Preferred Language
Articles
/
fxebPo8BVTCNdQwC4GW_
Classification of Arabic Writer Based on Clustering Techniques
...Show More Authors

Arabic text categorization for pattern recognitions is challenging. We propose for the first time a novel holistic method based on clustering for classifying Arabic writer. The categorization is accomplished stage-wise. Firstly, these document images are sectioned into lines, words, and characters. Secondly, their structural and statistical features are obtained from sectioned portions. Thirdly, F-Measure is used to evaluate the performance of the extracted features and their combination in different linkage methods for each distance measures and different numbers of groups. Finally, experiments are conducted on the standard KHATT dataset of Arabic handwritten text comprised of varying samples from 1000 writers. The results in the generation step are obtained from multiple runs of individual clustering methods for each distance measures. The best results are achieved when intensity, lines slope and their

Scopus
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
Censurer’s dialogue in Classical Arabic Poetry
...Show More Authors

Censure in poetry is a pattern of poetic construction, in which the poet evokes a voice other than his own voice or creates out of his own self another self and engages with him in dialogue in the traditional artistic style whose origin remains unknown. Example of the same may be found in the classical Arabic poets’ stopping over the ruins, crying over separation and departure and speaking with stones and andirons; all in the traditional technical mould. Censure confronting the poet usually emanates from the women as blaming, censure and cursing is closer to woman’s hearts than to the man’ hearts. Censure revolves around some social issues, such as the habit of over drinking wine and extravagant generosity taking risks, traveling,

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 06 2021
Journal Name
College Of Islamic Sciences
Linguistic deposits in the Arabic language
...Show More Authors

 

Abstract of the research:

     This research sheds light on an important phenomenon in our Arabic language, which is linguistic sediments, and by which we mean a group of vocabulary that falls out of use and that native speakers no longer use it, and at the same time it happens that few individuals preserve the phenomenon and use it in their lives, and it is one of the most important phenomena that  It should be undertaken and studied by researchers;  Because it is at the heart of our huge linguistic heritage, as colloquial Arabic dialects retain a lot of linguistic sediments, and we usually find them at all levels of language: phonetic, banking, grammatical and semantic.  In the

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Awej For Translation And Literary Studies
Phonological Problems of Translating English Advertisements into Arabic
...Show More Authors

An advertisement is a form of communication intended to promote the sale of a product or service, influence public opinion, gain political support, or to elicit some other response. It consists of various type, including style, target audience, geographic scope, medium, or purpose. An advertisement should catch a person's attention and quickly create a memorable impression. The main aim of the present paper is to investigate the phonological problems of translating English international TV advertisements into Arabic. It deals with the most common and popular TV advertisements. The importance of such advertisements lies not in its information content rather than in the achievement of the desired impact on the receivers. When translating such

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 14 2016
Journal Name
Al-academy
Recruitment of Arabic calligraphy in gold jewelry styles
...Show More Authors

Search came (the employment of Arabic calligraphy in gold jewelry styles) four chapters, the first chapter of which dealt:A/research problem B/importance of research C/targets search D/ Define termsAs the aim of the research (to identify the employment of different forms of Arabic calligraphy on gold jewelry styles).It came in the second quarter (the theoretical framework and previous studies), some of the topics reviewed in which diversities researcher aesthetic and functional, and various uses that filled Arabic calligraphy.The third chapter outlining the researcher methodology and the research community, has a special form for the analysis of the samples are designed as form is offered on a number of experts in the field of jurisdicti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 22 2011
Journal Name
Alustath
Phonological Adaptation of English Loanwords into Iraqi Arabic
...Show More Authors

MR Younus, Alustath, 2011

View Publication
Publication Date
Sun Feb 01 2015
Journal Name
The European Physical Journal A
Analytic view at alpha clustering in even-even heavy nuclei near magic numbers 82 and 126
...Show More Authors

View Publication
Scopus (13)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2019
Journal Name
2019 International Symposium On Networks, Computers And Communications (isncc)
An Interference Mitigation Scheme for Millimetre Wave Heterogeneous Cloud Radio Access Network with Dynamic RRH Clustering
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
An Extensive Literature Review on Risk Assessment Models (Techniques and Methodology) for Construction Industry
...Show More Authors

This study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More