Preferred Language
Articles
/
ijs-1615
Extractive Multi-Document Summarization Model Based On Different Integrations of Double Similarity Measures

Currently, the prominence of automatic multi document summarization task belongs to the information rapid increasing on the Internet. Automatic document summarization technology is progressing and may offer a solution to the problem of information overload. 

Automatic text summarization system has the challenge of producing a high quality summary. In this study, the design of generic text summarization model based on sentence extraction has been redirected into a more semantic measure reflecting individually the two significant objectives: content coverage and diversity when generating summaries from multiple documents as an explicit optimization model. The proposed two models have been then coupled and defined as a single-objective optimization problem. Also, for improving the performance of the proposed model, different integrations concerning two similarity measures have been introduced and applied to the proposed model along with the single similarity measures that are based on using Cosine, Dice and  similarity measures for measuring text similarity. For solving the proposed model, Genetic Algorithm (GA) has been used. Document sets supplied by Document Understanding Conference 2002 ( ) have been used for the proposed system as an evaluation dataset. Also, as an evaluation metric, Recall-Oriented Understudy for Gisting Evaluation ( ) toolkit has been used for performance evaluation of the proposed method. Experimental results have illustrated the positive impact of measuring text similarity using double integration of similarity measures against single similarity measure when applied to the proposed model wherein the best performance in terms of  and  has been recorded for the integration of Cosine similarity and  similarity.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Using Visual Cryptography and hash function for Fragile Watermarking to Detect Electronic Document Forgery

     Recent developments in technology and the area of digital communications have rendered digital images increasingly susceptible to tampering and alteration by persons who are not authorized to do so. This may appear to be acceptable, especially if an image editing process is necessary to delete or add a particular scene that improves the quality the image. But what about images used in authorized governmental transactions? The consequences can be severe; any altered document is considered forged under the law and may cause confusion. Also, any document that cannot be verified as being authentic is regarded as a fake and cannot be used, inflicting harm on people. The suggested work intends to reduce fraud in electronic documents u

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Jun 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Covid-19 Control Measures by some community Pharmacies in Sulaimani City/Iraq

Background: Coronavirus pandemic (COVID-19) has enormously affected various healthcare services including the one of community pharmacy. The ramifications of these effects on Iraqi community pharmacies and the measures they have taken to tackle the spread of COVID-19  is yet to be explored. In this cross sectional survey, infection control measures by community pharmacies in Sulaimani city/Iraq has been investigated.        

Methods: Community pharmacists were randomly allocated  to participate in a cross-sectional survey via visiting their pharmacies and filling up the questionnaire form.

 

Results and discussion:

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Dec 24 2019
Journal Name
Journal Of Legal Sciences
Federal Tax control in Taxation Domain and its reform measures in Iraq

Federal oversight is successful in collecting taxes when it saves time and money, and the majority of federal systems tend to adopt direct administration in the application of federal tax laws to finance public expenditure. Central control will prevent tax competition between regions, and administrative corruption.

In Iraq, regional governments are responsible for collecting federal taxes and under the supervision of the Financial Control Bureau, and the reform of supervision requires the rehabilitation of the administration, the adoption of information systems, and the reduction of bureaucracy, and the transparency and federal coordination.

Crossref
View Publication Preview PDF
Publication Date
Mon Dec 06 2021
Journal Name
Iraqi Journal Of Science
A Proposed Background Modeling Algorithm for Moving Object Detection Using Statistical Measures

Extracting moving object from video sequence is one of the most important steps
in the video-based analysis. Background subtraction is the most commonly used
moving object detection methods in video, in which the extracted object will be
feed to a higher-level process ( i.e. object localization, object tracking ).
The main requirement of background subtraction method is to construct a
stationary background model and then to compare every new coming frame with it
in order to detect the moving object.
Relied on the supposition that the background occurs with the higher appearance
frequency, a proposed background reconstruction algorithm has been presented
based on pixel intensity classification ( PIC ) approach.

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Face Antimagic Labeling for Double Duplication of Barycentric and Middle Graphs

This paper proves the existence of face antimagic labeling for double duplication of barycentric subdivision of cycle and some other graphs 

Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jul 25 2023
Journal Name
Journal Of Optical Communications
Design mode filtering interferometer using etched double clad fiber
Abstract<p>Mode filtering technique is one of the most desired techniques in optical fiber communication systems, especially for multiple input multiple output (MIMO) coherent optical communications that have mode-dependent losses in communication channels. In this work, a special type of optical fiber sensing head was used, where it utilizes DCF13 that is made by Thorlabs and has two numerical apertures (NA’s). One is for core and 1st cladding region, while the 2nd relates the 1st cladding to the 2nd cladding. Etching process using 40 % hydro-fluoric (HF) acid was performed on the DCF13 with variable time in minutes. Investigation of the correlation between the degree of etching and the re</p> ... Show More
Scopus (3)
Crossref (3)
Scopus Crossref
View Publication
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Adoption of multi – model Assignment Fuzzy to find Optimizing for the use of internet line in the Ministry of Science and Technlogy

We have provided in this research model multi assignment  with  fuzzy function goal has been to build programming model is correct Integer Programming fogging  after removing the case from the objective function data and convert it to real data .Pascal triangular graded mean using Pascal way to the center of the triangular.

The data processing to get rid of the case fogging which is surrounded by using an Excel 2007 either model multi assignment  has been used program LNDO to reach the optimal solution, which represents less than what can be from time to accomplish a number of tasks by the number of employees on the specific amount of the Internet, also included a search on some of the

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Construction and Study of Amine Electrodes Based on Membranes Containing Sulfonic Compounds as Active Materials with Different Plasticizers in PVC Matrix Membranes

Several  amine  liquid selective  electrodes  were prepared based on

two  active   materials,   phenol  sulfonic   acid  and   l ,2-dihydroxy-3,5- disulfonic  acid   disodium   salt   with  several   plasticizers,  di-n-butyl phthalate(ORPH),  tri-n-butyl   phosphate   (TBP)   and  a-nitro   phenyl octyl  ether   (NPOE).   Electrode   parameters   were  studied   including, concentration range,  detection  limit,  slope,  life  time,  response  time and  

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 30 2020
Journal Name
International Journal Of Civil Engineering
Adsorption of Meropenem Antibiotics from Aqueous Solutions on Multi-Walled Carbon Nanotube

Pharmaceutical-instigated pollution is a major concern, especially in relation to aquatic environments and drugs such as meropenem antibiotics. Adsorbents, such as multi-walled carbon nanotubes, offer potential as means of removing polluting meropenem antibiotics and other similar compounds from water. In order to evaluate the effectiveness of multi-walled carbon nanotubes in this capacity, various experimental parameters, including contact time, initial concentration, pH, temperature and the dose of adsorbent have been investigated. The Langmuir and the Freundlich isotherm models have been used. The data obtained using a modified Langmuir model have been consistent with the experimental ones; the best pH value has been obtained to have the

... Show More
Crossref (3)
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
Crossref (2)
Crossref
View Publication Preview PDF