers, Naive Bayes, Logistic Regression, and Support Vector Machine. This is achieved by using two method of feature selection involving count Vectorizer and Term-Frequency-Inverse Data Frequency. The findings showed that the support vector machine classifier had achieved the highest accuracy of 91%, by feature selection: Count Vectorizer. But it is time consuming. For both accuracy and execution time concentrates, logistic regression is recommended.
Psychological damage is one of the damages that can be compensated under the fault of negligence in the framework of English law, where the latter intends to include an enumeration of civil errors on the basis of which liability can be determined, and aims under each of these errors to protect a specific interest (for example, defamation protects Among the damage to reputation and inconvenience are the rights contained on the land), and the same is true for the rest of the other errors.
Compensation for psychological damage resulting from negligence has raised problems in cases where the psychological injury is "pure", that is, those that are not accompanied by a physical injury, which required subjecting them to
... Show MoreLong memory analysis is one of the most active areas in econometrics and time series where various methods have been introduced to identify and estimate the long memory parameter in partially integrated time series. One of the most common models used to represent time series that have a long memory is the ARFIMA (Auto Regressive Fractional Integration Moving Average Model) which diffs are a fractional number called the fractional parameter. To analyze and determine the ARFIMA model, the fractal parameter must be estimated. There are many methods for fractional parameter estimation. In this research, the estimation methods were divided into indirect methods, where the Hurst parameter is estimated fir
... Show MorePsychological damage is one of the damages that can be compensated under the fault of negligence in the framework of English law, where the latter intends to include an enumeration of civil errors on the basis of which liability can be determined, and aims under each of these errors to protect a specific interest (for example, defamation protects Among the damage to reputation and inconvenience are the rights contained on the land), and the same is true for the rest of the other errors. Compensation for psychological damage resulting from negligence has raised problems in cases where the psychological injury is "pure", that is, those that are not accompanied by a physical injury, which required subjecting them to special requirements by the
... Show MoreBones were recorded in the skeleton of some species of Iraqi turtle Mauremys rivulata; the objectives of this study came in light of current conditions, environmental developments, talents and techniques of biological studies taking place in the country, need for an anatomy guide in river turtles of Iraqi species, to identify all kinds of similarities and differences with their preaching, this work or study has become written in response to those modern needs. It is designed to be one of the resources for those interested in biological studies, beginners or professionals, and veterinarians, distinguishing them from marine and global species. Turtles were dissected in the laboratories of the Research Center and Museum of Natural Hist
... Show MoreBackground: One of the major problems in endodontics is micro-leakage of root canal fillings which might contribute to the failure of endodontic treatment. To avoid this problem, a variety of sealers have been tested. The objective of this, in vitro, study was to evaluate the shear bond strength of four resin based sealers (AH plus, silver free AH26, RealSeal SE and Perma Evolution permanent root canal filling material) to dentin. Materials and Methods: Forty non-carious extracted lower premolars were used. The 2mm of the occlusal surfaces of teeth were sectioned, to expose the dentin surface. The exposed dentin surfaces of teeth were washed with 5ml of 2.5% NaOCl solution followed by 5ml of 17 % EDTA then rinsed by deionized water to remov
... Show MoreThe legislative authority's approval of a project is not enough, as the state president's approval is crucial. If the president doesn’t approve the project within the period determined by the constitutions, it shall be returned to the parliament for further discussion and voting, Either by an ordinary or strict majority, according to the provisions of the constitutions of the countries. To explain the right of objection, we explained, in the First Topic, the definition and distinction, and we explained, in the Second Topic, the legal nature of the right of objection, its kinds, and its constitutional base. In the Third Topic, we discussed the conditions of the right of objection, its procedures, and its effects. Then, the conclusion th
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThe scope of the electrical power facility is determined by its employees' mistakes as follows and subject to its control and guidance, as well as those affiliated with mechanical machines or dangerous things that require special attention, and can be denied the responsibility based on a number of means to which the defendant is resorted to it, the law has been granted For the requirements of justice and to judge the judiciary in many of the provisions issued by an investigation into the principle of equity. The most important mistakes, which are the most important means that the electric power facility can resort to existing responsibility in accordance with Article (219) of the Iraqi Civil Law, which is responsible for fulfilling acts,
... Show MoreThe textbook is the primary means of creativity and thinking, which has a major role in the development of the readership and mental abilities of the student. It is the basic tool in education in Iraq for the teacher and the student, which cannot be dispensed in any educational program. The current study aimed at the book of the biology of the sixth grade of science in Iraq (comparative study). It was compared to the book of biology for the twelve grade in the Kingdom of Jordan to identify the ratio of similarity and differences between them, in addition, to identify the weaknesses in the Iraq curriculum and developing appropriate solutions and suggestions to address them. The sample was represented with books of biology (six-science cla
... Show More