Preferred Language
Articles
/
bsj-6008
Using Graph Mining Method in Analyzing Turkish Loanwords Derived from Arabic Language
...Show More Authors

Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing letters in Turkish language relative to Arabic language. A graph mining technique was introduced, for identifying the Turkish loanwords from Arabic language, which is used for the first time for this purpose. Also, the problem of letters differences, in the two languages, is solved by using a reference language (English) to unify the style of writing. The proposed system was tested using 1256 words that manually annotated. The obtained results showed that the f-measure is 0.99 which is high value for such system. Also, all these contributions lead to decrease time and effort to identify the loanwords in efficient and accurate way. Moreover, researchers do not need to have knowledge in the recipient and the source languages. In addition, this method can be generalized to any two languages using the same steps followed in obtaining Turkish loanwords from Arabic.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
Body Language in the Works of Sculptors George Segal and Duane Hanson: قصي زين العابدين طعمة
...Show More Authors

The means of communication in the accepted human contexts depend on several modes, beginning with the oldest of which in history, represented by the sign language, the sign and the symbol and ending with it, until countless of them became icons that are circulating between the societies themselves or with their neighbors. These icons are often implied in formations that represent a visual discourse which the sender uses as a means and as a message at the same time to express a certain phenomenon in society or in his human self, and thus the sender or performer or artist, in the end, adopted a visual intermediary in order to position his speech in its entirety and perhaps in a specific part of it, to carry the content of that speech and c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 15 2020
Journal Name
Iop Conf. Series: Journal Of Physics: Conf. Series
Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method
...Show More Authors

The aim of this paper is to evaluate the rate of contamination in soils by using accurate numerical method as a suitable tool to evaluate the concentration of heavy metals in soil. In particular, 2D –interpolation methods are applied in the models of the spread the metals in different direction.The paper illustrates the importance of the numerical method in different applications, especially nvironment contamination. Basically, there are many roles for approximating functions. Thus, the approximating of function namely the analytical expression may be expressed; the most common type being is polynomials, which are the easy implemented and simplest methods of approximation. In this paper the divided difference formula is used and extended

... Show More
Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
كلية التربية-الجامعة المستنصرية
Study the diffusion of Hydrogen in metals using a Runge-Kutta method
...Show More Authors

Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Preparation of Nanoparticles in an Eco- friendly Method using Thyme Leaf Extracts
...Show More Authors

Colloidal silver nanoparticles were prepared by single step green synthesis using aqueous extracts of the leaves of thyme as a function of different molar concentration of AgNO3 (1,2,3,4 mM(. The Field Emission Scanning Electron Microscopy (FESEM), UV-Visible and X-ray diffraction (XRD) were used to characterize the resultant AgNPs. The surface Plasmon resonance was observed at wavelength of 444 nm. The four intensive peaks of XRD pattern indicate the crystalline nature and the face centered cubic structure of the AgNPs. The average crystallite size of the AgNPs ranged from 18 to 22 nm. The FESEM image illustrated the well dispersion of the AgNPs and the spherical shape of the nanoparticles with a particle size distribution be

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Nov 14 2019
Journal Name
Journal Of Physics: Conference Series
Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method
...Show More Authors

Journal of Physics: Conference Series PAPER • THE FOLLOWING ARTICLE ISOPEN ACCESS Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method Luma Naji Mohammed Tawfiq1, Nadia H Al-Noor2 and Taghreed H Al-Noor1 Published under licence by IOP Publishing Ltd Journal of Physics: Conference Series, Volume 1294, Issue 3 Citation Luma Naji Mohammed Tawfiq et al 2019 J. Phys.: Conf. Ser. 1294 032020 DOI 10.1088/1742-6596/1294/3/032020 DownloadArticle PDF References Download PDF 135 Total downloads 88 total citations on Dimensions. Turn on MathJax Share this article Share this content via email Share on Facebook (opens new window) Share on Twitter (opens new window) Share on Mendeley (opens new window) Hide article and author

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (10)
Scopus Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Using Artificial Neural Network Models For Forecasting & Comparison
...Show More Authors

The Artificial Neural Network methodology is a very important & new subjects that build's the models for Analyzing, Data Evaluation, Forecasting & Controlling without depending on an old model or classic statistic method that describe the behavior of statistic phenomenon, the methodology works by simulating the data to reach a robust optimum model that represent the statistic phenomenon & we can use the model in any time & states, we used the Box-Jenkins (ARMAX) approach for comparing, in this paper depends on the received power to build a robust model for forecasting, analyzing & controlling in the sod power, the received power come from

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Bajila role in the Arabic- Islamic history in the early period of Islam: Bajila role in the Arabic- Islamic history in the early period of Islam
...Show More Authors

Abstract:
Bajila regarded as descending from Anmar Ibn Nizar. Al-Masudi accepts
Bajila and Khath”am as being of Nizar, and asserts that it was only out of the
enmity that they were said to be from the Yemen.
Al-Ya”qubi tries to harmonize this by assuming that Anmar married a
women of the Yemen and that his sons Bajila and Khath”am are thus
connected to the people of this region only through their mothers line.
Bajila embraced Islam in the period of the prophet. Omar 1 forced this
tribe to go to Iraq instead of Al-_Sham, and gave them the quarter of Al- Saw
ad. Then they prohibited from that quarter by given money as reward that
made them against omar1.
This tribe assisted the forth rightly guided ca

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Methods of using the periodic chart in the case of the missing values of the stable AR model (2)
...Show More Authors

In this study, we investigate the behavior of the estimated spectral density function of stationary time series in the case of missing values, which are generated by the second order Autoregressive (AR (2)) model, when the error term for the AR(2) model has many of continuous distributions. The Classical and Lomb periodograms used to study the behavior of the estimated spectral density function by using  the simulation.

 

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Body Language in the Poetry of Ibn Al-Jayab Al-Farnati
...Show More Authors

Language is a means of communication among the human beings. Every language that distinguish them from others. However, there is language common that is common of all human beings without discrimination and expression of ideas. Perhaps it is more honest that the usual language.

            The research is divided into a preface which speaks about the meaning of body language. Then we speak about body gestures like the eyes, hand, the tongue the heart reaching up the conclusion in which we found that the body language is one of the terms included in the Holy Quran, which has original roots. But this term is recently common and spread in the present time. Most of those who tack

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref