Text documents are unstructured and high dimensional. Effective feature selection is required to select the most important and significant feature from the sparse feature space. Thus, this paper proposed an embedded feature selection technique based on Term Frequency-Inverse Document Frequency (TF-IDF) and Support Vector Machine-Recursive Feature Elimination (SVM-RFE) for unstructured and high dimensional text classificationhis technique has the ability to measure the feature’s importance in a high-dimensional text document. In addition, it aims to increase the efficiency of the feature selection. Hence, obtaining a promising text classification accuracy. TF-IDF act as a filter approach which measures features importance of the text documents at the first stage. SVM-RFE utilized a backward feature elimination scheme to recursively remove insignificant features from the filtered feature subsets at the second stage. This research executes sets of experiments using a text document retrieved from a benchmark repository comprising a collection of Twitter posts. Pre-processing processes are applied to extract relevant features. After that, the pre-processed features are divided into training and testing datasets. Next, feature selection is implemented on the training dataset by calculating the TF-IDF score for each feature. SVM-RFE is applied for feature ranking as the next feature selection step. Only top-rank features will be selected for text classification using the SVM classifier. Based on the experiments, it shows that the proposed technique able to achieve 98% accuracy that outperformed other existing techniques. In conclusion, the proposed technique able to select the significant features in the unstructured and high dimensional text document.
A hand gesture recognition system provides a robust and innovative solution to nonverbal communication through human–computer interaction. Deep learning models have excellent potential for usage in recognition applications. To overcome related issues, most previous studies have proposed new model architectures or have fine-tuned pre-trained models. Furthermore, these studies relied on one standard dataset for both training and testing. Thus, the accuracy of these studies is reasonable. Unlike these works, the current study investigates two deep learning models with intermediate layers to recognize static hand gesture images. Both models were tested on different datasets, adjusted to suit the dataset, and then trained under different m
... Show MoreThe research aims to improve the performance of the Directorate of Maysan water by reconciling the objectives of the employees of the directorate with the objectives of the Directorate itself, as well as to identify the strengths and weaknesses in the performance of the Directorate (Leadership - Individuals - Knowledge - Operations - Financial) and presented to experts and arbitrators of specialized, and the researchers have relied on the case study methodology as a descriptive approach is comprehensive analysis, and draws on more than one approach, method and scientific design, has been interviewed a number of experts in the Directorate Maysan's water Identify the weaknesses and strengths of the Directorate, the research has rea
... Show MoreThe Fuzzy Logic method was implemented to detect and recognize English numbers in this paper. The extracted features within this method make the detection easy and accurate. These features depend on the crossing point of two vertical lines with one horizontal line to be used from the Fuzzy logic method, as shown by the Matlab code in this study. The font types are Times New Roman, Arial, Calabria, Arabic, and Andalus with different font sizes of 10, 16, 22, 28, 36, 42, 50 and 72. These numbers are isolated automatically with the designed algorithm, for which the code is also presented. The number’s image is tested with the Fuzzy algorithm depending on six-block properties only. Groups of regions (High, Medium, and Lo
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreObjectives: This study aimed to evaluate the performance of staff nurses at primary health care centers in Baghdad city and to compare them with their demographic characteristics of age, gender and education.
Methodology: A descriptive design was carried out at Baghdad City’s primary health care centers from January 2nd 2019 to May 1st 2020. An instrument was developed for the purpose of the study. A non-probability, multi-stage purposive sample of (52) staff nurses was recruited from nurses working at primary health care centers in Baghdad City. The instrument is used to evaluate staff nurses’ performance which includes (62) items. These items are divided to (13) main domains related to evaluation of work quantity, work quality,
Nanofluids are proven to be efficient agents for wettability alteration in subsurface applications including enhanced oil recovery (EOR). Nanofluids can also be used for CO2-storage applications where the CO2-wet rocks can be rendered strongly water-wet, however no attention has been given to this aspect in the past. Thus in this work we presents contact angle (θ) measurements for CO2/brine/calcite system as function of pressure (0.1 MPa, 5 MPa, 10 MPa, 15 MPa, and 20 MPa), temperature (23 °C, 50 °C and 70 °C), and salinity (0, 5, 10, 15, and 20% NaCl) before and after nano-treatment to address the wettability alteration efficiency. Moreover, the effect of treatment pressure and temperature, treatment fluid concentration (SiO2 wt%) and
... Show MoreIn this work, some mechanical properties of the polymer coating were improved by preparing a hybrid system containing Graphene (GR) of different weight percentages (0.25, 0.5, 1, and 2wt%) with 5wt% carbon fibres (CF) and added to a polymer coating by using casting method. The properties were improved as GR was added with further improvement on adding 5wt% of CF. The impact strength of acrylic polymer with GR increases with increasing weight ratio of GR; maximum value was obtained when the polymer coating was incorporated with 1wt% GR and 5wt% CF. The impact strength of acrylic polymer with GR and GR/CF composites incorporated with GR at 1wt% and CF at 5wt%. Hardness increase with increasing weight ratio of Gr and a significant imp
... Show MoreResearchers need to understand the differences between parametric and nonparametric regression models and how they work with available information about the relationship between response and explanatory variables and the distribution of random errors. This paper proposes a new nonparametric regression function for the kernel and employs it with the Nadaraya-Watson kernel estimator method and the Gaussian kernel function. The proposed kernel function (AMS) is then compared to the Gaussian kernel and the traditional parametric method, the ordinary least squares method (OLS). The objective of this study is to examine the effectiveness of nonparametric regression and identify the best-performing model when employing the Nadaraya-Watson
... Show MorePurpose: To evaluate the frequency of visualization, thickness, and anatomical features of the normal appendix at nonenhanced helical computed tomography (CT).
Materials and methods : Two radiologists prospectively iterpreted, in consensus, the abdominal CT scans of 140 patients who were examined for renal colic assessment. They
were blinded to patients' surgical history regarding a previous appendectomy. No contrast material was used. The frequency of visualization, and the two – wall thickness of normal
appendix were recorded, as well as the anatomical features of the appendix and the effect of adequasy of intraperitoneal fat on identification of the appendix.
Results : The prevalence of appendectomy w