Text documents are unstructured and high dimensional. Effective feature selection is required to select the most important and significant feature from the sparse feature space. Thus, this paper proposed an embedded feature selection technique based on Term Frequency-Inverse Document Frequency (TF-IDF) and Support Vector Machine-Recursive Feature Elimination (SVM-RFE) for unstructured and high dimensional text classificationhis technique has the ability to measure the feature’s importance in a high-dimensional text document. In addition, it aims to increase the efficiency of the feature selection. Hence, obtaining a promising text classification accuracy. TF-IDF act as a filter approach which measures features importance of the text documents at the first stage. SVM-RFE utilized a backward feature elimination scheme to recursively remove insignificant features from the filtered feature subsets at the second stage. This research executes sets of experiments using a text document retrieved from a benchmark repository comprising a collection of Twitter posts. Pre-processing processes are applied to extract relevant features. After that, the pre-processed features are divided into training and testing datasets. Next, feature selection is implemented on the training dataset by calculating the TF-IDF score for each feature. SVM-RFE is applied for feature ranking as the next feature selection step. Only top-rank features will be selected for text classification using the SVM classifier. Based on the experiments, it shows that the proposed technique able to achieve 98% accuracy that outperformed other existing techniques. In conclusion, the proposed technique able to select the significant features in the unstructured and high dimensional text document.
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreEnergy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show MoreUltimate oil recovery and displacement efficiency at the pore-scale are controlled by the rock wettability thus there is a growing interest in the wetting behaviour of reservoir rocks as production from fractured oil-wet or mixed-wet limestone formations have remained a key challenge. Conventional waterflooding methods are inefficient in such formation due to poor spontaneous imbibition of water into the oil-wet rock capillaries. However, altering the wettability to water-wet could yield recovery of significant amounts of additional oil thus this study investigates the influence of nanoparticles on wettability alteration. The efficiency of various formulated zirconium-oxide (ZrO2) based nanofluids at different nanoparticle concentrations (0
... Show More
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show MorePhotovoltaic (PV) devices are widely used renewable energy resources and have been increasingly manufactured by many firms and trademarks. This condition makes the selection of right product difficult and requires the development of a fast, accurate and easy setup that can be implemented to test available samples and select the cost effective, efficient, and reliable product for implementation. An automated test setup for PV panels using LabVIEW and several microcontroller-based embedded systems were designed, tested, and implemented. This PV testing system was fully automated, where the only human intervention required was the instalment of PV panel and set up of required testing conditions. The designed and implemented system was
... Show MorePerhaps going to watch movies in cinemas today has become different from what it was before. The cinematic film, the clarity of the image and the luster of its colors pulled the rug out from under the most important change that occurred in the structure of the contemporary cinematography, which is the sound. The surround sound environment that immerses viewers in the realism of sound that reaches them from all directions, and for this the researcher found it necessary to shed light on this topic because of its importance, so the research problem was represented in the following question: (How are modern sound systems used in the structure of contemporary feature films?) The theoretical framework included two topics: the first: the dialec
... Show MoreBackground: The intracerebral hemorrhage (ICH) can be classified as traumatic and spontaneous. The frontal and temporal lobes are classic sites for traumatic ICH, which are less commonly affected by spontaneous episodes. Computed tomography (CT) scanning is the most accurate radiological method for demonstrating the acute lesion of intracerebral hemorrhage (ICH). Both types are of high density, but traumatic bleeding is more frequently multifocal, in this study we are dealing with traumatic type of intracerebral hematoma. Aim of the study is to identify the accuracy and performance of CT scan in diagnosis and evaluation of intracerebral hemorrhage.
Patients and methods: 60 patients were examined, their ag
The service quality of any information-based system could be evaluated by the high-end user in such a way that the system developer or responsible intently might use these user experiences to improve, develop and benchmark their system. In this paper, questionnaire implemented to rate to what extent the academic admission system as a web site achieves performance. Data were collected from 21 users of the system; all of them are highly educated and have the experience of using the site. Quadrant and gap analysis were implemented to evaluate the weakness and strength of the data. The major data analyses were performed on the data collected in terms of its importance and satisfaction to the users. A number of statistical tools have been uti
... Show MoreTurbidity is a visual property of water that expresses the amount of suspended substances in the water. Its presence in quantities more significant than the permissible limit makes the water undrinkable and reduces the effectiveness of disinfectants in treating pathogens. On this basis, turbidity is used as a basic indicator for measuring water quality. This study aims to evaluate the removal efficiency of AL- Muthanna WTP. Water turbidity was used as a basic parameter in the evaluation, using performance improvement evaluation and data from previous years (2016 to 2020). The average raw water turbidity was 26.7 NTU, with a minimum of 14 NTU, with a maximum of 48 NTU. Water turbidity value for 95% of settling daily reading data was
... Show More