Preferred Language
Articles
/
ijs-5860
TOPSIS with Multiple Linear Regression for Multi-Document Text Summarization
...Show More Authors

The huge amount of information in the internet makes rapid need of text
summarization. Text summarization is the process of selecting important sentences
from documents with keeping the main idea of the original documents. This paper
proposes a method depends on Technique for Order of Preference by Similarity to
Ideal Solution (TOPSIS). The first step in our model is based on extracting seven
features for each sentence in the documents set. Multiple Linear Regression (MLR)
is then used to assign a weight for the selected features. Then TOPSIS method
applied to rank the sentences. The sentences with high scores will be selected to be
included in the generated summary. The proposed model is evaluated using dataset
supplied by the Text Analysis Conference (TAC-2011) for English documents. The
performance of the proposed model is evaluated using Recall-Oriented Understudy
for Gisting Evaluation (ROUGE) metric. The obtained results support the
effectiveness of the proposed model.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Text Hiding in Color Images Using the Secret Key Transformation Function in GF (2n)
...Show More Authors

Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 03 2019
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
Condition Prediction Models of Deteriorated Trunk Sewer Using Multinomial Logistic Regression and Artificial Neural Network
...Show More Authors

Sewer systems are used to convey sewage and/or storm water to sewage treatment plants for disposal by a network of buried sewer pipes, gutters, manholes and pits. Unfortunately, the sewer pipe deteriorates with time leading to the collapsing of the pipe with traffic disruption or clogging of the pipe causing flooding and environmental pollution. Thus, the management and maintenance of the buried pipes are important tasks that require information about the changes of the current and future sewer pipes conditions. In this research, the study was carried on in Baghdad, Iraq and two deteriorations model's multinomial logistic regression and neural network deterioration model NNDM are used to predict sewers future conditions. The results of the

... Show More
Publication Date
Sun Apr 30 2023
Journal Name
Journal Européen Des Systèmes Automatisés
Developing Multiple-Actuator Pneumatic Circuits Using the Karnaugh Maps Designing PLC Controlled
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Performance Analysis on Multiple Device Connections of Small Office Home Office Network
...Show More Authors

Malaysia has been supported by one of the high-speed fiber internet connections called TM UniFi. TM UniFi is very familiar to be used as a medium to apply Small Office Home Office (SOHO) concept due to the COVID-19 pandemic. Most of the communication vendors offer varieties of network services to fulfill customers' needs and satisfaction during the pandemic. Quality of Services is queried by most users by the fact of increased on users from time to time. Therefore, it is crucial to know the network performance contrary to the number of devices connected to the TM UniFi network. The main objective of this research is to analyze TM UniFi performance with the impact of multiple device connections or users' services. The study was conducted

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sci
Multiple Mixing Ratios of Gamma Rays From Reaction Using a2-ratio Method
...Show More Authors

The -multiple mixing ratios of γ-transitions from levels of populated in the are calculated in the present work by using the a2-ratio methods. We used the experimental coefficient (a2) for two γ-transitions from the same initial state, the statistical tensor, which is related to the a2-coefficient would be the same for the two transitions. This method was used in a previous work for pure transitions or which can be considered pure. In these cases the multiple mixing ratios for the second transition ( ) equal zero, but in our work we applied this method for mixed γ-transitions and then the multiple mixing ratio ( ) is known for one transition. Then we calculate the ( ) value and versareversa. The weight average of the -values calcu

... Show More
Publication Date
Mon May 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Multiple Mixing Ratios of Gamma Rays From Reaction Using a2-ratio Method
...Show More Authors

The -multiple mixing ratios of γ-transitions from levels of  populated in the  are calculated in the present work by using the a2-ratio methods.  We used the experimental coefficient (a2) for two γ -transitions from the same initial state, the statistical tensor, which is related to the a2-coefficient would be the same for the two transitions.  This method was used in a previous work for pure transitions or which can be considered pure. In these cases the multiple mixing ratios for the second transition ( ) equal zero, but in our work we applied this method for mixed γ-transitions and then the multiple mixing ratio ( ) is known for one transition. Then we calculate the ( ) value and versareversa.  The we

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
2015 37th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Influence of multiple dynamic factors on the performance of myoelectric pattern recognition
...Show More Authors

View Publication
Scopus (11)
Crossref (8)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Some Methods for Estimating Parameters of General Linear Model in Presence of Heteroscedastic Problem and High Leverage Points
...Show More Authors

Linear regression is one of the most important statistical tools through which it is possible to know the relationship between the response variable and one variable (or more) of the independent variable(s), which is often used in various fields of science. Heteroscedastic is one of the linear regression problems, the effect of which leads to inaccurate conclusions. The problem of heteroscedastic may be accompanied by the presence of extreme outliers in the independent variables (High leverage points) (HLPs), the presence of (HLPs) in the data set result unrealistic estimates and misleading inferences. In this paper, we review some of the robust

... Show More
View Publication Preview PDF
Crossref