Suicidal ideation is one of the most severe mental health issues faced by people all over the world. There are various risk factors involved that can lead to suicide. The most common & critical risk factors among them are depression, anxiety, social isolation and hopelessness. Early detection of these risk factors can help in preventing or reducing the number of suicides. Online social networking platforms like Twitter, Redditt and Facebook are becoming a new way for the people to express themselves freely without worrying about social stigma. This paper presents a methodology and experimentation using social media as a tool to analyse the suicidal ideation in a better way, thus helping in preventing the chances of being the victim of this unfortunate mental disorder. The data is collected from Twitter, one of the popular Social Networking Sites (SNS). The Tweets are then pre-processed and annotated manually. Finally, various machine learning and ensemble methods are used to automatically distinguish Suicidal and Non-Suicidal tweets. This experimental study will help the researchers to know and understand how SNS are used by the people to express their distress related feelings and emotions. The study further confirmed that it is possible to analyse and differentiate these tweets using human coding and then replicate the accuracy by machine classification. However, the power of prediction for detecting genuine suicidality is not confirmed yet, and this study does not directly communicate and intervene the people having suicidal behaviour.
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreIncremental forming is a flexible sheet metal forming process which is performed by utilizing simple tools to locally deform a sheet of metal along a predefined tool path without using of dies. This work presents the single point incremental forming process for producing pyramid geometry and studies the effect of tool geometry, tool diameter, and spindle speed on the residual stresses. The residual stresses were measured by ORIONRKS 6000 test measuring instrument. This instrument was used with four angles of (0º,15º,30º, and 45º) and the average value of residual stresses was determined, the value of the residual stress in the original blanks was (10.626 MPa). The X-ray diffraction technology was used to measure the residual stresses
... Show MoreAim: To evaluation the effect of Lactobacillus acidophilus on Enterohemorrhagic Escherichia coli (EHEC) serotype O157:H7 with detection of some virulence factors. Methods: Two hundred and fifty specimens (stool) from children under five years for both sexes were collected from some hospitals. All isolates were diagnosed according to morphological characteristics, biochemical tests. Monoplex pattern of PCR was used also for detection different genes in (7) Escherichia coli )O157:H7 (isolates; include 16SrRNA, eae, lifA, Stx1,Stx2 that encoded for ribosomal RNA, intimin, lymphocyte inhibitory factor, shiga toxins. Three types of probiotics strains were obtained, Lactobacillus fermentum, Lactobacillus plantarum and Lactobacillus acidophilus (A
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThe development in manufacturing computers from both (Hardware and Software) sides, make complicated robust estimators became computable and gave us new way of dealing with the data, when classical discriminant methods failed in achieving its optimal properties especially when data contains a percentage of outliers. Thus, the inability to have the minimum probability of misclassification. The research aim to compare robust estimators which are resistant to outlier influence like robust H estimator, robust S estimator and robust MCD estimator, also robustify misclassification probability with showing outlier influence on the percentage of misclassification when using classical methods. ,the other
... Show MoreInfluence of combined square nozzle with helical tape inserted in a constant heat flux tube on heat transfer enhancement for turbulent airflow for Reynolds number ranging from 7000 to 14500 were investigated experimentally. Three different pitch ratios for square nozzle (PR = 5.8, 7.7 and 11.6) according to three different numbers of square nozzle (N = 3, 4 and 5) and constant pitch ratios for helical tape were used. The results observed that the Nusselt number and friction factor for combination with winglets were found to be up to 33.8 % and 21.4 %, respectively higher than nozzle alone for pitch ratio PR=5.8. The maximum value of thermal performance for using combination with winglets was about 1.351 for pitch ratio= 5.8. Nusselt numb
... Show MoreGeneral Background: Deep image matting is a fundamental task in computer vision, enabling precise foreground extraction from complex backgrounds, with applications in augmented reality, computer graphics, and video processing. Specific Background: Despite advancements in deep learning-based methods, preserving fine details such as hair and transparency remains a challenge. Knowledge Gap: Existing approaches struggle with accuracy and efficiency, necessitating novel techniques to enhance matting precision. Aims: This study integrates deep learning with fusion techniques to improve alpha matte estimation, proposing a lightweight U-Net model incorporating color-space fusion and preprocessing. Results: Experiments using the AdobeComposition-1k
... Show Moreالمقدمة
ما كان للعرب في تاريخهم الطويل قبل الإسلام، وبعده أن يبدعوا ما أبدعوه في صنع الحضارة وتاريخها ، لولا اعتمادهم أنظمة تربوية سليمة في التنشئة والتعليم، ولولا ان عصورهم قد عرفت مربين ، ومعلمين، وعلماء اسهموا في تقديم نظريات تربوية آثرت في تقدم الفكر التربوي وفي تقدم الإنسان.
فمن الطبيعي أن تكون للعرب تربية منظمة، ولمفكريهم عناية بهذه التربية في كل حقب تاريخهم الطويل، ما د
... Show MoreThe status of science and scientists in the Arab Islamic state a prominent place was a signal the Koran to this position by encouraging people to seek knowledge as well asgive a prominent place for science and scientists, as confirmed by the Sunnah to this position through the Hadith as well as through height and this is what encourages peopleto take care of these things are important to the progress of the state and society and to