Volume 5, Issue 5, 2015

By | August 11, 2018

Answer Extraction for Why Arabic Questions Answering Systems: EWAQ

Fatima T. AL-Khawaldeh
Department of Computer Science, Al-Albayt University, Al-Mafraq, Jordan.

Abstract – with the increasing amount of web information, questions answering systems becomes very important to allow users to access to direct answers for their requests. This paper presents an Arabic Questions Answering Systems based on entailment metrics. The type of questions which this paper focuses on is why questions. There are many reasons lead us to develop this system: generally, the lack of Arabic Questions Answering Systems and scarcity Arabic Questions Answering Systems which focus on why questions. The goal of the proposed system in this research is to extract answers from re-ranked retrieved passages which are retrieved by search engines. This system extracts the answer only to why questions.
This system is called by EWAQ: Entailment based Why Arabic Questions Answering. Each answer is scored with entailment metrics and ranked according to their scores in order to determine the most possible correct answer. EWAQ is compared with search engines: yahoo, google and ask.com, the well-established web-based Questions Answering systems, using manual test set. In EWAQ experiments, it is showed that the accuracy is increased by implementing the textual entailment in re-raking the retrieved relevant passages by search engines and deciding the correct answer. The obtained results show that using entailment based similarity can help significantly to tackle the why Answer Extraction module in Arabic language.

Keywords- Arabic Questions Answering System (AQAS); Entailment Similarity; Why Questions; Answer Extraction (AE); Information Retrieval (IR).

Mobile Secure Transmission Method Based on Audio Steganography

Alaa Alhamami, Avan Sabah Hamdi
Amman Arab University, Amman, Jordan.

Abstract – Multi-media is one type of transferring data through the Internet, and this process becomes one of the most important types of threatened data. The threat can occur by listening or sniffing the data without giving any notice to the two parties. Therefore, we will find a specific solution to maintain the security of audio during the process of transferring between the two Mobiles. Although, there are many methods to provide secure transferring, the steganography is the best way to hide the audio inside another audio and it is the best solution to reduce the risk of intruders.
The Least Significant Bit method is used in this research. The proposed algorithm and method have been used by applying two mobiles that support the android operating system, and then we choose the Skype program as a host program. The main goal of using the host program is for transmitting the audio between two devices and each device located on separate network.

Keywords- Steganography; Threat; Skype; Least Significant Bit; Android Operating system; Audio.

Evaluating E-Learning System Use by CBAM-Stages of Concern Methodology in Jordanian Universities

Nasim Matar
Department of Software Engineering, Applied Science University, Amman, Jordan.

This paper presents the use of a new approach towards evaluating the use of e-learning system by faculty members in Jordanian universities. Evaluating the use of any system is aimed towards providing a better understanding for the needs, challenges and opportunities that are expected from using such systems. E-learning as a supportive method for education in Jordanian universities has been available since 2003 [1]. Different studies have provided an assessment for the use of e-learning in Jordan using different tools many of which have been found unstandardized tool for performing the evaluation. Some of those tools managed to give significant results, while others lacked the systematic approach and the use of appropriate methodology. The Concern Based Adoption Model (CBAM) Framework has been created in order to provide 3 different tools to assess the use of innovation tools used within educational context. CBAM framework is widely used in America, Canada and parts of Europe, and this tool has not been used in any research related to Jordan or e-learning in Jordanian universities. This study is the first study to use and provide valuable outputs for assessing the use of e-learning in Jordanian Universities.

Keywords-component; CBAM, Evaluation, E-learning, Jordanian Universities, Stages of Concern.

 

 

 

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *