Preferred Language
Articles
/
bsj-6008
Using Graph Mining Method in Analyzing Turkish Loanwords Derived from Arabic Language
...Show More Authors

Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing letters in Turkish language relative to Arabic language. A graph mining technique was introduced, for identifying the Turkish loanwords from Arabic language, which is used for the first time for this purpose. Also, the problem of letters differences, in the two languages, is solved by using a reference language (English) to unify the style of writing. The proposed system was tested using 1256 words that manually annotated. The obtained results showed that the f-measure is 0.99 which is high value for such system. Also, all these contributions lead to decrease time and effort to identify the loanwords in efficient and accurate way. Moreover, researchers do not need to have knowledge in the recipient and the source languages. In addition, this method can be generalized to any two languages using the same steps followed in obtaining Turkish loanwords from Arabic.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 22 2022
Journal Name
Journal Of Al-turath University College
The Turkish role in the US-Iran Crisis (2017-2020)
...Show More Authors

New developments imposed different patterns of interactions between major international powers and Iran during 2018, ranging to varying degrees between cooperation and tension, the most important of which is the new measures taken by the United States to withdraw from the nuclear agreement and impose new US sanctions on Iran, which in turn insisted on not responding to pressure to which they are exposed to make changes in their policies and to negotiate again about the main contentious files, especially the nuclear program and ballistic missiles, and the roles they play for crisis countries, especially supporting some armed organizations in Syria, Lebanon, Iraq and Yemen. These differences have put the international forces before difficult

... Show More
View Publication
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Synthesis and Antibacterial Evaluation for Some New Schiff-bases Derived from P-aminoacetanilide
...Show More Authors

Derivatives of Schiff-bases possess a great importance in pharmaceutical chemistry. They can be used for synthesizing different types of bioactive compounds. In this paper, derivatives of new Schiff bases have been synthesized from several serial steps. The acid (I) was synthesized from the reaction of dichloroethanoic acid with 2 moles of p-aminoacetanilide. New acid (I) converted to its ester (II) via the reaction of (I) with dimethyl sulphate in the present of anhydrous of sodium carbonate and dry acetone. Acid hydrazide (III) has been synthesized by adding 80% of hydrazine hydrate  to the new ester using ethanol as a solvent. The last step included the preparation of new Schiff-bases (IV-VIII) by the reaction of acid hydrazide with

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 11 2011
Journal Name
Icgst
Employing Neural Network and Naive Bayesian Classifier in Mining Data for Car Evaluation
...Show More Authors

In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.

Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
Moderne Lehrmethodenzum Hörverstehen im Deutschunterricht Schlüsselwort: Lehrmethode-Hörverstehen-Deutschunterricht Modern methods for teaching listening comprehension in German language
...Show More Authors

Diese Forschungsarbeit versteht sich als ein Versuch zur Bestimmung einer der neuen Unterrichtsmethoden, die den Lernenden im Fach Deutsch besonders interessant vorkommen.Der Unterricht soll in einer Atmosphäre, die frei von Zeitdruck, Angst und Zensurdruck ablaufen lassen, damit werden die Studenten ermutigt, die Nutzung von Spiel zu ihrer eigenen Sache machen, um die Spielziele Spaß, Empathie, Zusammenarbeit und Kommunikation zu realisieren. Das Hauptlernziel des Fremdsprachenunterrichts ist es, Lernenden zu ermöglichen, in der Zielsprache zu kommunizieren.

Wir konzentrieren uns in diesem Beitrag auf eine wichtige sprachliche Fertigkeit, die den rezeptiven Fertigkeiten gehört, die ist das Hörverstehen.

Das Hörvers

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Biological Activity Evaluation of Some Pyrazoles, Thiazoles and Oxazoles Derived from 2-Mercaptoaniline
...Show More Authors

    Synthesis of 2-mercaptobenzothiazole (A1) is performed from the reaction of  o-aminothiophenol and carbon disulfide CS2 in ethanol under basic condition. Compound (A1)  is reacted with chloro acetyl chloride to give compound (A2). Hydrazide acid compound (A3) is obtained from the reaction of compound (A2) with  hydrazine hydrate in ethanol under reflux in the presence of glacial acetic acid .The reaction of hydrazide acid compound (A3) with ethyl acetoacetate gives pyrazole compound (A4). The new hydrazone  compound (A5) was prepared from the reaction of compound (A3) with  benzaldehyde. Reaction of compound

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
The Use of English as Lingua Franca in the Classes of UKM: as A Case of Study
...Show More Authors

           English has for long been one of the most widely used media of communication globally, especially in the Malaysian universities. It has been termed as a Lingua Franca because it is shared with other languages which are considered first languages by different speakers. For this reason, English as a Lingua Franca (ELF) has attracted a number of researchers to investigate its variety via other languages in various communities. The objective of this paper is therefore to establish the strategies which are employing by the international students at the National University of Malaysia/ UniversitiKebangsaan Malaysia (UKM) as an example of one of the Malaysian universities; when they e

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Evaluation Method of Mesh Protocol over ESP32 and ESP8266
...Show More Authors

Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Mining categorical Covid-19 data using chi-square and logistic regression algorithms
...Show More Authors

View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Turkish relations – Israel (1990-1998)
...Show More Authors

The Turkish relations - Israel took its course clearly about the nature and the fact that
these relationships, and their causes and motives of its establishment, its objectives and the
dimensions of the various political, security, military and economic. Orbiter and the relations
of the Turkish-Israeli It is inclusive of all the reasons for the establishment of relations, they
include the interpretation of an interest in international relations, which is why the
establishment of relations between the two countries and on the concept of interdependence
where that both Turkey and Israel depends on the other in several aspects of the most
important military, security, economic, and to understand Turkey's new identity, m

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More