Print ISSN: 1681-6900

Online ISSN: 2412-0758

Keywords : tree


Arabic Texts Classification Based on Keywords Extraction Technique

S.M. kadhem; Almeer; A.Q.Abd

Engineering and Technology Journal, 2017, Volume 35, Issue 2, Pages 96-104

Keyword is useful for a various purposes including labeling, summarizing, indexing, categorization, searching, and clustering. In this paper we will extract keywords from the Arabic text in order to classify it. The proposed system classify any Arabic text through simple statistic and linguistic approaches by extracting the keywords of the text (with their frequency that appear in the text) depending on a Date Base of a particular field (in this work we choose computer science field). This Data Base is represented using one B+ tree for keywords and the other DataBase for non-keywords. The proposed system was implemented using Visual Prolog 5.1, and after testing, it proved to be a valuable for Arabic text classification (From the viewpoint of accuracy and search time).

Using a Parser for Steganography Purpose

Suhad M. Kadhem; Abdulraheem A. Abdulraheem

Engineering and Technology Journal, 2015, Volume 33, Issue 4, Pages 654-667

Steganography techniques or information hiding are concerned with hiding the existence of data in other cover media. Usually one hiding method is used to hide secret data in a cover text and that will reduce the security, so in this paper we will use more than one hiding method to hide secret data according to syntax grammars of cover text produced by a special parser.
We represent the Arabic language grammar as logical terms and use B+tree for storing, and Augmented Transition Network) ATN) for parsing.
The proposed technique was implemented using Visual Prolog and after testing according to the authorized measures that are used in this field The proposed approach has provide good security (transparency) for steganography.

Finding the Relevance Degree between an English Text and its Title

Abdul Monem S. Rahma; Suhad M. Kadhem; Alaa Kadhim Farhan

Engineering and Technology Journal, 2012, Volume 30, Issue 9, Pages 1625-1640

Keywords are useful tools as they give the shorter summary of the
document. Keywords are useful for a variety of purposes including
summarizing, indexing, labeling, categorization, clustering, and searching, and
in this paper we will use keywords in order to find the relevance degree
between an English text and its title.
The proposed system solves this problem through simple statistic (Term
frequency) and linguistic approaches by extracting the keywords of the title
and keywords of the text (with their frequency that appear in the text) and
finding the average of title's keywords frequency across the text that represent
the relevance degree that required, with depending on a lexicon of a particular
field(in this work we choose computer science field). This lexicon is
represented using two different B+ trees one for non-keywords and the other
for candidate keywords, these keywords was stored in a manner that prevent
redundancy of these terms or even sub-terms to provide efficient memory
usage and to minimize the search time.
The proposed system was implemented using Visual Prolog 5.1 and after
testing, it proved to be valuable for finding the degree of relevance between a
text and its title (from point of view of accuracy and search time).

Using B+ Tree To Represent Secret Messages For Steganography Purpose

Suhad M. Kadhem

Engineering and Technology Journal, 2010, Volume 28, Issue 15, Pages 5102-5112

In this research we suggest a new approach by using B+ tree for storing the secret massages (that want to be sent) in a manner that prevent redundancy of these massages or even sub massages in order to provide efficient memory usage . The proposed system includes two stages: Stores the secret message and get its unique code by using B+ tree, and retrieves the unique secret message when we have its code by using B+ tree. The proposed system was implemented using Visual Prolog
5.1 and after testing, the proposed system gives an efficient time in storing and in retrieving the secret messages, also the proposed method solved the ambiguity problem that some steganography methods suffer from.