Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that represents the relationship between the compared texts and extracts the degree of similarity between them. Representing a text as a semantic network is the best knowledge representation that comes close to the human mind's understanding of the texts, where the semantic network reflects the sentence's semantic, syntactical, and structural knowledge. The network representation is a visual representation of knowledge objects, their qualities, and their relationships. WordNet lexical database has been used as a knowledge-based source while the GloVe pre-trained word embedding vectors have been used as a corpus-based source. The proposed method was tested using three different datasets, DSCS, SICK, and MOHLER datasets. A good result has been obtained in terms of RMSE and MAE.
The interest of many companies has become dealing with the tools and methods that reduce the costs as one of the most important factors of successful companies, and became the subject of the attention of many economic units because of the impact on the profits of company, and since the nineties of the last century the researchers and writers gave great attention to this subject, especially in light of the large competition and rapid developments in cost management techniques, as well as the wide and significant change in production methods that have been directed towards achieving customer satisfaction, all this and more driven by economic units in all sectors whether it is service or productivity to find methods that would reduc
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe objective of the research is to measure the impact of social responsibility on the financial performance of the National Bank of Iraq for the period from 2014 to 2016 (3 years) through discussing and analyzing the level of practice of the Bank of Baghdad for social responsibility and the impact on their financial performance during the period. To measure the independent variable (CSR), the researcher used the CSR Disclosure Index and relied on the ROA as an indicator to measure the dependent variable (financial performance). The results of the research showed the main hypothesis of the research, which states that the social responsibility of the banks has no significant impact on the financial performance. In relation to the disclosu
... Show MoreAbstract
Through this study, I tried to identify the grammatical efforts of one of the most important authors of the footnotes that were built on the luminous benefits marked with (Explanation of Mulla Jami in Grammar), and he is Sheikh Isamah Allah Al-Bukhari, who died in the eleventh century AH, trying as much as possible to stay away from the path of tradition in repeating the efforts of Those who preceded me in explaining the grammatical efforts of many grammarians, and perhaps what helped me in this is the characteristics that characterize the notes owners that may distinguish them from other owners of grammatical authorship, as a result of what characterized the personality of the notes owners from the predominance of the in
... Show MoreWords in a language do not exist in isolation but in close connection with each other ,teaming up in one way or another known to the Russian semasiology M. M. Pokrovsky , one of the first to realize the systematic nature of the lexicon, wrote about the second half of the nineteenth century : „the Words and their meanings do not live separate from each other life, but are joined together in our minds), regardless of our consciousness to different groups , and the basis for grouping is the similarity or direct contrast in the main value.
It is doubtless that the sexual place has some common indicators due to the masculine and feminine bodies which may be natural or deviated (homosexual). The female has an act of voice in the imaginary masculine place whereas the male has an act of image recognized in the parental mind in both the secular and sacred place. Those places create different limits and perceptions according to the auditory and visual readings in search of identity, text and body in the feminine dramatic text.
The research includes four chapters; the first, the methodological framework, involves the problem which is centralized in the following enquiry: What is the relationship between the place and the term of
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreA simple all optical fiber sensor based on multimode interference (MMI) for chemical liquids sensing was designed and fabricated. A segment of coreless fiber (CF) was spliced between two single mode fibers to buildup single mode-coreless-single mode (SCS) structure. Broadband source and optical signal analyzer were connected to the ends of SCS structure. De-ionized water, acetone, and n-hexane were used to test the performance of the sensor. Two influence factors on the sensitivity namely the length and the diameter of the CF were investigated. The obtained maximum sensitivity was at n-hexane at 340.89 nm/RIU (at a wavelength resolution of the optical spectrum analyzer of 0.02 nm) when the diameter of the CF reduced from 125 μm to 60 μ
... Show Moreمفهوم معامل الارتباط كمقياس يربط بين متغيرين هذا يجلب انتباهنا إلى موضوع الإحصاء في كل المستويات. أكثر من ذلك هناك ثلاث نقاط خاصة هي اعتيادياً نشدد عليها كما يأتي:-
(1 معامل الارتباط هو الدليل المعياري والذي قيمته لا تعتمد على قياسات
المتغيرات الأصلية.
(2قيمته تقع في المدى] 1,1-[ .
&nb
... Show MoreThis work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.
... Show More