Suicidal ideation is one of the most severe mental health issues faced by people all over the world. There are various risk factors involved that can lead to suicide. The most common & critical risk factors among them are depression, anxiety, social isolation and hopelessness. Early detection of these risk factors can help in preventing or reducing the number of suicides. Online social networking platforms like Twitter, Redditt and Facebook are becoming a new way for the people to express themselves freely without worrying about social stigma. This paper presents a methodology and experimentation using social media as a tool to analyse the suicidal ideation in a better way, thus helping in preventing the chances of being the victim of this unfortunate mental disorder. The data is collected from Twitter, one of the popular Social Networking Sites (SNS). The Tweets are then pre-processed and annotated manually. Finally, various machine learning and ensemble methods are used to automatically distinguish Suicidal and Non-Suicidal tweets. This experimental study will help the researchers to know and understand how SNS are used by the people to express their distress related feelings and emotions. The study further confirmed that it is possible to analyse and differentiate these tweets using human coding and then replicate the accuracy by machine classification. However, the power of prediction for detecting genuine suicidality is not confirmed yet, and this study does not directly communicate and intervene the people having suicidal behaviour.
This research display a selected sample of Regelson's texts, there were interrelations and interactions unfolded so as to show his creativity in the employment of religious texts. In the story "In the Youth of Moses", he inter-texted the episode of the Prophet Moses from the Torah, the Source of legislation, to signify a legislative issue needed by the community. As for the story of "Samson, One of the Falling", he originated the character of The Judge Samson by alluding to the Book of the Judges, which is the Book which reminded of the defeat and slavery of the Palestinians by a Jewish leader, as is related in Jewish religious texts. Further, and the story of "And Haman Said", he chose the story of the Queen Esther from the Book of Esth
... Show MoreThe convolutional neural networks (CNN) are among the most utilized neural networks in various applications, including deep learning. In recent years, the continuing extension of CNN into increasingly complicated domains has made its training process more difficult. Thus, researchers adopted optimized hybrid algorithms to address this problem. In this work, a novel chaotic black hole algorithm-based approach was created for the training of CNN to optimize its performance via avoidance of entrapment in the local minima. The logistic chaotic map was used to initialize the population instead of using the uniform distribution. The proposed training algorithm was developed based on a specific benchmark problem for optical character recog
... Show MoreBackground: Imprelon® Biostar foils are new alternative tray material that has become increasingly popular because oftheir several advantages. Also, (Duran®) is another type of Biostar foils which is used in splint therapy. This study assessed some mechanical properties of these two types Biostar sheets in comparison with some types of acrylic resins used for construction of trays and splints. Materials and Methods: A total of 150 specimens were prepared, 30 specimens for each test, 10 for each group material in order to assess some mechanical properties of the Imprelon® Biostar foil (dimension stability, surface roughness and shear bond strength of Imprelon® materialto zinc oxide impression material) and compare them to that of the oth
... Show MoreThe aim of the research is to examine the multiple intelligence test item selection based on Howard Gardner's MI model using the Generalized Partial Estimation Form, generalized intelligence. The researcher adopted the scale of multiple intelligences by Kardner, it consists of (102) items with eight sub-scales. The sample consisted of (550) students from Baghdad universities, Technology University, al-Mustansiriyah university, and Iraqi University for the academic year (2019/2020). It was verified assumptions theory response to a single (one-dimensional, local autonomy, the curve of individual characteristics, speed factor and application), and analysis of the data according to specimen partial appreciation of the generalized, and limits
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThis paper reports a fiber Bragg grating (FBG) as a biosensor. The FBGs were etched using a chemical agent,namely,hydrofluoric acid (HF). This implies the removal of some part of the cladding layer. Consequently, the evanescent field propagating out of the core will be closer to the environment and become more sensitive to the change in the surrounding. The proposed FBG sensor was utilized to detect toxic heavy metal ions aqueous medium namely, copper ions (Cu2+). Two FBG sensors were etched with 20 and 40 μm diameters and fabricated. The sensors were studied towards Cu2+ with different concentrations using wavelength shift as a result of the interaction between the evanescent field and copper ions. The FBG sensors showed
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show More