Most companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Making (MCDM) methods, the Analytic Hierarchy Process (AHP) is preferred for handling complicated decision-making challenges using several criteria. The Consistency Ratio (CR) scores were used to examine pair-wise comparisons to evaluate the AHP. This study used two judgment scales to get the most consistent judgment. Firstly, the Saaty judgment scale (SS), then the Generalized Balanced Scale (GBS). It investigated whether two different AHP judgment scales would affect decision-making. The main criteria for prioritizing pre-processing techniques in sentiment analysis are Punctuation, Spelling, Number, and Context. These four criteria also contain sub-criteria. GBS pair-wise comparisons are closer to the CR value than SS, reducing the alternatives’ weight ratios. This paper explains how AHP aids logical decision-making. Prioritizing pre-processing techniques with AHP can be a paradigm for other sentiment analysis stages. In short, this paper adds another contribution to the Big Data Analytics domain.
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe research aims at considering the reality of cognitive bias and organizational inertia as determinants of strategic change in a sample of companies listed in Amman Stock Market. To achieve objectives of the research, a model consisting of two independent variables has been designed, namely:
(1) The cognitive bias resulting from (escalating commitment, analogy, previous assumptions, representative generalization, command and control, convergent thinking), and (2) Organizational inertia due to (Icarus discrepancy, power distribution, rooted organizational culture), and a dependent variable, strategic change in (leadership patterns, strategy, the organization per se).
From the model two main hypotheses were derived;
... Show MoreGeotechnical characterization of the sites has been investigated with the collection of borehole data from different sources. Using the data, grain size distribution curves have been developed to understand the particle size distribution of the alluvium present. These curves were further used for preliminary assessment of liquefiable areas. From geotechnical characterization, it has been observed that the soil profile in the two sites is dominated by sand and silty sand.Seed and Idriss (1971) approachhas been usedevaluatethe liquefaction potentialbydeterminationof the relation between the maximum ground acceleration (a max/g) valuesdue to an earthquake and the relative density of a sand deposit in the field. The results reveal that
... Show MoreA program in Visual Basic language was designed to predict the type of radio storm that emitted from Jupiter at specific Local Time (LT) from two different Iraqi locations (Baghdad and Basra), such storms result from the Central Meridian Longitude (CML) of system ??? for Jupiter and phase of Io’s satellite (?Io). Some of these storms are related to position of Io (Io- A,B,C,D) and others are unrelated (non-Io-A,B,C,D) to its position. The input parameters for this program were user specified by determining the observer’s location (longitude), year, month and day. The output program results in form of tables provides the observer with information about the date and the LT of beginning and end of each type of emitted storm. Two Io-storm r
... Show MoreAbstract
Nephrotoxicity is defined as rapid deterioration in kidney functions. It arises from direct exposure to drugs or their metabolites. Methotrexate is a famous chemotherapeutic drug with anti-inflammatory and immunosuppressive properties. A high-dose methotrexate-induced renal dysfunction can be life threatening. Cyanocobalamin, one of the forms of vitamin B12, acts as a coenzyme in the conversion of homocysteine to methionine in the cytosol, and the conversion of methylmalonyl-CoA to succinyl-CoA in the mitochondrion. This study is designed to examine the effect of cyanocobalamin in two different doses each co-administered with methotrexate at 20 mg/kg induced nephrotoxicity in rat
... Show MoreObjective: The aim of this study is to evaluate anemia among lactating women and their children less than 2 years of
age.
Methodology: The study was done on (148) lactating mothers and their children under 2 years of age in the primary
health care center at AL-Salam Quarter/Baghdad from l/10/2009 to 15/10/2010.
Result: This study recommends that there is a significant relationship between anemic mothers and their children. The
study also revealed that there is (77.8%) from nursing mothers in the age groups (25-29) who suffered from anemia,
while (23.1%) for the age group (20-24) did not have anemia
Recommendation: We encourage the use of breast milk or iron-fortified infant formula only for any milk-based part
of
The aim of this paper is to describe an epidemic model when two SI-Type of diseases are transmitted vertically as well as horizontally through one population. The population contains two subclasses: susceptible and infectious, while the infectious are divided into three subgroups: Those infected by AIDS disease, HCV disease, and by both diseases. A nonlinear mathematical model for AIDS and HCV diseases is Suggested and analyzed. Both local and global stability for each feasible equilibrium point are determined theoretically by using the stability theory of differential equations, Routh-Hurwitz and Gershgorin theorem. Moreover, the numerical simulation was carried out on the model parameters in order to determine their impact on the disease
... Show MoreThe skull is one of the largest bones in the body. It is classified into flat bones that maintain the important organic structures; which are the brain, eyes, and tongue. The skull is a strong support for preserving these organs but they are various according to the type of animals and the environments in which they live and the nature of their nutrition. There are many differences among living organisms in terms of the bones in the skull, their difference or disappearance and their length in the shape of the head. The samples were taken from the scientific storage in the Iraq Natural History Research Center and Museum; Cape hare Lepus capensis (Linnaeus, 1758) and Red fox Vulpes vulpes (Linnaeus, 1758) and the study was conducted o
... Show More