Preferred Language
Articles
/
vRaqxIsBVTCNdQwC0d0f
A New Feature-Based Method for Similarity Measurement under the Linux Operating System

This paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper, the performance of the new feature-based algorithm is compared against the performance of seven ontology-based algorithms adapted to Arabic. The results of the evaluation and comparison experiments show that the new proposed algorithm outperforms the adapted word similarity algorithms on the Arabic word benchmark dataset. The proposed algorithm will be included in the AWN-similarity which is free open-source software for Arabic.

Scopus Crossref
View Publication
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A new Technique For Solving Fractional Nonlinear Equations By Sumudu Transform and Adomian Decomposition Method

A novel technique Sumudu transform Adomian decomposition method (STADM), is employed to handle some kinds of nonlinear time-fractional equations. We demonstrate that this method finds the solution without discretization or restrictive assumptions. This method is efficient, simple to implement, and produces good results. The fractional derivative is described in the Caputo sense. The solutions are obtained using STADM, and the results show that the suggested technique is valid and applicable and provides a more refined convergent series solution. The MATLAB software carried out all the computations and graphics. Moreover, a graphical representation was made for the solution of some examples. For integer and fractional order problems, solu

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Ieee Access
Scopus Clarivate Crossref
View Publication
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A New Biological System For Detecting Environmetal Carcinogens And /Or Mutagenes And Their Adversary

A  new  test  system  for  detecting  environment  carcinogenes and/or  mutagenes  and  their  adversary  It  has  been  induced.  One hundred and fifty   mutants   were isolated from   the basidiomycete fungus Coprinus cinereus   which were   resistant to guanine analogue S- az.aguanine .All the spontaneous and induced with UV light origin mutants were isolated from the wild type strains Bc9/6.6 and  Hd5.5

.These mutants were te ted on selective medium containing  different

concentrations of the analogue and also to their ability to usc purine bases and their degredated &nbs

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 26 2018
Journal Name
Iraqi Journal Of Science
New Improved Heuristic Method for Solving Travelling Salesman Problem

In this paper we will investigate some Heuristic methods to solve travelling salesman problem. The discussed methods are Minimizing Distance Method (MDM), Branch and Bound Method (BABM), Tree Type Heuristic Method (TTHM) and Greedy Method (GRM).

The weak points of MDM are manipulated in this paper. The Improved MDM (IMDM) gives better results than classical MDM, and other discussed methods, while the GRM gives best time for 5≤ n ≤500, where n is the number of visited cities.

View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A proposed audit program for a comprehensive electronic banking system based on business risks : applied research

The research seeks to identify the comprehensive electronic banking system and the role of the auditor in light of the customer's application of electronic systems that depend on the Internet in providing its services, as a proposed audit program has been prepared in accordance with international auditing controls and standards based on the study of the customer's environment and the analysis of external and internal risks in the light of financial and non-financial indicators, the research reached a set of conclusions, most notably, increasing the dependence of banks on the comprehensive banking system for its ability to provide new and diverse banking services, The researcher suggested several recommendations, the most important of whi

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
A New method for ISE construction for methyl orange dyes and using for indirect determination of Amitriptyline Hydrochloried drug

A new method for construction ion-selective electrode (ISE) by heating reaction of methyl orange with ammonium reineckate using PVC as plasticizer for determination methyl orange and determination Amitriptyline Hydrochloried drug by formation ion-pair on electrode surface . The characteristics of the electrode and it response as following : internal solution 10-4M , pH (2.5-5) ,temperature (20-30) and response time 2 sec. Calibration response for methyl orange over the concentrationrange 10-3 -10-9 M with R=0.9989 , RSD%=0.1052, D.O.L=0.315X10-9 MEre%=(-0.877- -2.76) , Rec%.=(97.230 -101.711) .

Crossref
View Publication Preview PDF
Publication Date
Wed Dec 31 2014
Journal Name
Iraqi Journal For Computers And Informatics
Gate Control System for New Iraqi License Plate

This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Tue Oct 01 2013
Journal Name
2013 Ieee International Conference On Systems, Man, And Cybernetics
Scopus (22)
Crossref (11)
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Quality of Audit Work Under Expert System

The research aims to extrapolate the repercussions of the use of expert systems in the work of the external auditor on the quality of audit, as the research problem was that despite the use of these techniques in audit work, there is a problem related to the efficiency and effectiveness of these technological systems used in audit work, the feasibility of their use and the extent of their impact: The quality of the audit process.

The researchers adopted the questionnaire as a tool for collecting study data from a community composed of auditors in auditing offices and companies in Iraq, and the auditors of the Iraqi Federal Financial Supervision Bureau. The number of recovered and valid qu

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF