Preferred Language
Articles
/
bsj-7731
A Novel Gravity ‎Optimization Algorithm for Extractive Arabic Text Summarization
...Show More Authors

 

An automatic text summarization system mimics how humans summarize by picking the most ‎significant sentences in a source text. However, the complexities of the Arabic language have become ‎challenging to obtain information quickly and effectively. The main disadvantage of the ‎traditional approaches is that they are strictly constrained (especially for the Arabic language) by the ‎accuracy of sentence feature ‎functions, weighting schemes, ‎and similarity calculations. On the other hand, the meta-heuristic search approaches have a feature that tolerates imprecision, gets ‎prohibited results, and is not strictly bound by the above ‎restrictions. This ‎paper used the Gravitational Optimization Algorithm (GOA), a powerful metaheuristic ‎approach ‎based on the law of ‎gravity, to address the challenge of extractive summarizing Arabic texts. The objective function of the GOA algorithm is derived based on sentence significance, such as its length, ‎similarity degree, position, statistical term frequency, and named entity ownership. Essex Arabic ‎Summaries Corpus (EASC) was used to evaluate the proposed method and measured by the Recall-Oriented Understudy for Gisting Evaluation (ROUGE). The proposed approach achieved 68.04% Recall, ‎‎58.49% Precision, and 60.05% F1-measure using ROUGE-1, higher than standard summarizers and metaheuristic approaches

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Scienceasia
A combined compact genetic algorithm and local search method for optimizing the ARMA(1,1) model of a likelihood estimator
...Show More Authors

In this paper, a compact genetic algorithm (CGA) is enhanced by integrating its selection strategy with a steepest descent algorithm (SDA) as a local search method to give I-CGA-SDA. This system is an attempt to avoid the large CPU time and computational complexity of the standard genetic algorithm. Here, CGA dramatically reduces the number of bits required to store the population and has a faster convergence. Consequently, this integrated system is used to optimize the maximum likelihood function lnL(φ1, θ1) of the mixed model. Simulation results based on MSE were compared with those obtained from the SDA and showed that the hybrid genetic algorithm (HGA) and I-CGA-SDA can give a good estimator of (φ1, θ1) for the ARMA(1,1) model. Anot

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Oct 05 2010
Journal Name
Journal Of College Of Education For Women
Conversation Analysis of Forum: a Selected Text from Paul S. Kemp Online Journal
...Show More Authors

Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit

... Show More
Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Schema Theory and Text- worlds: A Cognitive Stylistic Analysis of Selected Literary Texts
...Show More Authors

Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.        Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o

... Show More
Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
2017 12th International Conference For Internet Technology And Secured Transactions (icitst)
A novel multimedia-forensic analysis tool (M-FAT)
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Al-adab Journal
The Iraqi countryside in a novel (Exceeded border)
...Show More Authors

The novel was generally distinguished from other literary arts in its connection with the living reality as an imaginative practice that relies on political, economic, social, intellectual and cultural references and as a crucial tool in reading cultural references and dive deep into reality. As every novelist has a vision to embody this reality. As every novelist has a vision to embody this reality. The novel of ("Exceeded border by Hammed Al-Kafa’i) is a considered a fertile field for presenting social issues in their apparent structure and revealing the cultural patterns behind them which lies in its deep structure. The novel here moves its characters in its imaginary world in a way that it becomes more capable of adaptation and crysta

... Show More
Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Intelligent Automation & Soft Computing
A Novel Classification Method with Cubic Spline Interpolation
...Show More Authors

View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison Between Maximum Likelihood Method And Bayesian Method For Estimating Some Non-Homogeneous Poisson Processes Models
...Show More Authors

Abstract

The Non - Homogeneous Poisson  process is considered  as one of the statistical subjects which had an importance in other sciences and a large application in different areas as waiting raws and rectifiable systems method , computer and communication systems and the theory of reliability and many other, also it used in modeling the phenomenon that occurred by unfixed way over time (all events that changed by time).

This research deals with some of the basic concepts that are related to the Non - Homogeneous Poisson process , This research carried out two models of the Non - Homogeneous Poisson process which are the power law model , and Musa –okumto ,   to estimate th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Speech Enhancement Algorithm Based on a Hybrid Estimator
...Show More Authors
Abstract<p>Speech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra</p> ... Show More
View Publication
Crossref (11)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Applied Sciences
Multiobjective Optimization of Stereolithography for Dental Bridge Based on a Simple Shape Model Using Taguchi and Response Surface Methods
...Show More Authors

Stereolithography (SLA) has become an essential photocuring 3D printing process for producing parts of complex shapes from photosensitive resin exposed to UV light. The selection of the best printing parameters for good accuracy and surface quality can be further complicated by the geometric complexity of the models. This work introduces multiobjective optimization of SLA printing of 3D dental bridges based on simple CAD objects. The effect of the best combination of a low-cost resin 3D printer’s machine parameter settings, namely normal exposure time, bottom exposure time and bottom layers for less dimensional deviation and surface roughness, was studied. A multiobjective optimization method was utilized, combining the Taguchi me

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref