Extractive multi-document text summarization – a summarization with the aim of removing redundant information in a document collection while preserving its salient sentences – has recently enjoyed a large interest in proposing automatic models. This paper proposes an extractive multi-document text summarization model based on genetic algorithm (GA). First, the problem is modeled as a discrete optimization problem and a specific fitness function is designed to effectively cope with the proposed model. Then, a binary-encoded representation together with a heuristic mutation and a local repair operators are proposed to characterize the adopted GA. Experiments are applied to ten topics from Document Understanding Conference DUC2002 datasets (d061j through d070f). Results clarify the effectiveness of the proposed model when compared with another state-of-the-art model.
Satire is genre of the literary arts that has always been the source of human interest. Because it is difficult to accept direct criticism, Satire appears as a literary tool in which vices, follies, abuses and shortcomings are held up to ridicule, with the intent of shaming individuals, corporations, government, or society itself into improvement. A satirical critic usually employs irony to attain this goal. Although satire is usually meant to be humorous, its greater purpose is often profitable social criticism, using wit to draw at
... Show MoreAbstract The myth is a story that is passed on to the generations generation after generation, ridiculed by literary writers in their literary work; to convey an important idea to the recipient, and in legend many things useful to the creator, especially the novelist, from that ritual and harnesses to be symbols that reach the recipient what the creator thinks; The Arabic novel, I chose Sahel al-Nahr's novel of Sudanese novelist Buthaina Khader Makki, a well-known author in her country for her advocacy of women and their rights. She used legend and mythic symbols in a deliberate manner to convince the recipient that what he read was a real thing worth standing at Understand E, has reached a number of results, including Butha
... Show MoreIn some cases, researchers need to know the causal effect of the treatment in order to know the extent of the effect of the treatment on the sample in order to continue to give the treatment or stop the treatment because it is of no use. The local weighted least squares method was used to estimate the parameters of the fuzzy regression discontinuous model, and the local polynomial method was used to estimate the bandwidth. Data were generated with sample sizes (75,100,125,150 ) in repetition 1000. An experiment was conducted at the Innovation Institute for remedial lessons in 2021 for 72 students participating in the institute and data collection. Those who used the treatment had an increase in their score after
... Show MoreLocalization is an essential demand in wireless sensor networks (WSNs). It relies on several types of measurements. This paper focuses on positioning in 3-D space using time-of-arrival- (TOA-) based distance measurements between the target node and a number of anchor nodes. Central localization is assumed and either RF, acoustic or UWB signals are used for distance measurements. This problem is treated by using iterative gradient descent (GD), and an iterative GD-based algorithm for localization of moving sensors in a WSN has been proposed. To localize a node in 3-D space, at least four anchors are needed. In this work, however, five anchors are used to get better accuracy. In GD localization of a moving sensor, the algo
... Show MoreBackground: The spleen is the most common solid
organ injured in patients who had sustained abdominal
trauma. Such injuries to the spleen represent
approximately one quarter of all blunt injuries of the
abdominal viscera.
Due to its remarkable vasculature and its fragile
structure, splenic rupture is the most widespread cause
of intra-abdominal hemorrhage.
Objective: To assess the magnitude of splenic injury,
the management of splenic injury, and to evaluate the
postoperative complications.
Methods: A prospective study of 57 cases of splenic
injury was performed in Al-Kadhimiya Teaching
Hospital during the period between the 1st of October
2004 and the 1st of October 2006. Statistical analysis
Background: Inguinal hernias are a common medical problem that can significantly decrease the quality of life.Repair of inguinal hernia is one of the commonest surgical procedures worldwide irrespective of the country, race, or socioeconomic state. The inguinal hernia repair has been a controversial area in surgical practice from the time it has been conceived. Laparoscopic inguinal hernia repair has shown a great deal of promise as a treatment for the condition.
Objectives: To compare the outcome of laparoscopic versus open inguinal hernia mesh repair in terms of operative time , analgesics requirement , postoperative complication , hospital stay and return to daily activities and work.
Patients and methods: A prospective study of
Recognition is one of the basic characteristics of human brain, and also for the living creatures. It is possible to recognize images, persons, or patterns according to their characteristics. This recognition could be done using eyes or dedicated proposed methods. There are numerous applications for pattern recognition such as recognition of printed or handwritten letters, for example reading post addresses automatically and reading documents or check reading in bank.
One of the challenges which faces researchers in character recognition field is the recognition of digits, which are written by hand. This paper describes a classification method for on-line handwrit
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreInformational videos are becoming increasingly important among all video types. The users spend so much time browsing the informative videos, even if they are not interested in all their topics. Thence, a new method for extracting descriptive frames is presented in this paper that allows users to navigate directly to the topics of their interest in the video. The proposed method consists of three main phases: video preprocessing, video segmentation, and the video separation phase. Firstly, frames are extracted from the videos, resized, and converted to grayscale. Then, the frames are divided into blocks, and the kurtosis moment is calculated for each block. The videos are segmented based on an examination of the differences betw
... Show More