Preferred Language
Articles
/
bsj-6008
Using Graph Mining Method in Analyzing Turkish Loanwords Derived from Arabic Language
...Show More Authors

Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing letters in Turkish language relative to Arabic language. A graph mining technique was introduced, for identifying the Turkish loanwords from Arabic language, which is used for the first time for this purpose. Also, the problem of letters differences, in the two languages, is solved by using a reference language (English) to unify the style of writing. The proposed system was tested using 1256 words that manually annotated. The obtained results showed that the f-measure is 0.99 which is high value for such system. Also, all these contributions lead to decrease time and effort to identify the loanwords in efficient and accurate way. Moreover, researchers do not need to have knowledge in the recipient and the source languages. In addition, this method can be generalized to any two languages using the same steps followed in obtaining Turkish loanwords from Arabic.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Using of concepts "conservatism & accrual" and their reflection in enhancing of quality of financial reporting
...Show More Authors

The use of Conservatism  significant impacts on the financial statements and thus on financial reporting which is produced by these lists so Rate Some of the professionals that the principle of accounting while Rate of others as a constraint, and brought this category based on the uses of this restriction sometimes used the accountant this restriction and especially with the uncertainties in the Sometimes it may collide with some of the cases in which the accountant may be forced to leave in custody as a result of emergence of economic events that gave rise to rights or future commitments should be disclosed.

The emergence in custody mainly was due to the uncertainty and its essence is to report on a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 21 2020
Journal Name
2020 Emerging Technology In Computing, Communication And Electronics (etcce)
An Integrated Grey Wolf Optimizer with Nelder-Mead Method for Workflow Scheduling Problem
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Development of Iraqi License Plate Recognition System based on Canny Edge Detection Method
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Iraqi Journal Of Physics
Fractional Free Volume Dependence of Neutron-Irradiated Polystyrene (PS) Measured by Positron Method
...Show More Authors

The fractional free volume (Fh) in polystyrene (PS) as a function of neutron -irradiation dose has been measured, using positron annihilation lifetime (PAL) method. The results show that Fh values decreased with increasing n-irradiation dose up to a total dose of 501.03× 10-2 Gy.
A percentage reduction of 2.14 in Fh values is noticed after the initial n-dose corresponding to a percentage reduction in the free volume equal to 42.14/Gy.
The total n-dose induces a percentage reduction of 7.26, corresponding to a percentage reduction of 1.45/Gy. These results indicate that cross -linking is the predominant process induced by n-irradiation.
The results suggest that n-irradiation induces structure changes in PS, causing cross-linking

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of dispensing method and curing modes on the microleakage of composite resins
...Show More Authors

Background: Vibration decreases the viscosity of composite, making it flow and readily fit the walls of the cavity. This study is initiated to see how this improved adaptation of the composite resin to the cavity walls will affect microleakage using different curing modes

Materials and methods: Standard Class V cavities were prepared on the buccal surface of sixty extracted premolars. Teeth were randomly assigned into two groups (n=30) according to the composite condensation (vibration and conventional) technique, then subdivided into three subgroups (n=10) according to light curing modes (LED-Ramp, LED-Fast and Halogen Continuous modes). Cavities were etched and bonded with Single Bond Universal

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Oct 03 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A New Feature-Based Method for Similarity Measurement under the Linux Operating System
...Show More Authors

This paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Wed May 01 2019
Journal Name
Optik
Ag2S/ZnO Nanorods Composite Photoelectrode Prepared by Hydrothermal Method: Influence of Growth Temperature
...Show More Authors

View Publication
Scopus (24)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Antibacterial Activity Of ternary semiconductor compounds AgInSe2 Nanoparticles Synthesized by Simple Chemical Method
...Show More Authors

View Publication
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref