Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette
... Show MoreColloidal silver nanoparticles were prepared by single step green synthesis using aqueous extracts of the leaves of thyme as a function of different molar concentration of AgNO3 (1,2,3,4 mM(. The Field Emission Scanning Electron Microscopy (FESEM), UV-Visible and X-ray diffraction (XRD) were used to characterize the resultant AgNPs. The surface Plasmon resonance was observed at wavelength of 444 nm. The four intensive peaks of XRD pattern indicate the crystalline nature and the face centered cubic structure of the AgNPs. The average crystallite size of the AgNPs ranged from 18 to 22 nm. The FESEM image illustrated the well dispersion of the AgNPs and the spherical shape of the nanoparticles with a particle size distribution be
... Show Moreتناولنا في هذه الدراسة التأكيد على تطوير المناهج الدراسية بأتجاه تنمية قيم التسامح والتعايش السلمي ، لان ثقافة التسامح باتت من الضرورات الملحة التي يفرضها الواقع الراهن لمواجهة العنف المجتمعي ، مما يوجب الحرص على ترسيخ القيم الانسانية ، لان التسامح من الصفات التي تحبها النفوس وتنجذب اليها القلوب .
والقيم الاخلاقية والسلوكية كالتسامح وغيرها ، من الامور الرئيسية لعمليتي التربية والتعليم في المدارس وال
... Show MoreDust storms are a common ecological occurrence in many world‘s countries, mainly in dry and semi-dry parts. Dust storms tremendously influence human health, the environment, the climate, and numerous social aspects. In this paper, spatial and temporal analysis, metrological triggers, and trajectory, dust exporting areas of a severe dust storm that occurred in Iraq on May 16, 2022, were investigated. The dust storm's backward trajectory was determined using HYSPLIT model, which is then compared with MODIS and Meteosat satellite images. The weather is then analyzed using the NCEP/NCAR Reanalysis model, and the approximate area of these sources was determined using Landsat 8 satellite image classification method. The results revealed
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreSolar photovoltaic (PV) system has emerged as one of the most promising technology to generate clean energy. In this work, the performance of monocrystalline silicon photovoltaic module is studied through observing the effect of necessary parameters: solar irradiation and ambient temperature. The single diode model with series resistors is selected to find the characterization of current-voltage (I-V) and power-voltage (P-V) curves by determining the values of five parameters ( ). This model shows a high accuracy in modeling the solar PV module under various weather conditions. The modeling is simulated via using MATLAB/Simulink software. The performance of the selected solar PV module is tested experimentally for differ
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show More