Preferred Language
Articles
/
vRaqxIsBVTCNdQwC0d0f
A New Feature-Based Method for Similarity Measurement under the Linux Operating System
...Show More Authors

This paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper, the performance of the new feature-based algorithm is compared against the performance of seven ontology-based algorithms adapted to Arabic. The results of the evaluation and comparison experiments show that the new proposed algorithm outperforms the adapted word similarity algorithms on the Arabic word benchmark dataset. The proposed algorithm will be included in the AWN-similarity which is free open-source software for Arabic.

Scopus Crossref
View Publication
Publication Date
Sun Apr 11 2021
Journal Name
Environment, Development And Sustainability
Developing a system for assessing the sustainability in school building projects
...Show More Authors

View Publication
Crossref (9)
Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 13 2021
Journal Name
Palarch's Journal Of Archaeology Of Egypt / Egyptology
A WEIGHTED MEASUREMENT TO DIAGNOSED REASONS OF THE LOW SUCCESS RATIOS IN MATHEMATIC SUBJECT FOR THE THIRD INTERMEDIATE SCHOOLS AMONG A SAMPLE IN IRAQ
...Show More Authors

Objective: To suggest a weighted measure to diagnose the reasons for the low student success ratios in mathematics concerning the third grade of intermediate schools in light of components educational system represented by: [Students, Teachers, Curriculum, and Environmental reasons (others reasons)] assuming differentiated and interrelated components, Also the effectiveness forming of these components according to the gender variable. Methods: Data collection tools were prepared by constructing two questionnaires for each of (Students and Teachers), which included a number of items that involved some domains for studied components of educational system, which demonstrated a high level of validity and reliability in the pilot study, in addi

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 29 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Medication Safety in Patients under 18 Years Old; a Retrospective Study based on Iraqi Pharmacovigilance Center Database
...Show More Authors

Medication safety is an important part of the comprehensive patient safety term. Medication safety is gaining more attention as the World Health Organization set the goal of decreasing medication harm by (50%) for the next 5 years when launching the third global challenge. Studying medication safety in the risk groups such as young ages, children are crucial to learn more about the effect of medicines in this risk group since they are not included in the clinical trials. Adverse drug reaction is defined as any harm resulted from the drug itself during medical process journey, while medication errors are any harm resulted from the treatment process rather than the drug or it is the result of the failure in a step of the treatment process

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Simulation Recording of an ECG, PCG, and PPG for Feature Extractions
...Show More Authors

Recently, the development of the field of biomedical engineering has led to a renewed interest in detection of several events. In this paper a new approach used to detect specific parameter and relations between three biomedical signals that used in clinical diagnosis. These include the phonocardiography (PCG), electrocardiography (ECG) and photoplethysmography (PPG) or sometimes it called the carotid pulse related to the position of electrode.

Comparisons between three cases (two normal cases and one abnormal case) are used to indicate the delay that may occurred due to the deficiency of the cardiac muscle or valve in an abnormal case.

The results shown that S1 and S2, first and second sound of the

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Studying and Analyzing Operating Conditions of Hollow Fiber Membrane Preparation Process: A Review Paper
...Show More Authors

Polymeric hollow fiber membrane is produced by a physical process called wet or dry/wet phase inversion; a technique includes many steps and depends on different factors (starting from selecting materials, end with post-treatment of hollow fiber membrane locally manufactured). This review highlights the most significant factors that affect and control the characterization and structure of ultrafiltration hollow fiber membranes used in different applications.    

   Three different types of polymers (polysulfone PSF, polyethersulfone PES or polyvinyl chloride PVC) were considered to study morphology change and structure of hollow fiber membranes in this review. These hollow fiber membranes were manufactured with different pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 18 2023
Journal Name
Ieee Access
A New Imputation Technique Based a Multi-Spike Neural Network to Handle Missing Data in the Internet of Things Network (IoT)
...Show More Authors

View Publication
Scopus (10)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Jun 27 2019
Journal Name
Molecular Crystals And Liquid Cryst
A New Series of Triazine-core Based Mesogenic Derivatives: Synthesis, Characterization and Mesomorphic Study
...Show More Authors

The synthesis, characterization and mesomorphic properties of two new series of triazine-core based liquid crystals have been investigated. The amino triazine derivatives were characterized by elemental analysis, Fourier transforms infrared (FTIR), 1HNMR and mass spectroscopy. The liquid crystalline properties of these compounds were examined by differential scanning calorimetry (DSC) and polarizing optical microscopy (POM). DSC and POM confirmed nematic (N) and columnar mesophase textures of the materials. The formation of mesomorphic properties was found to be dependent on the number of methylene unit in alkoxy side chains.

Scopus (10)
Scopus
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref