Preferred Language
Articles
/
NBffsJIBVTCNdQwC_77S
Emotion Recognition in Text Using PPM
...Show More Authors

In this paper we investigate the automatic recognition of emotion in text. We propose a new method for emotion recognition based on the PPM (PPM is short for Prediction by Partial Matching) character-based text compression scheme in order to recognize Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method is very effective when compared with traditional word-based text classification methods. We have also found that our method works best if the sizes of text in all classes used for training are similar, and that performance significantly improves with increased data.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Feb 01 2019
Journal Name
Environmental Technology & Innovation
Cadmium removal using a spiral-wound woven wire meshes packed bed rotating cylinder electrode
...Show More Authors

The effect of electrolysis operating parameters on the removal efficiency of cadmium from a simulated wastewater was studied by adopting response surface methodology combined with Box–Behnken Design. As a new electrode design, spiral-wound woven wire mesh rotating cylinder electrode was used for cadmium removal. Current (240–400 mA), rotation speed (200–1000 rpm), initial cadmium concentration (200–600ppm), and cathode mesh number (30–60) were chosen as independent variables while the removal efficiency of cadmium was considered as a response function. The results revealed that the rotation speed has the major effect on the removal efficiency of cadmium. Regression analysis showed good fit of the experimental data to the second-or

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Thu Sep 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Simulation the Radiation Zone of Al-Mussaib Power Plant by using Monte Carlo Method
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Monitoring the Vegetation and Water Content of Al-Hammar Marsh Using Remote Sensing Techniques
...Show More Authors

The object of the presented study was to monitor the changes that had happened in the main features (water, vegetation, and soil) of Al-Hammar Marsh region. To fulfill this goal, different satellite images had been used in different times, MSS 1973, TM 1990, ETM+ 2000, 2002, and MODIS 2009, 2010. A new technique of the unsupervised classification called (Color Extracting Technique) was used to classify the satellite images. MATLAP programming used the technique and separated Al-Hammar Marsh from other water features (rivers, irrigated lands, etc.) when calculated the changes in the water content of the study region. ArcGIS 9.3 (arcMAP, arcToolbox) were used to achieve this work and calculate area of each class.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Eatimation Availability Function Through Determination The Optimal Imperfect Preventive Maintenance Period By using Simulation
...Show More Authors

This paper deals with the modeling of a preventive maintenance strategy applied to a single-unit system subject to random failures.

According to this policy, the system is subjected to imperfect periodic preventive maintenance restoring it to ‘as good as new’ with probability

p and leaving it at state ‘as bad as old’ with probability q. Imperfect repairs are performed following failures occurring between consecutive

preventive maintenance actions, i.e the times between failures follow a decreasing quasi-renewal process with parameter a. Considering the

average durations of the preventive and corrective maintenance actions a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Validation of Time-Safety Influence Curve Using Empirical Safety and Injury Data—Poisson Regression
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sat Oct 04 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced IOT Cyber-Attack Detection Using Grey Wolf Optimized Feature Selection and Adaptive SMOTE
...Show More Authors

The Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats.  This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Iraqi Journal Of Physics
Nuclear structure study of some tin isotopes using the self-consistent mean field method
...Show More Authors

Hartree-Fock calculations for even-even Tin isotopes using
Skyrme density dependent effective nucleon-nucleon interaction are
discussed systematically. Skyrme interaction and the general formula
for the mean energy of a spherical nucleus are described. The charge
and matter densities with their corresponding rms radii and the
nuclear skin for Sn isotopes are studied and compared with the
experimental data. The potential energy curves obtained with
inclusion of the pairing force between the like nucleons in Hartree-
Fock-Bogoliubov approach are also discussed.

View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2011
Journal Name
Journal Of The Saudi Society Of Dermatology & Dermatologic Surgery
Treatment of pityriasis versicolor using 1% diclofenac gel and clotrimazole cream (comparative therapeutic study)
...Show More Authors

KE Sharquie, HM Al-Hamamy, AA Noaimi, IA Al-Shawi, Journal of the Saudi Society of Dermatology & Dermatologic Surgery, 2011 - Cited by 9

View Publication
Publication Date
Tue Jun 30 2015
Journal Name
Al-kindy College Medical Journal
Compound fractures of the hand metacarpals and phalanges treated by using mini-external fixator
...Show More Authors

Background: A review of articles of method in treating compound phalangeal fractures by using mini-external fixator, elaborating the anatomy, mechanics, modalities of treatment, and complications of these types of fractures. Also, it compares between different studies regarding the functional results and final outcome. External fixation of phalangeal fractures is a good method for osteo synthesis in certain situations. The simplicity of the surgical procedure and the minimal disruption of the normal bone architecture also make it appealing.Objectives: Evaluating the functional results of the use of mini-external fixator for the treatment of compound fractures of phalangeal bones of the hand.Method: Our study consists of 15 patients, 12 w

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref