Getting knowledge from raw data has delivered beneficial information in several domains. The prevalent utilizing of social media produced extraordinary quantities of social information. Simply, social media delivers an available podium for employers for sharing information. Data Mining has ability to present applicable designs that can be useful for employers, commercial, and customers. Data of social media are strident, massive, formless, and dynamic in the natural case, so modern encounters grow. Investigation methods of data mining utilized via social networks is the purpose of the study, accepting investigation plans on the basis of criteria, and by selecting a number of papers to serve as the foundation for this arti
... Show MoreThe concept of implementing e-government systems is growing widely all around the world and becoming an interest to all governments. However, governments are still seeking for effective ways to implement e-government systems properly and successfully. As services of e-government increased and citizens’ demands expand, the e-government systems become more costly to satisfy the growing needs. The cloud computing is a technique that has been discussed lately as a solution to overcome some problems that an e-government implementation or expansion is going through. This paper is a proposal of a new model for e-government on basis of cloud computing. E-Government Public Cloud Model EGPCM, for e-government is related t
... Show MoreMany voices appeared in 1980 calling on Arabs and Muslims to play a positive and effective role in American society, and to form a strong Arab pressure group that would confront Zionist pressure groups and limit their influence on American foreign policy. American public opinion, the American government, and the American media. In the late eighties and early nineties, Muslims in the United States began a phase Establishing their political and media institutions, where (4) American Islamic institutions were founded: the Islamic Public Affairs Council, which was founded in 1988, the American-Islamic Council in 1990, the Council on American-Islamic Relations in 1994, and the American-Islamic Alliance in 1994. These institutions have worked to
... Show MoreA hand gesture recognition system provides a robust and innovative solution to nonverbal communication through human–computer interaction. Deep learning models have excellent potential for usage in recognition applications. To overcome related issues, most previous studies have proposed new model architectures or have fine-tuned pre-trained models. Furthermore, these studies relied on one standard dataset for both training and testing. Thus, the accuracy of these studies is reasonable. Unlike these works, the current study investigates two deep learning models with intermediate layers to recognize static hand gesture images. Both models were tested on different datasets, adjusted to suit the dataset, and then trained under different m
... Show MoreSentiment Analysis is a research field that studies human opinion, sentiment, evaluation, and emotions towards entities such as products, services, organizations, events, topics, and their attributes. It is also a task of natural language processing. However, sentiment analysis research has mainly been carried out for the English language. Although the Arabic language is one of the most used languages on the Internet, only a few studies have focused on Arabic language sentiment analysis.
In this paper, a review of the most important research works in the field of Arabic text sentiment analysis using deep learning algorithms is presented. This review illustrates the main steps used in these studies, which include
... Show MoreThe aim of this research is to study and test the impact of the policy of open-book accounting as one of the cost management mechanisms in achieving the competitive advantage in Jordanian industrial public companies, to achieve the objectives of the study, a field study was conducted by surveying the views of a sample of the accountants of the Jordanian industrial public companies. Hence the arithmetical Means, the Standard Deviations, the Significant Value and the Simple Linear Regression are used to test the research hypotheses and to achieve the research goals. The results of the study showed that there is a statistically significant effect of the policy of open-book accounting as one of the cost management mechanisms in achieving the
... Show MoreThe Elliptic Curve Cryptography (ECC) algorithm meets the requirements for multimedia encryption since the encipher operation of the ECC algorithm is applied at points only and that offer significant computational advantages. The encoding/decoding operations for converting the text message into points on the curve and vice versa are not always considered a simple process. In this paper, a new mapping method has been investigated for converting the text message into a point on the curve or point to a text message in an efficient and secure manner; it depends on the repeated values in coordinate to establish a lookup table for encoding/ decoding operations. The proposed method for mapping process is&
... Show Moreconventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation.
XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.
In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show More