Preferred Language
Articles
/
bsj-6008
Using Graph Mining Method in Analyzing Turkish Loanwords Derived from Arabic Language
...Show More Authors

Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing letters in Turkish language relative to Arabic language. A graph mining technique was introduced, for identifying the Turkish loanwords from Arabic language, which is used for the first time for this purpose. Also, the problem of letters differences, in the two languages, is solved by using a reference language (English) to unify the style of writing. The proposed system was tested using 1256 words that manually annotated. The obtained results showed that the f-measure is 0.99 which is high value for such system. Also, all these contributions lead to decrease time and effort to identify the loanwords in efficient and accurate way. Moreover, researchers do not need to have knowledge in the recipient and the source languages. In addition, this method can be generalized to any two languages using the same steps followed in obtaining Turkish loanwords from Arabic.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 02 2016
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Synthesis, Spectroscopic and Adsorption Studies of Cobalt (II) Complex for a ligand β-enaminone Derived from Sulfamethoxazole
...Show More Authors

This paper concerns is the preparation and characterization of a bidentate ligand [4-(5,5- dimethyl-3-oxocyclohex-1-enylamino)-N-(5-methylisoxazol-3-yl) benzene sulfonamide]. The ligand was prepared from fusing of sulfamethoxazole and dimedone at (140) ºC for half hour. The complex was prepared by refluxing the ligand with a bivalent cobalt ion using ethanol as a solvent. The prepared ligand and complex were identified using Spectroscopic methods. The proposed tetrahedral geometry around the metal ions studied were concluded from these measurements. Both molar ratio and continuous variation method were studied to determine metal to ligand ratio (M:L). The M to L ratio was found to be (1:1). The adsorption of cobalt complex was carried out

... Show More
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Global Pharma Technology
Synthesis of New 2, 4, 5-triphenyl imidazole Derivatives Derived from benzoin and Studying their Biological Activity
...Show More Authors

compound [1] was formed from the reaction of benzoin and benzaldehyde in the presence of ammonia, which was reacted with sodium hydride in DMF to obtain imidazole salt. This salt was reacted with adipoyl chloride to give compound [2]. Acid hydrazide derivative [3] was obtained from the reaction of compound [2] with hydrazine hydrate. After that Shiff bases [4-9] have been synthesized from the reaction of compound [3] with different aromatic aldehydes. These new formed compounds were diagnosed by 13C-NMR, 1H-NMR for some of them (in Ahl-Albate University in Jordan) and FT-IR spectroscopy (In Baghdad University). All of the prepared products have been studied their biological activities toward two kinds of bacteria. These products show

... Show More
Scopus (9)
Scopus
Publication Date
Sun Oct 15 2023
Journal Name
Bionatura
Synthesis, Characterization and Evaluation of the Biological Activity of Some New Thiazolidine Derivatives Derived from Schiff bases
...Show More Authors

In this research, new compounds were synthesized via the reaction of dichloroacetic acid with two moles of piperidine. The novel acid 1 was converted to its ester 2. Acid hydrizide 3 was prepared by the reaction of hydrazine hydrate with new ester 2, which was later used to prepare derivatives of Schiff bases 4-13. In the last step, Schiff bases and thioglycolic acid were reacted to give thiazolidine derivatives 14-23. All these compounds were diagnosed using melting points, FTIR, 1HNMR and mass spectroscopy. Scheme 1 shows all the synthesized compounds' reaction steps and structures. Keywords: Thiazolidine; Schiff bases; biological activity; piperidine; dichloroacetic acid.

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
Lights statement in the first part    From the Qur'an
...Show More Authors

My research tagged [the lights of the statement in the first part of the Koran] came to show that the dear book was developed according to a precise linguistic system is not increased by a word or letter or movement - Aldmh and Kira and the hole - and does not lack anything of it except with the wisdom required by the meanings of the Koranic text or Sura generally . The Koran does not come falsehood from his hands or from behind it is infallible and preserved; because it was revealed by the sage Hamid Hamid ﭽﮗ ﮘ ﮙ ﮚ ﮛ ﮜ ﮝ ﮞ ﭼ [stone]. The Qur'an is safe from any verbal or moral dominance and dominates all the heavenly books and exists at any time and place that speaks the truth ﭽ ﯛ ﯜ ﯝ ﯞ ﯟ ﯹ ﯺﭼ [The

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Molding and simulation sedimentation process using finite difference method
...Show More Authors
Abstract<p>The goal of this research is to develop a numerical model that can be used to simulate the sedimentation process under two scenarios: first, the flocculation unit is on duty, and second, the flocculation unit is out of commission. The general equation of flow and sediment transport were solved using the finite difference method, then coded using Matlab software. The result of this study was: the difference in removal efficiency between the coded model and operational model for each particle size dataset was very close, with a difference value of +3.01%, indicating that the model can be used to predict the removal efficiency of a rectangular sedimentation basin. The study also revealed</p> ... Show More
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
Indirect Method for Optimal Control Problem Using Boubaker Polynomial
...Show More Authors

In this paper, a computational method for solving optimal problem is presented, using indirect method (spectral methodtechnique) which is based on Boubaker polynomial. By this method the state and the adjoint variables are approximated by Boubaker polynomial with unknown coefficients, thus an optimal control problem is transformed to algebraic equations which can be solved easily, and then the numerical value of the performance index is obtained. Also the operational matrices of differentiation and integration have been deduced for the same polynomial to help solving the problems easier. A numerical example was given to show the applicability and efficiency of the method. Some characteristics of this polynomial which can be used for solvin

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Reducing the Water Hardness by Using Electromagnetic Polarization Method
...Show More Authors

Hard water does not pose a threat to human health but may cause precipitation of soap or results stone in the boilers. These reactions are caused by the high concentrations of Ca and Mg. In the industry they are undesirable because of higher fuel consumption for industrial use .Electromagnetic polarization water treatment is a method which can be used for increasing the precipitation of Ca 2+ and CO3 2- ions in hard water to form CaCO3 which leads to decrease the water hardness is research has been conducted by changing the number of coil turns and voltage of the system. The spectroscopy electron microscope was used for imaging the produced crystals. Results of the investigation indicated that

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
The Landsat Imagery Gap Filling using Median Filter Method
...Show More Authors

The Enhanced Thematic Mapper Plus (ETM+) that loaded onboard the Landsat-7 satellite was launched on 15 April 1999. After 4 years, the image collected by this sensor was greatly impacted by the failure of the system’s Scan Line Corrector (SLC), a radiometry error.The median filter is one of the basic building blocks in many image processing situations. Digital images are often distorted by impulse noise due to errors generated by the noise sensor, errors that occur during the conversion of signals from analog-to-digital, as well as errors generated in communication channels. This error inevitably leads to a change in the intensity of some pixels, while some pixels remain unchanged. To remove impulse noise and improve the quality of the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref