Preferred Language
Articles
/
joe-1128
Arabic Sentiment Analysis (ASA) Using Deep Learning Approach
...Show More Authors

Sentiment analysis is one of the major fields in natural language processing whose main task is to extract sentiments, opinions, attitudes, and emotions from a subjective text. And for its importance in decision making and in people's trust with reviews on web sites, there are many academic researches to address sentiment analysis problems. Deep Learning (DL) is a powerful Machine Learning (ML) technique that has emerged with its ability of feature representation and differentiating data, leading to state-of-the-art prediction results. In recent years, DL has been widely used in sentiment analysis, however, there is scarce in its implementation in the Arabic language field. Most of the previous researches address other languages like English. The proposed model tackles Arabic Sentiment Analysis (ASA) by using a DL approach. ASA is a challenging field where Arabic language has a rich morphological structure more than other languages. In this work, Long Short-Term Memory (LSTM) as a deep neural network has been used for training the model combined with word embedding as a first hidden layer for features extracting. The results show an accuracy of about 82% is achievable using DL method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Analysis the Impact of Corruption on Investment in Iraq
...Show More Authors

There are different types of corruptions such as administrative, political, economic and financial corruption. The corruption forms also varied such as bribery, nepotism and extortion. All types and forms of corruption play significant role in the all economic variables generally and on investments in particular, and the corruption used to be an intermediate means in reducing the rate of economic growth.  The corruption contributes in reducing the domestic investments via pay bribery by investors to officials’ persons for supplemental contracts and tenders which finally leads to reduction in the investment efficiency. The corruption also contributes in rise of operational costs for the investment projects.  In additio

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Multilevel Analysis to Recognize Original Voucher from Faked Voucher
...Show More Authors

Voucher documents have become a very important information carrier in daily lives to be used in many applications. A certain class of people could exploit the trust and indulge in forging or tampering for short or long term benefits unlawfully. This holds a serious threat to the economics and the system of a nation. The aim of this paper is to recognize original voucher document through its contents. Forgery of voucher document could have serious repercussions including financial losses, so the signature, logo and stamp that are used to determine being a genuine or not by using multilevel texture analysis. The proposed method consists of several operations. First, detection and extraction of signature, logo and stamp images from original

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 19 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Vertical analysis of patients with late lower arch crowding
...Show More Authors

Background: Because of many factors play a role in the developing of late lower arch crowding, therefore the objective of the current study is to do vertical analysis for subjects with late lower dental arch crowding. The conducted study is the first attempt to do vertical analysis for Iraqi subjects with late lower arch crowding to see if there is a vertical discrepancy in such patients. Subjects and methods: Eighty subjects were selected according to certain inclusion criteria from patients attending the Orthodontic Department in the College of Dentistry, Baghdad University, patients ranged between 18-25 years old. The 80 patients were divided into two groups (crowding and normal), 40 patients each (20 males and 20 females). A study cast

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2004
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
MICROFACIES ANALYSIS OF GHAR FORMATION (WESTERN DESERT OF IRAQ)
...Show More Authors

Ghar Formation outcrop at the Iraqi western desert was studied by microfacies analysis
of (13) thin sections collected from wadi Al-Ratgha ( west of Qaim ) . According to
petrographic com position and organisms content ,rocks were subdivided into (4)
microfacies units :bioclastic wackestone , mudstone , miliolids wackestone , and grainstone
with aggregate grains microfacies .Microfacies units reflect shallow marine environment of
low circulation of very warm water at the middle part . The lower and middle part
interbedded with quite open marine environment below the wave base . The upper part was
deposited at shallow marine environment of low circulation . The main diagenetic processes
were the transformation ( ty

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Study and Analysis the Mathematical Operations of Fuzzy Logic
...Show More Authors

The last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Dynamic Analysis of Thin Composite Cylindrical and Spherical Shells
...Show More Authors

In this work, an investigation for the dynamic analysis of thin composite cylindrical and spherical shells is presented. The analytical solution is based upon the higher order shear deformation theory of elastic shells from which the developed equations are derived to deal with orthotropic layers. This will cover the determination of the fundamental natural frequencies and mode shapes for simply supported composites cylindrical and spherical shells.

      The analytical results obtained by using the derived equations were confirmed by the finite element technique using the well known Ansys package. The results have shown a good agreement with a maximum percentage of discrepancy, which gives a confidence o

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Analysis of Burial History for Mesopotamian basin, southern Iraq
...Show More Authors

In this study, different oil fields in Mesopotamian basin, southern Iraq (Siba, Zubair, Nahr - Umr, Majnoon, Halfaya, Kumait, and Amara) were selected for studying burial history. PetroMod software 1D was used for basin constructing and to evaluate burial history of the basin. Results showed that in the upper Jurassic to the Recent, Mesopotamian Basin exhibited a complex subsidence history over a period of about 152 Ma.There are different periods of subsidence: high, moderate, and slow. High subsidence occurred at upper Jurassic- mid Cretaceous and at Miocene due to Tectonic subsidence. Slow subsidence occurred at upper Cretaceous and moderate subsidence at Paleogene. In the upper Jurassic, rapid subsidence is driven under the effect of

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
The Tribal Power in Contemporary Iraq: A Sociological Analysis
...Show More Authors

This is an empirical investigation of the tribal power in Iraq and its consequences on the socio-political system. A theoretical background concerning thestate kinship, tribe and tribal involvement in politics has been displayed with example of tribal power over people within the social context. Socio-anthropological method of data collection has been used, including a semi-structured interview with a sample of 120 correspondents. The outcome revealed that the feeble and corrupted state (government) play a vital role in encouraging the tribe to be dominant. The people of Iraq are clinging to the tribe regardless of whether they believe in it or not. Although they are aware that the tribe is a pre-state organisation and marred shape of ci

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 14 2019
Journal Name
Al-khwarizmi Engineering Journal
Creeping Gait Analysis and Simulation of a Quadruped Robot
...Show More Authors

A quadruped (four-legged) robot locomotion has the potential ability for using in different applications such as walking over soft and rough terrains and to grantee the mobility and flexibility. In general, quadruped robots have three main periodic gaits:  creeping gait, running gait and galloping gait. The main problem of the quadruped robot during walking is the needing to be statically stable for slow gaits such as creeping gait. The statically stable walking as a condition depends on the stability margins that calculated particularly for this gait. In this paper, the creeping gait sequence analysis of each leg step during the swing and fixed phases has been carried out. The calculation of the minimum stability margins depends up

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Constructing of Analysis Mathematical Model for Stream Cipher Cryptosystems
...Show More Authors

The aim of this paper is to construct the analysis mathematical model for stream cipher cryptosystems in order to be cryptanalysis using the cryptanalysis tools based on plaintext attack (or part from it) or ciphertext only attack, choosing Brüer generator as study case of nonlinear stream cipher system.
The constructing process includes constructing the linear (or non-linear) equations system of the attacked nonlinear generator. The attacking of stream cipher cryptosystem means solving the equations system and that means finding the initial key values for each combined LFSR. 

View Publication Preview PDF