The need for an efficient method to find the furthermost appropriate document corresponding to a particular search query has become crucial due to the exponential development in the number of papers that are now readily available to us on the web. The vector space model (VSM) a perfect model used in “information retrieval”, represents these words as a vector in space and gives them weights via a popular weighting method known as term frequency inverse document frequency (TF-IDF). In this research, work has been proposed to retrieve the most relevant document focused on representing documents and queries as vectors comprising average term term frequency inverse sentence frequency (TF-ISF) weights instead of representing them as vectors of term TF-IDF weight and two basic and effective similarity measures: Cosine and Jaccard were used. Using the MS MARCO dataset, this article analyzes and assesses the retrieval effectiveness of the TF-ISF weighting scheme. The result shows that the TF-ISF model with the Cosine similarity measure retrieves more relevant documents. The model was evaluated against the conventional TF-ISF technique and shows that it performs significantly better on MS MARCO data (Microsoft-curated data of Bing queries).
In this study, the effect of design parameters such as pipe diameter, pipe wall thickness, pipe material and the effect of fluid velocity on the natural frequency of fluid-structure interaction in straight pipe conveying fully developed turbulent flow were investigate numerically,analytically and experimentally. Also the effect of support conditions, simply-simply and clamped-clamped was investigated. Experimentally, pipe vibrations were characterized by accelerometer mounted on the pipe wall. The natural frequencies of vibration were analyzed by using Fast Fourier Transformer (FFT). Five test sections of two different pipe diameters of 76.2
mm and 50.8 mm with two pipe thicknesses of 3.7 mm and 2.4 mm and two pipe materials,stainles
abstract:
Objectives: The study aims to reveal the approach of Imam Al-Salmi in the weighting between the apparently conflicting texts, and to show the extent of his agreement and disagreement with the rest of the fundamentalists, and does he have vocabulary that can be used to elicit legal rulings in modern contemporary issues?
Method: The method of induction and analysis is one of the main tools to reach the research results. The study resorted to following the sayings of Imam Al-Salmi in various sources and fatwas and standing on them, then analyzing and applying them to the various branches of jurisprudence in the various jurisprudential chapters.
... Show MoreDocument clustering is the process of organizing a particular electronic corpus of documents into subgroups of similar text features. Formerly, a number of conventional algorithms had been applied to perform document clustering. There are current endeavors to enhance clustering performance by employing evolutionary algorithms. Thus, such endeavors became an emerging topic gaining more attention in recent years. The aim of this paper is to present an up-to-date and self-contained review fully devoted to document clustering via evolutionary algorithms. It firstly provides a comprehensive inspection to the document clustering model revealing its various components with its related concepts. Then it shows and analyzes the principle research wor
... Show MoreIn this work, the impact of different geomagnetic storm events on the plasma-sphere layer (ionosphere layer) over the northern and southern hemisphere regions was investigated during solar cycle 23. To grasp the influence of geomagnetic storms on the behavior and variation of the critical frequency parameter of the F2 ionospheric layer (foF2), five geomagnetic storms (classified as great, severe, and strong), with Disturbance storm time (Dst) values <-100 nT were chosen. Four stations located in different mid-latitude regions in northern and southern hemispheres were designated, the northern stations are: Millstone Hill (42.6° N, 288.50° W) and Rome (41.90° N, 12.50° E) and the southern stations are: Port Stanley (-51.60° S,
... Show MoreAim: This abstract aims to highlight the critical nature of climate change as a pressing challenge facing humanity in the 21st century. It underscores the severe consequences it poses to essential facets of human existence, including water and energy resources, agricultural production, and the broader environmental systems. Method: The abstract primarily utilizes a descriptive approach to emphasize the impact of climate change on the Middle East, particularly the Arab region. It relies on a review of existing knowledge and data related to climate change and its effects on ecosystems and drought patterns. Results: The abstract outlines the direct and indirect repercussions of climate change on human life and the environment. It draws atten
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreSome problems want to be solved in image compression to make the process workable and more efficient. Much work had been done in the field of lossy image compression based on wavelet and Discrete Cosine Transform (DCT). In this paper, an efficient image compression scheme is proposed, based on a common encoding transform scheme; It consists of the following steps: 1) bi-orthogonal (tab 9/7) wavelet transform to split the image data into sub-bands, 2) DCT to de-correlate the data, 3) the combined transform stage's output is subjected to scalar quantization before being mapped to positive, 4) and LZW encoding to produce the compressed data. The peak signal-to-noise (PSNR), compression ratio (CR), and compression gain (CG) measures were used t
... Show MoreAlthough text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreThe present study aims to investigate the long-term histopathological, and physiological effects of different concentrations of a commercially available energy drink (Tiger) on liver and kidney of young mice. Sixteen Balb/c male mice,6 -week old, were divided into 4 groups (n=4). Two groups consumed the energy drink at a concentration of 28µl energy drink/ml water. One group were killed after 10 days (T1), another group were killed after 20 days (T2). Other group of mice consumed the energy drink at a final concentration of 14µl/ml for 20 days (T3). The last group was provided only with water and served as control. Mice of all groups drank around 3 ml per day. The histopathological study on liver of treated groups showed many changes s
... Show More