148 research outputs found

    Detecting the Usage of Vulgar Words in Cyberbully Activities from Twitter

    Get PDF
    Nowadays, nearly all people utilize the device which is connected to Internet. People are accustomed to the use information technology devices in their daily life to interact with other people. Currently, many social media platforms such as Facebook, Twitter, Instagram, and YouTube are becoming popular. This study selected Twitter platforms, which is started to gain popularity. By the rapid growth of users signing up for Twitter accounts, at the same time, cybercrime started to bloom each year in social media platforms. Cyberbully is one of the cybercrime practices which had caused a significant impact on the targeted victims. The victims experienced social pressure, which they need to bear each day while the bullies stayed free behind the veil of anonymity. This study aims to identify the common vulgar words used by the cyberbullies on Twitter. Also, this study is subject to produce essential features of Twitter based on the collected tweets. The evaluation in this study includes the occurrences of the vulgar word perpetrated by the cyberbullies from Twitter. This study detected the usage of vulgar words in cyberbully activities on Twitter platform. A list of vulgar words were extracted and evaluated from a corpus of 50 Twitter users who posted a various number of tweets. The vulgar words detection in the tweets enable the tracking process of the cyberbully activities. In the evaluation section, we discussed how the usage of the vulgar words would define the user’s earnestness in doing the cyberbully activities in the Twitter. This study shows there are users with a low number of tweets have a high number of vulgar words occurrences, while other users with high numbers of tweets but less number of vulgar words occurrences. The information collected in this study is expected to assist marking users with a high number of vulgar words occurrences who tend to have high possibilities in doing cyber-bully activities

    Best practice in global negotiation strategies for leaders and managers in the 21st century

    Get PDF
    This research article examines various types of negotiations and negotiation styles and best practice in global negotiations, which may be adopted by leaders and entrepreneurs under different conditions and cultural milieus to reach an agreement while conducting business across the globe. First published online: 14 Oct 201

    Geotechnical study to assess the weir stability on high erodible soils

    Get PDF
    Dwerige weir is a concrete hydraulic structure construct as flooding protect and water harvesting system for replenishment ground water in the area. The foundation comprised of highly erodible alluvial fan deposits. SEEP/W used to analysis foundation soil stability against piping erosion resulting from the water seeps. The two dimensions steady state model are selected, and saturated only materials used in the analysis. The results show that the soil need more actions to support the foundation during the weir economic life

    A Review of Parameters and Mechanisms in Spray Cooling

    Get PDF
    Miniaturisation in avionics, electronics, and medical appliances has led to demands for rapid heat dissipation techniques. The spray cooling technique has gained importance recently due to its advantage over other cooling methods. Parameters affecting heat transfer mechanisms during spray cooling are contemplated. This review presents different heat transfer parameters and their effect on spray cooling by analysis from past studies. Heat transfer surface modifications and different coolant variations to enhance heat transfer effectiveness are also reviewed. Apart from high heat flux having more applications, low heat flux studies have also grabbed the researchers to find solutions with a temperature range lower than 250ËšC. Therefore, the upcoming spray cooling technology will have broad applications that will contribute to the maximum efficiency of the heat removal rate

    Evaluation of Antimicrobial Activity of Cuminum Cyminum Essential Oil and Extract against Bacterial Strains Isolated from Patients with Symptomatic Urinary Tract Infection

    Get PDF
    Background: Many efforts have been done to find effective agents against resistant pathogens. Cuminum cyminum L. (Cumin) is an aromatic plant within the Apiaceae family. It has a variety of purposes and demonstrates antimicrobial and antioxidant properties. This study evaluated the activity of C. cyminum extract and essential oil against bacterial isolates which cause urinary tract infection, including Escherichia coli, Klebsiella pneumoniae, Pseudomonas aeruginosa, Streptococcus agalactiae, group A streptococci, Enterococcus faecalis, Staphylococcus epidermidis, Staphylococcus aureus and Staphylococcus saprophyticus isolated from patients with urinary tract infection.Materials and Methods: Extract was prepared by maceration and essential oil was prepared by hydrodistillation from C. cyminum seeds. The study population was 95 patients with urinary tract infection without malignant diseases, diabetes and immunosupression. After identification of organism, susceptibility testing was carried out by disc diffusion method and MIC values by broth microdilution testing.Results: C. cyminum essential oil can have a better effect on the gram-negative bacteria causing urinary tract infection than gram-positive bacteria. In addition, C. cyminum extract have good activity against both gram- positive and gram-negative bacteria. Our findings also showed that essential oil and extract of C. cyminum has better antibacterial activity on uropathogen isolates than amoxicillin and the difference was significant (P value<0.05) but the activity is not superior to other antibiotics.Conclusion: These results suggest that the essential oil and extract of C. cyminum seeds might be considered as interesting sources of antibacterial components against uropathogenic bacteria

    Guest editorial

    Get PDF
    "Guest editorial"  Journal of Business Economics and Management, 8(4), p. 23
    • …
    corecore