In this paper we investigate the automatic recognition of emotion in text. We propose a new method for emotion recognition based on the PPM (PPM is short for Prediction by Partial Matching) character-based text compression scheme in order to recognize Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method is very effective when compared with traditional word-based text classification methods. We have also found that our method works best if the sizes of text in all classes used for training are similar, and that performance significantly improves with increased data.
The aim of the study is to reveal the effect of the constructivist learning Model on the achievement and reflective thinking of the fifth grade literary Preparatory students in History subject. A random sample was chosen which consisted of 64 students divided into experimental and control groups, each group consisted of 32 students. The experimental group was taught via the constructivist learning model, and the control group was taught via the traditional method. The experiment was lasted for Eight weeks, each week taught two lessons. The researcher adopted the experimental design with partial control. The two groups were equalized statistically. The researcher used two instruments, the achievement test and the reflective thinking test.
... Show MoreThe aim of the study is to reveal the effect of the constructivist learning Model on the achievement and reflective thinking of the fifth grade literary Preparatory students in History subject. A random sample was chosen which consisted of 64 students divided into experimental and control groups, each group consisted of 32 students. The experimental group was taught via the constructivist learning model, and the control group was taught via the traditional method. The experiment was lasted for Eight weeks, each week taught two lessons. The researcher adopted the experimental design with partial control. The two groups were equalized statistically. The researcher used two instruments, the achievement test and the reflective thinking test.
... Show MoreThe purpose of this research work is to synthesize conjugates of some NSAIDs with sulfamethoxazole as possible mutual prodrugs to overcome the local gastric irritation of NSAID with free carboxyl group by formation of ester linkage that supposed to remain intact in stomach and may hydrolyze in intestine chemically or enzymatically; in addition to that attempting to target the synthesized derivative to the colon by formation of azo group that undergo reduction only by colonic bacterial azo reductaze enzyme to liberate the parent compound to act locally (treatment of inflammation and infections in colon)
The purpose of this research work is to synthesize conjugates of some NSAIDs with sulfamethoxazole as possible mutual prodrugs to overcome the local gastric irritation of NSAID with free carboxyl group by formation of ester linkage that supposed to remain intact in stomach and may hydrolyze in intestine chemically or enzymatically; in addition to that attempting to target the synthesized derivative to the colon by formation of azo group that undergo reduction only by colonic bacterial azo reductaze enzyme to liberate the parent compound to act locally (treatment of inflammation and infections in colon).
Key words: Mutual prodrug, Ester linkage, Azo bond, Colon targeting
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreSecnidazole was linked with ciprofloxacin as mutual prodrugs to get antibiotics with broader spectrum of activity, improved physicochemical properties and given by single dose to improve patient’s compliance. Furthermore, they provide structural modifications to overcome bacterial adaptation. The structures of the synthesized compounds were confirmed using FT-IR, mass spectrometry, elemental microanalysis (CHNO) and some physiochemical properties. This modification was led to an increase in Log P values for Mutual I (Log P 1.114) and Mutual II (Log P 1.97) compared with its values for Secnidazole (Log P -0.373) and ciprofloxacin (Log P -0.832). The solubility of prodrugs had been determined in different media, Mutual II showed 1
... Show More