Preferred Language
Articles
/
4Bc9P48BVTCNdQwCRGXk
A Survey on Arabic Text Classification Using Deep and Machine Learning Algorithms
...Show More Authors

    Text categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accuracy they got. Deep Learning (DL) and Machine Learning (ML) models were used to enhance text classification for Arabic language. Remarks for future work were concluded.

Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Al–bahith Al–a'alami
The credibility of satellite news channels directed in Arabic from the perspective of Iraqi media, Survey Study
...Show More Authors

This research aims at identifying the commitment of satellite news channels in Arabic to the set of important standards that reflect their credibility in dealing with the media material, and considering that these channels give special importance to events in Iraq, as well as the Arab region and the world, decide to choose them and study them with a problem The research was a question about the level of credibility of Iraqi media. This research is descriptive research, which used the survey method on an objective sample of 245 items, while the questionnaire was used as a data collection tool. Seven channels were selected in Arabic for the study. The three most watched channels were chosen. These channels included the channels of Russia t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Scientific Development For Studies And Research
The Role of E-Learning in teaching the Arabic language to non- native speakers
...Show More Authors

After the information revolution that occurred in the Western world, and the developments in all fields, especially in the field of education and e-learning, from an integrated system based on the effective employment of information and communication technology in the teaching and learning processes through an environment rich in computer and Internet applications, the community and the learner were able to access information sources and learning at any time and place, in a way that achieves mutual interaction between the elements of the system and the surrounding environment. After the occurrence of the phenomenon of Covid 19, it led to a major interruption in all educational systems that had never happened before, and the disrupt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2011
Journal Name
Al-khwarizmi Engineering Journal
Noise Removal of ECG Signal Using Recursive Least Square Algorithms
...Show More Authors

This paper shows an approach for Electromyography (ECG) signal processing based on linear and nonlinear adaptive filtering using Recursive Least Square (RLS) algorithm to remove two kinds of noise that affected the ECG signal. These are the High Frequency Noise (HFN) and Low Frequency Noise (LFN). Simulation is performed in Matlab. The ECG, HFN and LFN signals used in this study were downloaded from ftp://ftp.ieee.org/uploads/press/rangayyan/, and then the filtering process was obtained by using adaptive finite impulse response (FIR) that illustrated better results than infinite impulse response (IIR) filters did.

View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Automatic Block Selection for Synthesizing Texture Images using Genetic Algorithms
...Show More Authors

Texture synthesis using genetic algorithms is one way; proposed in the previous research, to synthesis texture in a fast and easy way. In genetic texture synthesis algorithms ,the chromosome consist of random blocks selected manually by the user .However ,this method of selection is highly dependent on the experience of user .Hence, wrong selection of blocks will greatly affect the synthesized texture result. In this paper a new method is suggested for selecting the blocks automatically without the participation of user .The results show that this method of selection eliminates some blending caused from the previous manual method of selection.

View Publication Preview PDF
Crossref
Publication Date
Fri Feb 10 2023
Journal Name
Dentistry Journal
The Role of Social Media in Communication and Learning at the Time of COVID-19 Lockdown—An Online Survey
...Show More Authors

This study aimed to assess orthodontic postgraduate students’ use of social media during the COVID-19 lockdown. Ninety-four postgraduate students (67 master’s students and 27 doctoral students) were enrolled in the study and asked to fill in an online questionnaire by answering questions regarding their use of social media during the COVID-19 lockdown. The frequency distributions and percentages were calculated using SPSS software. The results showed that 99% of the students used social media. The most frequently used type of social media was Facebook, 94%, followed by YouTube, 78%, and Instagram, 65%, while Twitter and Linkedin were used less, and no one used Blogger. About 63% of the students used elements of social media to l

... Show More
View Publication
Scopus (23)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
A Comparative Study of Various Intelligent Optimization Algorithms Based on Path Planning and Neural Controller for Mobile Robot
...Show More Authors

In this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Survey of Face Recognition Systems
...Show More Authors

With the quick grow of multimedia contents, from among this content, face recognition has got a lot of significant, specifically in latest little years. The face as object formed of various recognition characteristics for detect; so, it is still the most challenge research domain for researchers in area of image processing and computer vision. In this survey article, tried to solve the most demanding facial features like illuminations, aging, pose variation, partial occlusion and facial expression. Therefore, it indispensable factors in the system of facial recognition when performed on facial pictures. This paper study the most advanced facial detection techniques too, approaches: Hidden Markov Models, Principal Component Analysis (PCA)

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Aug 17 2022
Journal Name
Aip Conference Proceedings
The effect of using Gaussian, Kurtosis and LogCosh as kernels in ICA on the satellite classification accuracy
...Show More Authors

This study focusses on the effect of using ICA transform on the classification accuracy of satellite images using the maximum likelihood classifier. The study area represents an agricultural area north of the capital Baghdad - Iraq, as it was captured by the Landsat 8 satellite on 12 January 2021, where the bands of the OLI sensor were used. A field visit was made to a variety of classes that represent the landcover of the study area and the geographical location of these classes was recorded. Gaussian, Kurtosis, and LogCosh kernels were used to perform the ICA transform of the OLI Landsat 8 image. Different training sets were made for each of the ICA and Landsat 8 images separately that used in the classification phase, and used to calcula

... Show More
View Publication Preview PDF
Scopus Crossref