Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation. Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annotating the text, feature engineering is performed using techniques like term frequency/inverse document frequency (TF/IDF) and Bag of words (BOW). The relevant features are supplied to support vector machine (SVM) and Multinomial Naïve Bayesian (MNB) classifiers. The fine tuning of SVM is being done by taking kernel Linear, Poly and RBF. SVM showed better results than MNB by having precision of 70%, recall of 76.5%, F1 Score of 69.5% and overall Accuracy of 69.2%.
To avoid the negative effects due to inflexibility of the domestic production inresponse to the increase in government consumption expenditure leads to more imports to meet the increase in domestic demand resulting from the increase in government consumption expenditure. Since the Iraqi economy economy yield unilateral depends on oil revenues to finance spending, and the fact government consumer spending is a progressive high flexibility the increase in overall revenues, while being a regressive flexibility is very low in the event of reduced public revenues, and therefore lead to a deficit in the current account position. And that caused the deficit for imbalance are the disruption of the
... Show MoreThe study aimed to evaluate educational programs efficiency in applying the best educational practices to educate students from the dangers of indecent behaviors, in line with higher education policy and the appropriateness of educational program dimensions to spread awareness among students to not fall into the indecent behaviors clutches. The study adopted the inductive exploratory approach through structural equation modeling and the descriptive analysis of the collected data from randomly selected sample (n=385) from educational academics at Northern Border University in the Saudi Arabia using a specially designed survey tool to meet study purposes to evaluate dimensions of teaching methods, evaluation tools, training courses, course
... Show MoreIncremental forming is a flexible sheet metal forming process which is performed by utilizing simple tools to locally deform a sheet of metal along a predefined tool path without using of dies. This work presents the single point incremental forming process for producing pyramid geometry and studies the effect of tool geometry, tool diameter, and spindle speed on the residual stresses. The residual stresses were measured by ORIONRKS 6000 test measuring instrument. This instrument was used with four angles of (0º,15º,30º, and 45º) and the average value of residual stresses was determined, the value of the residual stress in the original blanks was (10.626 MPa). The X-ray diffraction technology was used to measure the residual stresses
... Show MoreDeveloping smart city planning requires integrating various techniques, including geospatial techniques, building information models (BIM), information and communication technology (ICT), and artificial intelligence, for instance, three-dimensional (3D) building models, in enabling smart city applications. This study aims to comprehensively analyze the role and significance of geospatial techniques in smart city planning and implementation. The literature review encompasses (74) studies from diverse databases, examining relevant solutions and prototypes related to smart city planning. The focus highlights the requirements and preparation of geospatial techniques to support the transition to a smart city. The paper explores various aspects,
... Show MoreIn the last few years, there have been a lot of changes in the economy, society, and the environment. This has led to much competition between companies, directly and indirectly affecting production and marketing processes. Most companies are trying to cut production and manufacturing costs by using modern cost techniques such as product life cycle costing and Continuous Improvement (Kaizen) technology, in the method of measuring production costs or service costs, and the need for internal control to keep an eye on how these technologies are being used and how well they work. And to find out the effect of internal control on the implementation of costing techniques in Iraqi companies, 64 questionnaires were given to people who work in the i
... Show MoreBackground: Complete denture wearers show lower levels of bite force than dentate subjects. This has a significant influence on their chewing efficiency. In this study an attempt was made to investigate the effect of the impression technique on the maximum bite force in complete denture wearers. Materials and methods: The patients selected for this research were 12 edentulous patients. Three different techniques for registering the final impression were made; the mucostatic, mucofunctional, and the selective pressure impression technique. Two sets of upper and lower denture bases and one set of upper and lower dentures were constructed for each subject. Intraoral and extraoral instruments and devices, as well as a computer program were used
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreObjective: To evaluate nurses' practices concerning isolation techniques for Adult Leukemic Patients (ALP).
Methodology: A descriptive study was carried out at the isolation rooms at leukemic wards in Baghdad Teaching
Hospitals, starting from Jan. 27th 2008 up to the 27th of Apr. 2008. To achieve the objectives of study, a non-probability
"purposive" sample of (50) nurse was selected out of four Teaching Hospitals in Baghdad city were selected according
to the criteria of the study sample.
The study instrument consisted of two major parts. It is based on the review of literature. First is concerned with
demographic data for nurses; and the second part is observational tool (checklist) is composed of (83) item. The conte