People’s ability to quickly convey their thoughts, or opinions, on various services or items has improved as Web 2.0 has evolved. This is to look at the public perceptions expressed in the reviews. Aspect-based sentiment analysis (ABSA) deemed to receive a set of texts (e.g., product reviews or online reviews) and identify the opinion-target (aspect) within each review. Contemporary aspect-based sentiment analysis systems, like the aspect categorization, rely predominantly on lexicon-based, or manually labelled seeds that is being incorporated into the topic models. And using either handcrafted rules or pre-labelled clues for performing implicit aspect detection. These constraints are restricted to a particular domain or language which is domain-dependent. In this work, we first propose a novel unsupervised probabilistic model Topic-seeds Latent Dirichlet Allocation (TSLDA) that leverages semantic regularities for the articulation of explicit aspect-categories. Then, based on the articulated categories, a distributed vector is used for the identification of implicit aspects. The experimental results show that our approach outperforms baseline methods for different domain-data with minimal configurations. Specifically, utilizing the RI measure, our proposed TSLDA outperformed multiple clustering and topic models by an average of 0.83% in diverse domain-data, and roughly 0.89% using the Precision metric for implicit aspect detection.
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreAs possible mutual prodrug had been synthesized that contain metronidazole and dexamethazone conjugated through phosphodiester linkage. The rationale for this type of conjugate is to get a prodrug with possible site – specific delivery of its active constituents into the lower parts of the G.I.T.
This compound was synthesized by the reaction of dexamethzone – 21 – phosphate with metronidazole to form:(1 – (dexamethazone – 21 – phosphoryl) – metronidazole)
This conjugate was performed using dicyclohexylcarbodiimide (DCC) as a condensing agent. The identity of the prepared compound had been confirmed using T.L.C., U.V. spectroscopy, IR spectrosco
... Show MoreAbstract Objective (s): To identify the prevalence of obesity and overweight in infants and children less than 2 years of age and its relationship with type of feeding in a sample of children attending Al- Kadhymia primary health care center. Methodology: This study was a descriptive survey carried out in, the primary health care centre of Al-Kadhymia town in Baghdad during the period from 5th of July 2009-1st of May 2010. Sample was chosen by non probability convenience sampling and it included 744 infant and children. Data were gathered by a combination of a structured questionnaire and measurements o
This paper aims at investigating the effect of postmodernism and technology on the social life in Don Delillo's novel The White Noise. In this novel, Don Delillo portrays the chaotic life by using modern technology which has been presented by three ways. The first way is by television as being a source of information and entertainment. The second way is by the toxic event whereas the third is by Dylar's episode and its destructive consequences. He depicts that through the atmosphere of Jack's family plus its effects on the life and thoughts of the elders and society. He proves that technology is leading humanity not to safety, but to death. He further highlights that by showing the impact of technology on the life of the main charac
... Show MoreThe essence of the new work in the satellite TV channels is to provide news coverage of news that will inform the people of what is going on around them in order to increase their political, social, economic and cultural awareness and this drives them to take positions or certain behaviors on according to what the communicator in these channels wants. News and news reports are generally used as a psychological variable to influence public opinion and does not offer interestingness and information. Therefore, satellite TV channels have assumed special attention towards their correspondents desiring to achieve scoop in news coverage and to have the final word in reading events and install it
... Show MoreThe Arab Islamic art was best known as pure abstraction or realism distorted from what is natural. The two styles, or one of them, was the most prominent in the Islamic arts, such as decoration, photography and architecture. The analogy that was prevalent in the non-Islamic world did not have a presence equivalent the aforementioned styles despite the great openness to the cultures of different countries, which characterized that stage, which resulted from the Islamic conquests, the conversion of many people to the Islamic faith, and their migration to the Islamic cities at the time, bringing with them their arts and methods of formulation. This makes us question the influential references that invite the Arab Muslim artist to follow the
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreABSTRACTBackground: cochlear implants are electronic devices that convert sound energy into electrical signals to stimulate ganglion cells and cochlear nerve fibers. These devices are indicated for patients with severe to profound sensorineural hearing losses who receive little or no benefit from hearing aids. The implant basically takes over the function of the cochlear hair cells. The implant consists of external components (microphone, speech processor and transmitting coil) and internal components (receiver stimulator and electrode array). The implant is inserted via a trans mastoid facial recess approach to the round window and scala tympani.Objectives: to determine the effectiveness and safety of non fixation method in cochlear imp
... Show MoreAn experiment was carried out evaluate the performance of RAU combined equipment under three levels of practical speed, (V1) 4.06 km. h-1, (V2) 4.43 km. hr-1 and (V3) 5.76 km. hr-1, and three levels of depth with 10,20and 30 cm. It is denoted by D1, D2, D3 respectively. A split plot design was used within the RCBD design with three replications. The experiment results showed that the first practical speed 4.06 km.hr-1 achieved the lowest slippage percentage from 9.61%, lowest traction power 14.65hp, lowest soil penetration resistance to1.34 kg.cm-2, and the highest total operating