Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing letters in Turkish language relative to Arabic language. A graph mining technique was introduced, for identifying the Turkish loanwords from Arabic language, which is used for the first time for this purpose. Also, the problem of letters differences, in the two languages, is solved by using a reference language (English) to unify the style of writing. The proposed system was tested using 1256 words that manually annotated. The obtained results showed that the f-measure is 0.99 which is high value for such system. Also, all these contributions lead to decrease time and effort to identify the loanwords in efficient and accurate way. Moreover, researchers do not need to have knowledge in the recipient and the source languages. In addition, this method can be generalized to any two languages using the same steps followed in obtaining Turkish loanwords from Arabic.
The present paper is a qualitative descriptive study. It aims to examine the macro-cultural schemata addressing the concept of violence against women in Iraq from a cognitive linguistic point of view. To meet this objective, a number of Iraqi social caricatures have been selected from two popular and active Iraqi caricaturists, Odeh Al-Fahdawi and Nasser Ibrahim. The selection and the analysis of data have been achieved following the validity and reliability procedures and the ethical considerations. To meet this objective, Sharifian’s Model (2011) of Cultural Schemata has been adopted in data analysis. The study has concluded that the macro-cultural schemata regarding the concept of violence in the selected panels reveals that violenc
... Show MoreSteganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThis research consists of two parts, the first part concern with analyzing the collected data of BOD and COD values in discharge waste water from Al-Dora refinery during 2010 to find the relationship between these two variables The results indicates that there is a high correlation between BOD and COD when using a natural logarithm model (0.86 ln(COD)) with correlation coefficient of 0.98. This relationship is useful in predicting the BOD value using the COD value. The second part includes analyzing collected data from the same site in order to find a relationsip between BOD and other parameters COD, Phenol(phe), Temperature(T), Oil, Sulphat(SO4),pH and Total dissolved solids( TDS) discharged from the refinery. The results indicated that th
... Show MoreThis research consists of two parts, the first part concern with analyzing the collected data of BOD and COD values in discharge waste water from Al-Dora refinery during 2010 to find the relationship between these two variables The results indicates that there
is a high correlation between BOD and COD when using a natural logarithm model (0.86 ln(COD)) with correlation coefficient of 0.98. This relationship is useful in predicting the BOD value using the COD value. The second part includes analyzing collected data from the same site in order to find a relationsip between BOD and other parameters COD, Phenol(phe), Temperature(T), Oil, Sulphat(SO4),pH and Total dissolved solids( TDS) discharged from the refinery. The results indicated
This study aimed for isolation and identification of Candida glabrata and identifying some virulence factors. The distribution of patients with candidemia thrush showed that the age group 50-65 years old recorded the highest incidence of candidiasis in female and male with leukemia by 50% and 37.9 % respectively compared to the lowest incidence of candidiasis in the age group under 17 years old in female and male 8.8% and 13.5%, respectively. While the age group between 5-8 years was high, reaching 18 cases of oral candidiasis and 42% of children with leukemia compared with the age group, which was the least, that reached 9 cases, 21%. The highest incidence of C. glabrata was 59 isolates of females and males with leukemia, while C. kefyer w
... Show MoreZinc oxide (ZnO) nanoparticles were synthesized using a modified hydrothermal approach at different reaction temperatures and growth times. Moreover, a thorough morphological, structural and optical investigation was demonstrated using scanning electron microscopy (SEM), x-ray diffraction (XRD), ultra-violate visible light spectroscopy (UV-Vis.), and photoluminescence (PL) techniques. Notably, SEM analysis revealed the occurrence of nanorods-shaped surface morphology with a wide range of length and diameter. Meanwhile, a hexagonal crystal structure of the ZnO nanoparticles was perceived using XRD analysis and crystallite size ranging from 14.7 to 23.8 nm at 7 and 8 ℎ𝑟𝑠., respectively. The prepared ZnO samples showed good abso
... Show More