In this research, a group of gray texture images of the Brodatz database was studied by building the features database of the images using the gray level co-occurrence matrix (GLCM), where the distance between the pixels was one unit and for four angles (0, 45, 90, 135). The k-means classifier was used to classify the images into a group of classes, starting from two to eight classes, and for all angles used in the co-occurrence matrix. The distribution of the images on the classes was compared by comparing every two methods (projection of one class onto another where the distribution of images was uneven, with one category being the dominant one. The classification results were studied for all cases using the confusion matrix between every Two cases or two steps (two different angles and for the same number of classes). The agreement percentage between the classification results and the various methods was calculated.
In aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we
... Show MoreVoucher documents have become a very important information carrier in daily lives to be used in many applications. A certain class of people could exploit the trust and indulge in forging or tampering for short or long term benefits unlawfully. This holds a serious threat to the economics and the system of a nation. The aim of this paper is to recognize original voucher document through its contents. Forgery of voucher document could have serious repercussions including financial losses, so the signature, logo and stamp that are used to determine being a genuine or not by using multilevel texture analysis. The proposed method consists of several operations. First, detection and extraction of signature, logo and stamp images from original
... Show MoreObjectives:
To evaluate mothers’ attitudes toward readiness for discharge care at home for a premature baby in Intensive Care Unit at teaching hospitals in Medical City Complex and to find out the relationship between mothers’ attitudes and their socio-demographic characteristics.
Methodology: A quasi-experimental study design was carried out through the period of 6th January 2020 to 2021 to 11th March 2021, to evaluate mother’s attitude toward discharge care plan for premature babies. The study carried out in Welfare Teaching Hospital, Nursing Home Hospital and Baghdad Teaching Hospital at Medical City Complex in Baghdad City on 30 mother of premature babies in neonatal intensive care units using the nonprobability sampling
A new method based on the Touchard polynomials (TPs) was presented for the numerical solution of the linear Fredholm integro-differential equation (FIDE) of the first order and second kind with condition. The derivative and integration of the (TPs) were simply obtained. The convergence analysis of the presented method was given and the applicability was proved by some numerical examples. The results obtained in this method are compared with other known results.
Nowadays, it is convenient for us to use a search engine to get our needed information. But sometimes it will misunderstand the information because of the different media reports. The Recommender System (RS) is popular to use for every business since it can provide information for users that will attract more revenues for companies. But also, sometimes the system will recommend unneeded information for users. Because of this, this paper provided an architecture of a recommender system that could base on user-oriented preference. This system is called UOP-RS. To make the UOP-RS significantly, this paper focused on movie theatre information and collect the movie database from the IMDb website that provides informatio
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show Moreتهدف هذه الدراسة للتعرف على السياسات اإلاسرائيلية المتبعة على الارض والمتمثلة في االاستيطان
الاستعماري والطرق التفافية، ومصادرة الاراضي وجدار الضم والتوسع العنصري، بالاضافة إلى التصنيف
الاداري للمناطق في الضفة الغربية حسب ما جاء في اتفاقية أوسلو، والتي من شأنها التأثير على تلك
المناطق، وال سيما قطاع اإلسكان الذي يعد من أهم القطاعات التي تتر كب وبالتحديد في منطقة الدراسة،
وسوف تحاول هذه الدراسة تس
Two well-known fluorescent molecules: fluorescein sodium salt (FSS) and 2,7-dichloro fluorescein (DCF) were tried to prove the efficiency, trustability and repeatability of ISNAG fluorimeter by using discrete and continuous flow injection analysis modes.A linear range of 0.002-1 mmol/L for FSS and 0.003-0.7 mmol/L was for DCF, with LOD 0.0018 mmol/L and 0.002 mmol/L for FSS and DCF respectively, were obtained for discrete mode of analysis. While the continuous mode gave a linear range of 0.002-0.7 mmol/L and 0.003-0.5 mmol/L for FSS and DCF respectively, the LOD were 0.0016mmol/L and 0.0018 mmol/L for FSS and DCF respectively. The results were compared with classical method at variable λex for both fluorescent molecules at 95
... Show MoreBackground: With the increasing demands for adult orthodontics, a growing need arises to bond attachments to porcelain surfaces. Optimal adhesion to porcelain surface should allow orthodontic treatment without bond failure but not jeopardize porcelain integrity after debonding.The present study was carried out to compare the shear bond strength of metal bracket bonded to porcelain surface prepared by two mechanical treatments and by using different etching systems (Hydrofluoric acid 9% and acidulated phosphate fluoride 1.23%). Materials and Methods: The samples were comprised of 60 models (28mm *15mm*28mm) of metal fused to porcelain (feldspathic porcelain). They were divided as the following: group I (control): the porcelain surface left u
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More