Preferred Language
Articles
/
4Bc9P48BVTCNdQwCRGXk
A Survey on Arabic Text Classification Using Deep and Machine Learning Algorithms
...Show More Authors

    Text categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accuracy they got. Deep Learning (DL) and Machine Learning (ML) models were used to enhance text classification for Arabic language. Remarks for future work were concluded.

Scopus Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey on bio-signal analysis for human-robot interaction
...Show More Authors

<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Intelligence framework dust forecasting using regression algorithms models
...Show More Authors

<span>Dust is a common cause of health risks and also a cause of climate change, one of the most threatening problems to humans. In the recent decade, climate change in Iraq, typified by increased droughts and deserts, has generated numerous environmental issues. This study forecasts dust in five central Iraqi districts using machine learning and five regression algorithm supervised learning system framework. It was assessed using an Iraqi meteorological organization and seismology (IMOS) dataset. Simulation results show that the gradient boosting regressor (GBR) has a mean square error of 8.345 and a total accuracy ratio of 91.65%. Moreover, the results show that the decision tree (DT), where the mean square error is 8.965, c

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Real time handwriting recognition system using CNN algorithms
...Show More Authors

Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Jun 08 2021
Journal Name
مجلة العلوم و التكنولوجية للنشاطات البدنية و الرياضية
The effectiveness of using (7E’s) learning cycle in learning a movement chain on the uneven bars in the artistic gymnastics for women
...Show More Authors

Abstract The Object of the study aims to identify the effectiveness of using the 7E’s learning cycle to learn movement chains on uneven bars, for this purpose, we used the method SPSS. On a sample composed (20) students on collage of physical education at the university of Baghdad Chosen as two groups experimental and control group (10) student for each group, and for data collection, we used SPSS After collecting the results and having treated them statistically, we conclude the use 7E’s learning cycle has achieved remarkable positive progress, but it has diverged between to methods, On this basis, the study recommended the necessity of applying 7E’s learning cycle strategy in learning the movement chain on uneven bar

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Applied And Computational Mathematics
Texture Classification Using Spline, Wavelet Decomposition and Fractal Dimension
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
International Journal Of Artificial Intelligence And Mechatronics
Machining Polylines and Ellipses using Three-Axis CNC Milling Machine
...Show More Authors

CNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.

View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 31 2015
Journal Name
Journal Of Theoretical And Applied Information Technology
EXAM QUESTIONS CLASSIFICATION BASED ON BLOOM’S TAXONOMY COGNITIVE LEVEL USING CLASSIFIERS COMBINATION
...Show More Authors

Preview PDF
Scopus (71)
Scopus
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref