Preferred Language
Articles
/
0hZqeIkBVTCNdQwCvonF
Wrapper and Hybrid Feature Selection Methods Using Metaheuristic Algorithms for English Text Classification: A Systematic Review
...Show More Authors

Feature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematically studied by exploring available studies of different metaheuristic algorithms used for FS to improve TC. This paper will contribute to the body of existing knowledge by answering four research questions (RQs): 1) What are the different approaches of FS that apply metaheuristic algorithms to improve TC? 2) Does applying metaheuristic algorithms for TC lead to better accuracy than the typical FS methods? 3) How effective are the modified, hybridized metaheuristic algorithms for text FS problems?, and 4) What are the gaps in the current studies and their future directions? These RQs led to a study of recent works on metaheuristic-based FS methods, their contributions, and limitations. Hence, a final list of thirty-seven (37) related articles was extracted and investigated to align with our RQs to generate new knowledge in the domain of study. Most of the conducted papers focused on addressing the TC in tandem with metaheuristic algorithms based on the wrapper and hybrid FS approaches. Future research should focus on using a hybrid-based FS approach as it intuitively handles complex optimization problems and potentiality provide new research opportunities in this rapidly developing field.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Ieee Transactions On Neural Systems And Rehabilitation Engineering
A Framework of Temporal-Spatial Descriptors-Based Feature Extraction for Improved Myoelectric Pattern Recognition
...Show More Authors

View Publication
Scopus (129)
Crossref (129)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Real time handwriting recognition system using CNN algorithms
...Show More Authors

Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Intelligence framework dust forecasting using regression algorithms models
...Show More Authors

<span>Dust is a common cause of health risks and also a cause of climate change, one of the most threatening problems to humans. In the recent decade, climate change in Iraq, typified by increased droughts and deserts, has generated numerous environmental issues. This study forecasts dust in five central Iraqi districts using machine learning and five regression algorithm supervised learning system framework. It was assessed using an Iraqi meteorological organization and seismology (IMOS) dataset. Simulation results show that the gradient boosting regressor (GBR) has a mean square error of 8.345 and a total accuracy ratio of 91.65%. Moreover, the results show that the decision tree (DT), where the mean square error is 8.965, c

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Thu Jun 01 2006
Journal Name
Journal Of The College Of Languages (jcl)
Demonstratives in English and Arabic : A Contrastive Study
...Show More Authors

This paper studies the demonstratives as deictic expressions in Standard Arabic and English by outlining their phonological, syntactic and semantic properties in the two languages. On the basis of the outcome of this outline, a contrastive study of the linguistic properties of this group of deictic expressions in the two languages is conducted next. The aim is to find out what generalizations could be made from the results of this contrastive study.

View Publication Preview PDF
Publication Date
Thu Jun 18 2020
Journal Name
Rimak International Journal Of Humanities And Social Sciences
STRESS IN ENGLISH AND ARABIC: A CONTRASTIVE STUDY
...Show More Authors

DBN Rashid, Rimak International Journal of Humanities and Social Sciences, 2020

View Publication
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
Semantic relations in text and translation: Die semantischen Relationen im Text und Übersetzung
...Show More Authors

       Based on the German language department’s theoretical and practical aspects as well as educational programs, the present study discusses the semantic relations in text sentences and their role in the science of translation.  Through clarifying the semantic relationship between the text sentence and the methods used to express a news item, a situation or an occurrence and through the statement of the multiple theoretical semantic structures of the text’s construction and interrelation, a translator can easily translate a text into the target language.

        It is known that language learners face multiple difficulties in writing and creating an inte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors