Preferred Language
Articles
/
bsj-6214
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acquisition and pre-processing, feature extraction, model development, visualization and viewing of word cloud model result. The results present an image in a series of text describing the top words. This model can be considered as a simple way to exchange high-level information without overloading the user's details.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Civil Engineering Journal
Calibration of a New Concrete Damage Plasticity Theoretical Model Based on Experimental Parameters
...Show More Authors

The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop

... Show More
Scopus (35)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Influence of Cold Plasma on Sesame Paste and the Nano Sesame Paste Based on Co-occurrence Matrix
...Show More Authors

The aim of the research is to investigate the effect of cold plasma on the bacteria grown on texture of sesame paste in its normal particle and nano particle size. Starting by using the image segmentation process depending on the threshold method, it is used to get rid of the reflection of the glass slides on which the sesame samples are placed.  The classification process implemented to separate the sesame paste texture from normal and abnormal texture. The abnormal texture appears when the bacteria has been grown on the sesame paste after being left for two days in the air, unsupervised k-mean classification process used to classify the infected region, the normal region and the treated region. The bacteria treated with cold plasma, t

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Apr 18 2023
Journal Name
Al–bahith Al–a'alami
Media policy and its impact on the level of objectivity in the Iraqi media : A study from the communicators’ point of view in the Iraqi medi outlets for the period from (1/5/2021 to 1/9/2021)
...Show More Authors

The research aims to reveal the impact of media policy in Iraqi media outlets on the level of objectivity in these outlets. A study from the communicators’ point of view where the researcher used a survey method on the communicators in media outlets to reveal the extent of media policies knowledge as well as the pressures exerted by this policy on communicators in media outlets. It also reveals the extent of their commitment to objectivity, neutrality in dealing with information and the way used to transfer it.
The research sample included (179) respondents from communicators in a range of Media outlets such as (Press, Radio, and Television), The researcher was careful with the diversity of the sample, and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Characteristics of Environment in Contemporary Iraqi and Iranian Pottery A Comparative Study (Saad Shakir- Muhammad Mahdi) A Model: قحطان عدنان محمود
...Show More Authors

The Iraqi and Iranian pottery has a significant role in the contemporary world pottery space, despite the fact that influences created those formulation, thus the researcher supposes that there is a relation between the potter and his environment within Iraq's environment and Iran's environment, which are similar at times and different at other times. The researcher, hence, found himself in front of a number of questions:
1- How much was the Iraqi potter inspired by the environment compared to the Iranian potter?
2- Has the Iraqi and Iranian pottery been really inspired by the environment items or there were modified metaphors?
The current research aims at (identifying the influential environmental characteristics in the Iraq

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 30 2016
Journal Name
Environmental Science And Pollution Research
Risk-based prioritization of pharmaceuticals in the natural environment in Iraq
...Show More Authors

View Publication
Scopus (54)
Crossref (48)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
ثيَكهاتةى وشة لة زمانى كورديدا بةثيَى تيؤرى ( مؤرفيم ) ( ذمارةوشة و تيَكضرِذاوةوشة وةك نموونة )
...Show More Authors

زمانةوانة بونيادطةرة ئةمريكييةكان لة نيَوانى سالاَنى ( 1925 – 1945 ) بةتيَثةرِبووكات تيؤرى ( فؤنيم)يان ضةسثاند ،بةم جؤرة  زمانةوانةكان ئاراستةى كاريان بةرةو مؤرفؤلؤذى طؤرِى بؤية ماوةى نيَوان سالاَنى ( 1940 –1960 ) ليَكؤلَينةوةى مؤرفؤلؤذى بووة خالَى بنةرِةتى (1 ) . جيَى ئاماذةية كة ئةو كةم و كورتيانةى كة لة ثيَناسةى وشةدا دةركةوت هؤكاريَكى سةرةكى بوون بؤ ئةوةى بةدواى جيَطرةوةيةك بطةرِيَن ، كة ئةويش ضةمكى مؤرفيم بو

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
Pragmatics and Speech Act- History, Importance and Stages of Development: הפרגמטיקה ופעולת־הדיבור- התולדות, החשיבות ושלבי ההתפתחות (יישמוים בלשון העברית)
...Show More Authors

      The present study stresses two of the most significant aspects of linguistic approach: Pragmatics” and the “Speech Act Theory”, revealing its importance and the stages and levels of development through Hebrew language’s speech acts analysis including (political speech, the Holy Bible, Hebrew stories).

       Chronologically, Pragmatics has always been the center of linguists’ interests due to its importance in linguistic decryptions, particularly, through “Speech Act Theory” that has been initiated and developed by the most prominent philosophers and linguistics.

        The prese

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Social Care for the Disabled students and its influence on the Scientific Level (University of Baghdad as example)
...Show More Authors

The enrollment of students in the university represents a new stage in their life that differ from the previous educational stages that student has previously established. It should be noted that students with special needs at the University of Baghdad are not large numbers. It appears that these students have an excel role in their colleges most often, That is, the handicap was not a barrier to their scientific progress, but rather an incentive for them to excel. The most important conclusion reached by the researcher is that the University of Baghdad had no role in caring for people with special needs and caring for them financially, socially, psychologically, healthily and economically, they need to pay attention to them and take care

... Show More
View Publication Preview PDF