Preferred Language
Articles
/
ijs-5860
TOPSIS with Multiple Linear Regression for Multi-Document Text Summarization
...Show More Authors

The huge amount of information in the internet makes rapid need of text
summarization. Text summarization is the process of selecting important sentences
from documents with keeping the main idea of the original documents. This paper
proposes a method depends on Technique for Order of Preference by Similarity to
Ideal Solution (TOPSIS). The first step in our model is based on extracting seven
features for each sentence in the documents set. Multiple Linear Regression (MLR)
is then used to assign a weight for the selected features. Then TOPSIS method
applied to rank the sentences. The sentences with high scores will be selected to be
included in the generated summary. The proposed model is evaluated using dataset
supplied by the Text Analysis Conference (TAC-2011) for English documents. The
performance of the proposed model is evaluated using Recall-Oriented Understudy
for Gisting Evaluation (ROUGE) metric. The obtained results support the
effectiveness of the proposed model.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Iraqi Journal Of Science,
Detection of human leukocyte antigen and celiac disease auto antibodies in serum of patients with multiple sclerosis
...Show More Authors

To determine the important pathogenic role of celiac disease in triggering several autoimmune disease, thirty patients with Multiple Sclerosis of ages (22-55) years have been investigated and compared with 25 healthy individuals. All the studied groups were carried out to measure anti-tissue transglutaminase antibodies IgA IgG by ELISA test, anti-reticulin antibodies IgA and IgG, and anti-endomysial antibodies IgA and IgG by IFAT. There was a significant elevation in the concentration of anti-tissue transglutaminase antibodies IgA and IgG compared to control groups (P≤0.05), there was 4(13.33%) positive results for anti-reticulin antibodies IgA and IgG , 3(10%) positive results for anti-endomysial antibodies IgA and IgG . There were 4 pos

... Show More
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Qualitative and Quantitative Molecular Analysis of Epstein-Barr Virus in Iraqi Patients with Relapsing-Remitting Multiple Sclerosis
...Show More Authors

    Multiple sclerosis (MS) is a neuro-inflammatory disorder in which the Epstein-Barr virus (EBV) is proposed to have a pathogenic role. Therefore, a case-control study was performed (93 patients with relapsing-remitting MS and 113 healthy controls (HC) to analyze the prevalence and viral load of EBV infection using real time-polymerase chain reaction. Prevalence of EBV infection was lower in patients compared to HC but the difference was not significant (12.9 vs. 21.2%; probability [p] = 0.187). EBV-positive MS cases were more common in females than in males (83.3 vs. 16.7%), while an opposite distribution was observed in HC (37.5 vs. 62.5%), and the difference was significant (p = 0.041). Blood group O frequency was higher in EBV-p

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Iraqi Journal Of Science
Detection of human leukocyte antigen and celiac disease auto antibodies in serum of patients with multiple sclerosis
...Show More Authors

To determine the important pathogenic role of celiac disease in triggering several autoimmune disease, thirty patients with Multiple Sclerosis of ages (22-55) years have been investigated and compared with 25 healthy individuals. All the studied groups were carried out to measure anti-tissue transglutaminase antibodies IgA IgG by ELISA test, anti-reticulin antibodies IgA and IgG, and anti-endomysial antibodies IgA and IgG by IFAT. There was a significant elevation in the concentration of anti-tissue transglutaminase antibodies IgA and IgG compared to control groups (P≤0.05), there was 4(13.33%) positive results for anti-reticulin antibodies IgA and IgG , 3(10%) positive results for anti-endomysial antibodies IgA and IgG . There were 4 pos

... Show More
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors

Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jan 08 2024
Journal Name
Al-academy
Medea Euripides between text and contemporary theatrical presentation
...Show More Authors

It is not available for us to go back in time and see plays old and it plays giants tragedy ancient Greek (Aeschylus, Sofokls, and yourbedes) through the eyes of a generation ago, and if we were able to go back to Ntegathm play it is certain that we will not taste or Nstassig for much of what we see from these offers will not afford the traditional religious rituals, which was accompanied also dance and music in the style of ancient Greek play was representing a large part of the theater see manifestations Can our eyes and ears we twentieth century audience to accept those appearances, and it was then?
Inevitably it will look like a museum bycollection not only. So we find ourselves in the light of the foregoing forced When you do rem

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
The semiotic approach in analyzing contemporary graphic text
...Show More Authors

With a great diversity in the curriculum contemporary monetary and visions, and development that hit the graphic design field, it has become imperative for the workers in the contemporary design research and investigation in accordance with the intellectual treatises and methods of modern criticism, because the work design requires the designer and recipient both know the mechanics of tibographic text analysis in a heavy world of texts and images varied vocabulary and graphics, and designer on before anyone else manages the process of analysis to know what you offer others of shipments visual often of oriented intended from behind, what is meant, in the midst of this world, the curriculum Alsemiae directly overlap with such diverse offer

... Show More
View Publication Preview PDF
Crossref