Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing letters in Turkish language relative to Arabic language. A graph mining technique was introduced, for identifying the Turkish loanwords from Arabic language, which is used for the first time for this purpose. Also, the problem of letters differences, in the two languages, is solved by using a reference language (English) to unify the style of writing. The proposed system was tested using 1256 words that manually annotated. The obtained results showed that the f-measure is 0.99 which is high value for such system. Also, all these contributions lead to decrease time and effort to identify the loanwords in efficient and accurate way. Moreover, researchers do not need to have knowledge in the recipient and the source languages. In addition, this method can be generalized to any two languages using the same steps followed in obtaining Turkish loanwords from Arabic.
Schiff base derived from PVA and Erythroascorbic acid derivative (pentulosono-ɣ-lactone-2, 3-enedianisoate) was synthesized and characterized by Thin Layer Chromatography (TLC) and FTIR spectra, aldehyde was also characterized by (U.V-Vis), 1HNMR, 13CNMR and mass spectra. The inhibitory effect of prepared polymer on the activity of human serum Cholinesrerase has been studied in vitro. The polymer showed a remarkable activity at low concentration (4.5*10-3 – 4.5*10-8 M).
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreMany reasons combined behind the Standing of U.S. against Britain in its aggression against Egypt in 1956; the consensus of world opinion on the need to stop the aggression and the fear of the Soviet military intervention which mean a new world war.
United States desired to weaken British influences in the region in general to get new oil gains in the Arabian Gulf and Egypt at the expense of Britain. The exiting of Britain from the area served U.S. strategic interests in the Middle East in general and Egypt in particular to keep the flow of oil for U.S advantage.
The United States wanted to keep its image in the region to apply its future political projects including Eisenhower Project, which intended to take the position of Britis
This research is an attempt to explore a social and pragmatic phenomenon of lamentation in elegies of Gray and AL-Khansaa' who represent two different cultures. It illustrates the intended meaning of lamentation in English and Arabic and finds how the two languages express this purpose of poetry by analysing it socio-pragmatically adopting Searle's models (1969),and its modifications. Lamentation is considered as a mournful poem lamenting the death of whole humanity as Gray's elegy and of an individual as AL-Khansaa's elegy. So, Gray portrays a universal picture concerning his lamentation, while AL-Khansaa' portrays an individual and subjective picture regarding her lamentation. As branches of linguistics, sociolinguistics de
... Show MoreLandSat Satellite ETM+ image have been analyzed to detect the different depths of regions inside the Tigris river in order to detect the regions that need to remove sedimentation in Baghdad in Iraq Country. The scene consisted of six bands (without the thermal band), It was captured in March ٢٠٠١. The variance in depth is determined by applying the rationing technique on the bands ٣ and ٥. GIS ٩. ١ program is used to apply the rationing technique and determined the results.
Statistical methods and statistical decisions making were used to arrange and analyze the primary data to get norms which are used with Geographic Information Systems (GIS) and spatial analysis programs to identify the animals production and poultry units in strategic nutrition channels, also the priorities of food insecurity through the local production and import when there is no capacity for production. The poultry production is one of the most important commodities that satisfy human body protein requirements, also the most important criteria to measure the development and prosperity of nations. The poultry fields of Babylon Governorate are located in Abi Ghareg and Al_Kifil centers according to many criteria or factors such as the popu
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More