Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acquisition and pre-processing, feature extraction, model development, visualization and viewing of word cloud model result. The results present an image in a series of text describing the top words. This model can be considered as a simple way to exchange high-level information without overloading the user's details.
Purpose – The main purpose of this research is to highlight the main role of strategic leadership skills for top managements in accessing to effective management in accordance with the (VUCA Prime) methodology in (VUCA) environment as Miniature virtual environment, which refers to (Volatility), (Uncertainty), (Complexity), and (Ambiguity).
methodology – To achieve the research objective, this study selected the quantitative approach in research design, Questionnaire was used as the main instrument for data collection, the sample comprised the opinion poll (106) individual who functions as a head department. (Structural equation modelling by (Smart Pls3)
... Show MoreMetaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory char
... Show MoreSocial reform is the main pillar of the organization of societies. Therefore, all religions and theories were directed to focus on this aspect as the most important element for the development of economic and cultural development. In addition to the analysis and application of the Islamic Sharia, he did not present a theory, but offered real solutions and remedies to the crises in our Arab and Islamic societies alike, despite the criticism directed at him. Z his opinions.
Air pollution is considered one of the major environmental problems that contain many challenges and difficulties facing most countries of the world, including Iraq. The problem has emerged widely with the emergence of the industrial revolution in the world and the tremendous increase in the population and the increase in the number of transportation and its development in addition to excavation, maintenance and work Construction and weather fluctuations, such as dust and sandstorms, pollution resulting from oil refining, extraction, diversion and other processes that cause pollution, and the start of the world using methods that limit the volume of environmental pollution. The most prominent of these methods is the imposition of
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThis paper proposes and studies an ecotoxicant system with Lotka-Volterra functional response for predation including prey protective region. The equilibrium points and the stability of this model have been investigated analytically both locally and globally. Finally, numerical simulations and graphical representations have been utilized to support our analytical findings
Organizations adopt a number of procedures and instructions in their field of activities in order to aid their resources development and energies to serve their entrepreneurial orientations. This calls for preparing a range of mechanisms to mitigate the strictness and complexity of procedures. The ambiguity and severe complexity of procedures means acknowledging the loss in energy and this in turn impedes the hopes while in the same time weakens the enthusiasm in these organizations and an impedes the possibility to achieve continues innovation, thereby losing opportunities to the level of surrender to the risks and assuming them to be unconquered obstacles.
There
... Show MoreIn the last years, a new technology called Cloud computing has been developed. Empirical and previous studies, commonly examined in business field and other domains. In this study, the significant factors that affecting the adoption of cloud computing have been examined using a frequency analysis that have been explored by the previous studies. The results showed that the most effected factors were relative advantage which followed by security and privacy, complexity, innovativeness, and external support. In this study the model of technology organization-environment was used to examine the significant factors that affecting the adoption of cloud computing.
In this paper will be applied to a probability model of inventories periods of multiple stores of raw materials used in the cement industry, cement factory in Samawah and basic materials are limestone, soil normal, iron soil, fuel oil and gypsum. It was built of this model after the test and determine the distribution of demand during the supply period (waiting period) for each subject and independently of the rest of the material as it is not affected by any of the materials above interrelated in the process of supply, this test has been using the Statistical Package of (SPSS) and then was determining the amount of request optimum seeking in each batch and each substance known volume of economic optimization of
... Show More