Most companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Making (MCDM) methods, the Analytic Hierarchy Process (AHP) is preferred for handling complicated decision-making challenges using several criteria. The Consistency Ratio (CR) scores were used to examine pair-wise comparisons to evaluate the AHP. This study used two judgment scales to get the most consistent judgment. Firstly, the Saaty judgment scale (SS), then the Generalized Balanced Scale (GBS). It investigated whether two different AHP judgment scales would affect decision-making. The main criteria for prioritizing pre-processing techniques in sentiment analysis are Punctuation, Spelling, Number, and Context. These four criteria also contain sub-criteria. GBS pair-wise comparisons are closer to the CR value than SS, reducing the alternatives’ weight ratios. This paper explains how AHP aids logical decision-making. Prioritizing pre-processing techniques with AHP can be a paradigm for other sentiment analysis stages. In short, this paper adds another contribution to the Big Data Analytics domain.
This research aims to understand complexity management and its impact on the use of the dynamic capabilities of a sample of private colleges. Private colleges are currently facing many crises, changes, unrest and high competitive pressures. Which is sometimes difficult or even impossible to predict. The recruitment of dynamic capabilities is also one of the challenges facing senior management at private colleges to help them survive and survive. Thus, the problem of research was (there is a clear insufficiency of interest in Complexity Management and trying to employ it in improving the dynamic capabilities of Colleges that have been discussed?). A group of private colleges was selected as a
... Show MoreThe present study aims at finding out the (effect of the Caroll’s pattern on the second intermediate class pupils' achievement in geography)
The partial experimental design of two groups, experimental and control, with pre-post tests is used. The sample is represented in (74) female pupils. The sample is divided into two groups (38) experimental group and (36) control one. The sample is selected from first intermediate class pupils ( Am Salama Secondary School for girls) \ Baghdad\ Al-karkh-1, for academic year 2015-2016.
The researcher has equalized the two groups in several variables: the previous achievement tests, intelligence, age in months, the scor
... Show MoreBackground: Despite the fact that asthma is a long-term disease that may be treated, many people are unable to control their symptoms due to a lack of knowledge about their condition. The study's purpose was to find out if a pharmacist intervention improved asthma management because of this.
Objective: this study designed to assess the effect of pharmaceutical care on pulmonary functions test.
Method: The study was completed in three months. The patients who were enrolled were divided into two groups: Group 1 consists of 23 asthma patients who were randomly assigned to receive conventional therapy for chronic bronchial asthma based on disease stage and se
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe current study entitled (the influence of heritage in the ceramic sculpture of the America Potter Paula Rice)
The study is based on four chapters:
Chapter I included structural find of clarification of the research problem and its importance, also included a mention of the research limits and the aim of this study, which is:
-Identify sculptures Ceramic affected ranges for Potter Paula Rice civilization heritage of intellectual and artistic, whether global or local.
-Trying to detect and intellectual influences the formalism of inherited and which resulted in the latest version of the unfinished ceramic artist.
-Did the artist callback method to the values inherent succeeded in the embodiment of the meaning of originali
this paper presents a novel method for solving nonlinear optimal conrol problems of regular type via its equivalent two points boundary value problems using the non-classical
In this paper, two meshless methods have been introduced to solve some nonlinear problems arising in engineering and applied sciences. These two methods include the operational matrix Bernstein polynomials and the operational matrix with Chebyshev polynomials. They provide an approximate solution by converting the nonlinear differential equation into a system of nonlinear algebraic equations, which is solved by using
Background: Women with previous two or
more caesarean deliveries are usually
managed by elective cesarean section to avoid
the possible risks of labor.
Objective: To compare the relative risks of
maternal and fetal outcomes in emergency
versus elective previous two or more
caesarean deliveries
Design: Randomized prospective clinical
study
Setting: Al-Elweya Maternity Teaching
Hospital, from 1st of March to 31st of
September 2008.
Methods: The study groups, those who had
previous two or more caesarean deliveries,
were included from the hospital admissions.
The 1st group (102 women) presented in labor
and was managed by caesarean delivery as
soon as it was possible. The second group (7