Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing letters in Turkish language relative to Arabic language. A graph mining technique was introduced, for identifying the Turkish loanwords from Arabic language, which is used for the first time for this purpose. Also, the problem of letters differences, in the two languages, is solved by using a reference language (English) to unify the style of writing. The proposed system was tested using 1256 words that manually annotated. The obtained results showed that the f-measure is 0.99 which is high value for such system. Also, all these contributions lead to decrease time and effort to identify the loanwords in efficient and accurate way. Moreover, researchers do not need to have knowledge in the recipient and the source languages. In addition, this method can be generalized to any two languages using the same steps followed in obtaining Turkish loanwords from Arabic.
Araştırmamın adı: Türkçe'de –madan, -meden Ulaç Ekinin Yazılışı ve Kullanılışıdır.
Ulaçlar, kişi ve zaman kavramı olmadan temel cümlenin yada yan cümlenin yüklemini niteleyen, cümlede genellikle zarf tümleci olarak görev yapan fiilimsilerdir. İkinci bir görevleri yardımcı fiillerle birlikte kullanılarak birleşik fiiller kurmak olan ulaçlar, cümlede bağlaç görevinde kullanılabilirler, ve birleşik cümleler kurabilirler. Bazı ulaç ekleri zarf, edat gibi kalıcı sözcük yapımında da kullanılırlar.
Bu araştırmada Orhun Türkçesi'nde başlayıp Türkiye Türkçesine kadar uzanan tarihi dönemlere ait eserlerden –m
... Show MoreThe researches to discover useful ways to represent the agents and agent-based
systems are continuous. Unified Modeling Language (UML) is a visual modeling language
used for software and non software modeling systems. The aim of this paper is: using UML
class diagram to design treasury pharmaceuticals agent and explain its internal action. The
diagram explains the movement of the agent among other nodes to achieve user's requests
(external) after it takes them. The paper shows that it is easy to model the practical systems by
using agent UML when they are used in a complex environment.
The author’s research is dedicated to the actual problem of identifying the linguoculturological and translation features of the glutonic vocabulary both in Russian and in Arabic. It is noted that the vocabulary of the glutonic type is extremely rich and diverse, as it is part of the national and linguistic culture of the Russian and Arab people. In the gastronomic discourse of the Russian people and the Arab peoples, it is represented by various parts of speech. The study of the traditions of food consumption confirmed the rich stylistic possibilities of the glutonic vocabulary, the names of bread in Russian and Arabic languages. It has been established that in modern Russian gastronomic discourse, glutonic lexical units are involved
... Show MoreThe present study is a qualitative study that aims to investigate the way the Iraqi caricaturist,Dheaa Al-Hajjar uses caricatures to produce a satirical meaning humorously.Producing satire while at the same maintaining humor requires a creative thinking on the part of the caricaturist. Thus, the study examines the production of humorous satire in terms of creativity. The analysis is done from the cognitive linguistic point of view using Arthur Koestler's theory of bisociation as presented in his book The Act of Creation in 1964. The main principle on which the theory is based is that humor is created via linking (or bisociating in Koestler's terms) two habitually incompatible trains of thought in order to come up with a novel me
... Show MoreThis paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).
The purpose of this study is to diagnose factors that effect Thi-Qar behavioral intention to use internet. A sample of (127) internet users of university staff was taken in the study and were analyzed by using path analyze . The study concluded that there is a set of affecting correlation. It was founded that exogenous variables (gender, income, perceived fun, perceived usefulness, Image, and ease of use) has significant effect on endogenous (behavioral intention) . The result of analysis indicated that image hopeful gained users comes first, ease of use secondly, perceived fan and perceived usefulness on (dependent variables (daily internet usage and diversity of internet usage. Implication of these result are discussed . the st
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThis paper studies the demonstratives as deictic expressions in Standard Arabic and English by outlining their phonological, syntactic and semantic properties in the two languages. On the basis of the outcome of this outline, a contrastive study of the linguistic properties of this group of deictic expressions in the two languages is conducted next. The aim is to find out what generalizations could be made from the results of this contrastive study.
Translation is a dynamic and living process that cannot be considered equal to the original text and requires the appropriate structure, language, thought and culture of the target language, and the translator's intellectual, linguistic and cultural influences inadvertently penetrate into the translated text. It causes heterogeneity of the destination text with the source text.
Admiral's theory is trying to help by providing components and suggested approaches to resolve these inconsistencies. In the meantime, in addition to the mission of putting words together, the translator must sometimes sit in the position of the reader and judge and evaluate the translated text in order to understand its shortcomings and try to correct it a
... Show More