In recent years, social media has been increasing widely and obviously as a media for users expressing their emotions and feelings through thousands of posts and comments related to tourism companies. As a consequence, it became difficult for tourists to read all the comments to determine whether these opinions are positive or negative to assess the success of a tourism company. In this paper, a modest model is proposed to assess e-tourism companies using Iraqi dialect reviews collected from Facebook. The reviews are analyzed using text mining techniques for sentiment classification. The generated sentiment words are classified into positive, negative and neutral comments by utilizing Rough Set Theory, Naïve Bayes and K-Nearest Neighbor methods. After experimental results, it was determined that out of 71 tested Iraqi tourism companies, 28% from these companies have very good assessment, 26% from these companies have good assessment, 31% from these companies have medium assessment, 4% from these companies have acceptance assessment and 11% from these companies have bad assessment. These results helped the companies to improve their work and programs responding sufficiently and quickly to customer demands.
In this paper , two method which deal with finding the optimal value for adaptive smoothing constant, are compared .This constant is used in adaptive Single Exponential Smoothing (ASES).
The comparing is between a method uses time domain and another uses frequency domain when the data contain outlier value for autoregressive model of order one AR(1) , or Markov Model, when the time series are stationary and non stationary with deferent samples .
المقدمة
ان الاهتمام الاساسي في طرق الادارة الحديثة ينصب على تحقيق رضا المستهلك او الزبون، والذي يشكل الاولية الاولى، فالزبائن يشكلون محور نجاح كل تنظيم، فعدد التنظيمات التي تستهدف استلهام التوجه من العملاء (Customer driven) كبيرة ومتزايدة.
المنظمات الناجحة (Prosper) تركز بشكل كبير على زبائنها في عملية صنع القرار، فالمحاسبون الاداريون فيها يعطون انتباهاً متز
... Show Moreلايمكن للفرد أن يعيش منعزلا عن الآخرين لأنه بحاجة إلى أن يتفاعل مع غيره لتسهيل مستلزمات معيشته ، لذا يعد الانتماء الاجتماعي احد الحاجات النفسية
الاجتماعية المهمة في حياة الفرد من خلال رغبة الفرد في أن ينتمي إلى الآخرين سواء كانوا أسرة أو أصدقاء أو مهنة أو وطن للوصول إلى الهدف الذي يريد أن يحققه و المتمثل في الوصول إلى حالة من الأمن النفسي للفرد و هي تبحث عن وسيلة إشباع من خلال العيش مع مجموع
... Show MoreMan derives his sense of his humanity through contact with others, he needs them to enhance the continued existence and enter into personal relationships in order to enrich his being, it says Murray (in the presence of necessary physical and social cultural center and it cannot be in isolation).
And equal to deprive an individual of talking with others and participation in the life stripped of his humanity, nor has achieved a sense of satisfaction, security, love and friendship, but through belonging to the group, which lies in the psychological composition.
The most important
... Show Moreان العلاقة بين البناء الأجتماعي والثقافي والتنمية المستدامة ، علاقة عضوية ومتبادلة التأثير ، فالبناء الأجتماعي هو أحد الأعمدة الرئيسة الذي تدور حوله عمليات التنمية المستدامة . وبالثقافة يصنع الأنسان القيم الفكرية والروحية والمادية ، ويترجم فلسفته الى أنماط سلوكية ، ومواقف حياتية ، فبغير الثقافة تبقى الموارد البشرية والطبيعية مجرد خامات أولية غير موظفة لصالح الأنسان والمجتمع . فالتنمية الأجتماعية وا
... Show MoreThe research seeks to measure stigma on the children of kindergarten and get to know the differences between males and females and between kindergarten and preschool in social fear. Has been verified by the researcher was true scale of social fear after the drafting of paragraphs (43) items, and display it on a group of experts , has proven its validity after some amendments , bringing the number of paragraphs in its final form (29) items . was statistical analysis of the paragraphs of the brokered power-discriminatory , it is clear that all paragraphs distinct and statistically significant, as well as to find a relationship degree of para-class items consistency . was to ensure the stability of the scale in a re-test , as the stability
... Show MoreLaser drilling is capable of producing small, precisely positioned holes with high degree of reproductively. In this paper , IR millisecond Nd:YAG single pulsed laser was used to determine the effect of laser parameters on the drilled hole of the glass - fiber reinforced epoxy composite FR-4 sample of 2 mm in thickness . The type of laser source was GSI lumonics JK760TR Series laser 1.064μm system in a CNC cabin. The JK760TR series has a 0.3-50ms pulse length and a maximum repetition rate 500Hz with an average power of 600W. The investigation of single pulse laser drilling in this paper was based on theoretical and experimental solutions. In single pulse technique, the investigation included focal plane position fpp, pulse shap
... Show MoreMany objective optimizations (MaOO) algorithms that intends to solve problems with many objectives (MaOP) (i.e., the problem with more than three objectives) are widely used in various areas such as industrial manufacturing, transportation, sustainability, and even in the medical sector. Various approaches of MaOO algorithms are available and employed to handle different MaOP cases. In contrast, the performance of the MaOO algorithms assesses based on the balance between the convergence and diversity of the non-dominated solutions measured using different evaluation criteria of the quality performance indicators. Although many evaluation criteria are available, yet most of the evaluation and benchmarking of the MaOO with state-of-art a
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show More