It is not often easy to identify a certain group of words as a lexical bundle, since the same set of words can be, in different situations, recognized as idiom, a collocation, a lexical phrase or a lexical bundle. That is, there are many cases where the overlap among the four types is plausible. Thus, it is important to extract the most identifiable and distinguishable characteristics with which a certain group of words, under certain conditions, can be recognized as a lexical bundle, and this is the task of this paper.
Sentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MorePreparation and Identification of some new Pyrazolopyrin derivatives and their Polymerizations study
In this research two series of the new derivatives of Trimethoprim and paracetamol drugs have been prepared which known as a high medicinal effectiveness. Series (A) is including the interaction of diazonium salt of trimethoprim and coupling with some substituted phenol compounds (2-amino phenol, 3-ethyl phenol, 1-naphthol, 2-nitro phenol, Salbutamol). Series (B) is including the interaction coupling alkali solution of paracetamol with diazonium salt of some substituted aniline compounds (Benzedine, 2, 3-di chloro aniline, Trimethoprim, Anilinium chloride, 2-nitro- 4-chloro aniline).Chemical structures of all synthesized compounds were confirmed by UV-visible and FTIR spectroscopy.
The Political loyalties of the individual considered as the most important democracies through direct psychological identification in a particular party. The political parties regarded as the important elements and the foundations of the democratic system. They have effective interaction between the voters and the government institutions. The aim of the current research is to identify the quality of Islamic, the Civilian parties, and the most preferred for students. also, the research attempt to identify the level of identification party that the university students have, and the difference of identification party according to the gender (male, female), the difference of of social class (upper, middle, poor). The sample
... Show MoreNew speaker identification test’s feature, extracted from the differentiated form of the wave file, is presented. Differentiation operation is performed by an operator similar to the Laplacian operator. From the differentiated record’s, two parametric measures have been extracted and used as identifiers for the speaker; i.e. mean-value and number of zero-crossing points.
Background: Reliable detection the etiological agent of amoebic dysentery and extra-intestinal amoebiasis have Public health importance specially in asymptomatic human and animals, Since the acquisition of pet dogs in the recent period has become widespread in our city. Aim: To give correct perception of infection rate in asymptomatic individuals (human and domestic dogs) for the first aspect and about detection and diagnosis of the pathogenic species of Entamoeba histolytica from another morphologically similar and commensal one using the molecular technique in stool samples of asymptomatic individuals the second aspect. Methods: During the study period from the beginning of September 2020 to the end of February 2021, a total of 95 stool s
... Show MoreThe use of deep learning.
In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .