Preferred Language
Articles
/
bsj-7731
A Novel Gravity ‎Optimization Algorithm for Extractive Arabic Text Summarization
...Show More Authors

 

An automatic text summarization system mimics how humans summarize by picking the most ‎significant sentences in a source text. However, the complexities of the Arabic language have become ‎challenging to obtain information quickly and effectively. The main disadvantage of the ‎traditional approaches is that they are strictly constrained (especially for the Arabic language) by the ‎accuracy of sentence feature ‎functions, weighting schemes, ‎and similarity calculations. On the other hand, the meta-heuristic search approaches have a feature that tolerates imprecision, gets ‎prohibited results, and is not strictly bound by the above ‎restrictions. This ‎paper used the Gravitational Optimization Algorithm (GOA), a powerful metaheuristic ‎approach ‎based on the law of ‎gravity, to address the challenge of extractive summarizing Arabic texts. The objective function of the GOA algorithm is derived based on sentence significance, such as its length, ‎similarity degree, position, statistical term frequency, and named entity ownership. Essex Arabic ‎Summaries Corpus (EASC) was used to evaluate the proposed method and measured by the Recall-Oriented Understudy for Gisting Evaluation (ROUGE). The proposed approach achieved 68.04% Recall, ‎‎58.49% Precision, and 60.05% F1-measure using ROUGE-1, higher than standard summarizers and metaheuristic approaches

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Genetic Algorithm and Particle Swarm Optimization Techniques for Solving Multi-Objectives on Single Machine Scheduling Problem
...Show More Authors

In this paper, two of the local search algorithms are used (genetic algorithm and particle swarm optimization), in scheduling number of products (n jobs) on a single machine to minimize a multi-objective function which is denoted as  (total completion time, total tardiness, total earliness and the total late work). A branch and bound (BAB) method is used for comparing the results for (n) jobs starting from (5-18). The results show that the two algorithms have found the optimal and near optimal solutions in an appropriate times.

View Publication Preview PDF
Crossref
Publication Date
Sat Nov 05 2022
Journal Name
Sensors
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si

... Show More
View Publication
Crossref (10)
Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Environmental control of the oil industry extractive
...Show More Authors

The research aims to prepare a report by the external auditor (Federal Office of Financial Supervision) for the control environment it is includes financial control, commitment and performance of the North Oil Company (extractive) according to the causes of pollution. The research problem it is not the Federal Office of Financial Supervision preparation a report on the things the environment include the prevent or reduction failure the administration of the causes of the pollution caused by oil mining industry by both bad planning or operational or related to efficient human resources as well as of technology to use and resulting from non-compliance local laws and instructions, as well as the inefficiency of spending on environme

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Publication Date
Thu May 18 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Steganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography

View Publication Preview PDF
Publication Date
Thu Aug 31 2017
Journal Name
Journal Of Engineering
Enhanced Performance of Consensus Wireless Sensor Controlled System via Particle Swarm Optimization Algorithm
...Show More Authors

     This paper describes the application of consensus optimization for Wireless Sensor Network (WSN) system. Consensus algorithm is usually conducted within a certain number of iterations for a given graph topology. Nevertheless, the best Number of Iterations (NOI) to reach consensus is varied in accordance with any change in number of nodes or other parameters of . graph topology. As a result, a time consuming trial and error procedure will necessary be applied
to obtain best NOI. The implementation of an intellig ent optimization can effectively help to get the optimal NOI. The performance of the consensus algorithm has considerably been improved by the inclusion of Particle Swarm Optimization (PSO). As a case s

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
A new vision for the classic in contemporary fashion designResearch
...Show More Authors

        fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages      The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Using Graph Mining Method in Analyzing Turkish Loanwords Derived from Arabic Language
...Show More Authors

Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Encryption Algorithm Based on Chaotic Neural Network and Random Key Generator
...Show More Authors

This work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
New Method for Estimation Mebeverine Hydrochloride Drugs Preparation by a New Analyser: Ayah 6S.X1(WSLEDs)-T.- Two Solar Cells Complied with C.F.I.A
...Show More Authors

A sensitivity-turbidimetric method at (0-180o) was used for detn. of mebeverine in drugs by two solar cell and six source  with C.F.I.A.. The method was based on the formation  of  ion pair for the pinkish banana color  precipitate by the reaction of Mebeverine hydrochloride with Phosphotungstic acid. Turbidity was measured via the reflection of incident light that collides on the surface particles of   precipitated at 0-180o. All variables were optimized. The linearity ranged of Mebeverine hydrochloride was 0.05-12.5mmol.L-1, the L.D. (S/N= 3)(3SB) was 521.92 ng/sample depending on dilution for the minimum concentration , with correlation coefficient r = 0.9966while was R.S.D%

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref