Arabic language is a highly inflectional language where a single word can have different forms using a single root with different interpretations. Arabic does not have a standard way to find roots, the reasons for having inflectional language: suffix, prefix and infix Vowels, which built in complex processes. That is why, words require good processing for information retrieval solutions, until now, and there has been no standard approach to attaining the fully proper root. The applications on Arabic words show around 99% are derived from a combination of bilateral, Trilateral and quad lateral roots.
Processing word- stemming levels in order to extract a root is the process of removing all additional affixes. In case the process of matching between a word and Proper names is available, take off the affixes away, according to patterns and rules with reference to root dictionaries.
This research is new series of steps using a new way of affixes' browsing, vowels and Patterns through three stages of stemming. I f a match is not found, vowel replacement and patterns readjusted to check, if not, then the word is kept unmodified.
Search engine, indexing, file classification, clustering etc. need developing the root extraction, where the researcher will introduce recommendations and solutions that participate in improving Arabic root extraction.
Research applies comprehensive processing on general collection of documents that done gradually to improve the root extraction by 96%.
The current research aims to investigate the effect of a specimen of Daniel in the acquisition of concepts for the Arabic language curricula material to the students of the third phase of the Faculty of Basic Education Department of Arabic Language. The sample consists of (93) applications and a student of (47) students in the Division (A), which represents the experimental group which studied the use of a specimen of Daniel, and (46) students in the Division (B), which represents the control group, which studied the traditional way. The subject of unified two groups, which subjects the Arabic language curricula which includes six chapters.
The duration of the experiment is a full semester. The researchers also prepared a tool for mea
Las formas verbales: el infinitivo, el gerundio y el participio, son derivados verbales que se comportan como sustantivos, adverbios o adjetivos, respectivamente; aunque, dado su carácter verbal pueden también funcionar como verbos y, por tanto, como núcleos del predicado.
El presente trabajo presenta una visión general sobre las formas no personales del verbo en español. Se debe recordar que las formas no personales del verbo tiene funciones y valores dentro de la oración.
Este trabajo lo dividimos en dos partes: la primera presenta un breve marco teórico en que se explica las formas no personales del verbo y como se forman además de sus funciones.
Abstract
... Show MoreThe problem of the research is indicated by answering the following questions: 1) what are the attitudes of the Arabic language teachers towards homework?
2) Do the Arabic language teachers differ in their attitudes towards homework according to their specialization? 3) Do the Arabic language teachers differ in their attitudes towards homework according to their gender (male and female)? According to the three questions asked above, we may state the following hypotheses. There is no statistically significant difference between the average of the marks of Arabic language teachers in the real practice of the scale of the attitudes towards their homework and their average in the hypothetical practice of the
... Show MoreApplications of quantitative methods, which had been explicit attention during previous period (the last two centuries) is the method of application sales man or traveling salesman method. According to this interest by the actual need for a lot of the production sectors and companies that distribute their products, whether locally made or the imported for customers or other industry sectors where most of the productive sectors and companies distributed always aspired to (increase profits, imports, the production quantity, quantity of exports. etc. ...) this is the part of the other hand, want to behave during the process of distribution routes that achieve the best or the least or most appropriate.
... Show MoreA new scheme of plasma-mediated thermal coupling has been implemented which yields the temporal distributions of the thermal flux which reaches the metal surface, from which the spatial and temporal temperature profiles can be calculated. The model has shown that the temperature of evaporating surface is determined by the balance between the absorbed power and the rate of energy loss due to evaporation. When the laser power intensity range is 107 to108 W/cm2 the temperature of vapor could increase beyond the critical temperature of plasma ignition, i.e. plasma will be ignited above the metal surface. The plasma density has been analyzed at different values of vapor temperature and pressure using Boltzmann’s code for calculation of elec
... Show MoreImage classification takes a large area in computer vision in term of quality or type or data sharing and so on Iraqi Anber Rice in they need this kind of work, where few in the field of computer science that deal with the types of Iraqi Anber rice, and because of the Anber Rice are grown and produced in Iraq only, and because of the importance of rice around the world and especially in Iraq. In this paper a proposed system distinguishes between the classes of Iraqi Anber Rice that Grown in different parts of Iraq, and have their own specifications for each class by using moment invariant and KNN algorithm. Iraqi Anber Rice that is more than Fiftieth class Cultivated and irrigated in different parts of Iraq, and because of the different
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More