The huge amount of information in the internet makes rapid need of text
summarization. Text summarization is the process of selecting important sentences
from documents with keeping the main idea of the original documents. This paper
proposes a method depends on Technique for Order of Preference by Similarity to
Ideal Solution (TOPSIS). The first step in our model is based on extracting seven
features for each sentence in the documents set. Multiple Linear Regression (MLR)
is then used to assign a weight for the selected features. Then TOPSIS method
applied to rank the sentences. The sentences with high scores will be selected to be
included in the generated summary. The proposed model is evaluated using dataset
supplied by the Text Analysis Conference (TAC-2011) for English documents. The
performance of the proposed model is evaluated using Recall-Oriented Understudy
for Gisting Evaluation (ROUGE) metric. The obtained results support the
effectiveness of the proposed model.
Background: Multiple sclerosis (MS) is an inflammatory disease of the central nervous system, in which the myelin sheaths got injured. The prevalence of MS is on grow, as well as, it affects the young ages. Females are most common to have MS compared to males. Oxidative stress is the situation of imbalance between oxidants (free radicals and reactive oxygen species (ROS)) and antioxidants in a living system, in which either the oxidants are elevated or antioxidants are reduced, or sometimes both. ROS and oxidative stress have been implicated in the progression of many degenerative diseases, which is important in cracking the unrevealed mysteries of MS. In this review article, some of the proposed mechanisms that link oxidative stres
... Show MoreThe research presents a case study of collecting materials and raw materials in a visual space that allows them to form a perception and meanings that inform the recipient by reconstructing them and inserting them into the surface of the artistic work and in such a way that the aesthetic act consists of a variety of media, touches and surfaces. The overlap of races within an environment characterized by unity. That is why the researcher in chapter one presented the problem of research, and the focus was on studying the multiplicity of materials and their aesthetic and functional role in the structure of creative work. The aim of the research is enhanced to identify the aesthetic performance function of the multiplicity of ores in the col
... Show MoreMany of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence
In this work, some of numerical methods for solving first order linear Volterra IntegroDifferential Equations are presented. The numerical solution of these equations is obtained by using Open Newton Cotes formula. The Open Newton Cotes formula is applied to find the optimum solution for this equation. The computer program is written in (MATLAB) language (version 6)
In this paper, we give new results and proofs that include the notion of norm attainment set of bounded linear operators on a smooth Banach spaces and using these results to characterize a bounded linear operators on smooth Banach spaces that preserve of approximate - -orthogonality. Noting that this work takes brief sidetrack in terms of approximate - -orthogonality relations characterizations of a smooth Banach spaces.
In some cases, researchers need to know the causal effect of the treatment in order to know the extent of the effect of the treatment on the sample in order to continue to give the treatment or stop the treatment because it is of no use. The local weighted least squares method was used to estimate the parameters of the fuzzy regression discontinuous model, and the local polynomial method was used to estimate the bandwidth. Data were generated with sample sizes (75,100,125,150 ) in repetition 1000. An experiment was conducted at the Innovation Institute for remedial lessons in 2021 for 72 students participating in the institute and data collection. Those who used the treatment had an increase in their score after
... Show MoreEstimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre
... Show MoreThe text has many connotations in the Arabic language, such as vowel points, designation, completion, etc., and the original meaning of the text is to show. The Western text has its owen independent semantic unit .The biblical texts are a mixture of what was reported by the Prophet Moses (peace be upon him) and what the authors described in terms of texts over many centuries.The meaning of the text is guidance and payment, and it is a natural connotation. The religious text for Muslims is divided into peremptory texts that are national proof. The evidence for the meaning of the text is proven by language, and it is not required that the researcher be a jurist. The approach is a factual questionnaire by the researcher according to a speci
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More