Preferred Language
Articles
/
bsj-6008
Using Graph Mining Method in Analyzing Turkish Loanwords Derived from Arabic Language
...Show More Authors

Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing letters in Turkish language relative to Arabic language. A graph mining technique was introduced, for identifying the Turkish loanwords from Arabic language, which is used for the first time for this purpose. Also, the problem of letters differences, in the two languages, is solved by using a reference language (English) to unify the style of writing. The proposed system was tested using 1256 words that manually annotated. The obtained results showed that the f-measure is 0.99 which is high value for such system. Also, all these contributions lead to decrease time and effort to identify the loanwords in efficient and accurate way. Moreover, researchers do not need to have knowledge in the recipient and the source languages. In addition, this method can be generalized to any two languages using the same steps followed in obtaining Turkish loanwords from Arabic.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 01 2014
Journal Name
Al–bahith Al–a'alami
Study of the patterns of media frames used in the production of Arabic spring breaks in Al Arabiya channel
...Show More Authors

production of the spot in the news channels - a study of patterns of spot media used in the production of spring breaks Arab Al-Arabiya

 The spacers news in Arabic, one of the messages that seek channel output are fit and policy on the one hand and meet the needs of viewers for information intensive and image influential to find out the latest developments on the Arab arena, especially the Syrian revolution on the other and thus The viewer for the type of coverage the stomach through a newsletter about the event on the one hand to keep following up on her and eager to watch the other hand

 

 

And sou

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 20 2025
Journal Name
Political Issues
(The Libyan crisis in the Turkish and Iranian perspectives)
...Show More Authors

The Turkish intervention in the Libyan crisis in the recent period was a trigger for more tension than a solution - as Turkey claims - as Turkey seeks to quickly set a welcome military footing in Libya to prevent the reconciliation government from falling and planning to start exploration for gas and oil in Libya to solve the Turkish energy crisis, that is, the energy exchange for security and trying to exploit the situation to establish a new gathering of proTurkish political Islam, as for the Iranian position on the Libyan crisis, it does not exceed a logistical role and provide Turkey with expertise in circumventing international sanctions and assisting it in transporting fighters and weapons to Libya, Iran has also deliberately added so

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Synthesis and Antibacterial Evaluation for Some New Schiff-bases Derived from P-aminoacetanilide
...Show More Authors

Derivatives of Schiff-bases possess a great importance in pharmaceutical chemistry. They can be used for synthesizing different types of bioactive compounds. In this paper, derivatives of new Schiff bases have been synthesized from several serial steps. The acid (I) was synthesized from the reaction of dichloroethanoic acid with 2 moles of p-aminoacetanilide. New acid (I) converted to its ester (II) via the reaction of (I) with dimethyl sulphate in the present of anhydrous of sodium carbonate and dry acetone. Acid hydrazide (III) has been synthesized by adding 80% of hydrazine hydrate  to the new ester using ethanol as a solvent. The last step included the preparation of new Schiff-bases (IV-VIII) by the reaction of acid hydrazide with

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 07 2019
Journal Name
Arab Science Heritage Journal
استخدام استخدام تحليل الحساسية في تقيم المشاريع الاستثمارية في ظل ظروف المخاطرة
...Show More Authors

من الضروري اجراء تحليل الحساسية للمشاريع الاستثمارية التي يتبناها القطاع  العام أو الخاص وذلك لسببين ، الاول هو تضمين عامل المخاطرة واللاتاكد عند تقييم المشروع من الناحية الاقتصادية ، حيث لابد من يكون نسبة مخاطرة وعدم تاكد عند تقييم أي مشروع لمجابهة احداث المستقبل الغير متوقعة ، الثاني المنافسة الشديدة بين المنتجات المحلية والمستوردة  ، حيث ان تحليل الحساسية يعطينا صورة عن مدى حساسية القيمة الحالية

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Biological Activity Evaluation of Some Pyrazoles, Thiazoles and Oxazoles Derived from 2-Mercaptoaniline
...Show More Authors

    Synthesis of 2-mercaptobenzothiazole (A1) is performed from the reaction of  o-aminothiophenol and carbon disulfide CS2 in ethanol under basic condition. Compound (A1)  is reacted with chloro acetyl chloride to give compound (A2). Hydrazide acid compound (A3) is obtained from the reaction of compound (A2) with  hydrazine hydrate in ethanol under reflux in the presence of glacial acetic acid .The reaction of hydrazide acid compound (A3) with ethyl acetoacetate gives pyrazole compound (A4). The new hydrazone  compound (A5) was prepared from the reaction of compound (A3) with  benzaldehyde. Reaction of compound

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 07 2018
Journal Name
Научный форум: Филология, искусствоведение и культурология: сб. ст. по материалам Xiv междунар. науч.- практ. конф. – No 3(14). – М.:
LANGUAGE GLOBALIZATION OR THE LANGUAGE OF GLOBALIZATION
...Show More Authors

Language is an instrument, a tool of culture and a way of communication between the past and the present. No one can know the treasure of human thought and experience in the fields of history, poetry and prose without language as an instrument of communication between cultures and peoples. Language under this description faces many problems, the most important of which is linguistic globalization, which means the flow rate of the strongest language, which has elements of power, domination and control over other languages. In this article, we consider linguistic globalization as a serious problem faced by every language, and we consider its main shortcomings and advantages and its impact on the language and ways of protecting the Arabic lang

... Show More
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Perceptually Important Points-Based Data Aggregation Method for Wireless Sensor Networks
...Show More Authors

The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the

... Show More
View Publication Preview PDF
Scopus (57)
Crossref (48)
Scopus Clarivate Crossref
Publication Date
Tue Apr 01 2014
Journal Name
International Journal Of Scientific & Engineering Research
Transition properties of γ-ray Emitted from levels in 90Mo using 𝝈 𝑱 method
...Show More Authors

The δ-mixing ratios have been calculated for several γ-transitions in 90Mo using the 𝛔 𝐉 method. The results are compared with other references the agreement is found to be very good .this confirms the validity of the 𝛔 𝐉 method as a tool for analyzing the angular distribution of γ-ray. Key word: population parameter, γ-ray transition, 𝛔 𝐉 method, multiple mixing ratios.

View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Southwest Jiaotong University
Recognizing Job Apathy Patterns of Iraqi Higher Education Employees Using Data Mining Techniques
...Show More Authors

Psychological research centers help indirectly contact professionals from the fields of human life, job environment, family life, and psychological infrastructure for psychiatric patients. This research aims to detect job apathy patterns from the behavior of employee groups in the University of Baghdad and the Iraqi Ministry of Higher Education and Scientific Research. This investigation presents an approach using data mining techniques to acquire new knowledge and differs from statistical studies in terms of supporting the researchers’ evolving needs. These techniques manipulate redundant or irrelevant attributes to discover interesting patterns. The principal issue identifies several important and affective questions taken from

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More