For an Independent Spell-Checking System from the Arabic Language Vocabulary
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 1
Abstract
In this paper, we propose a new approach for spell-checking errors committed in Arabic language. This approach is almost independent of the used dictionary, of the fact that we introduced the concept of morphological analysis in the process of spell-checking. Hence, our new system uses a stems dictionary of reduced size rather than exploiting a large dictionary not covering the all Arabic words. The obtained results are highly positive and satisfactory; this has allowed us to appreciate the validity of our concept and shows the importance of our new approach.
Authors and Affiliations
Bakkali Hamza, Yousfi Abdellah, Gueddah Hicham, Belkasmi Mostafa
Intrusion Detection System in Wireless Sensor Networks: A Review
The security of wireless sensor networks is a topic that has been studied extensively in the literature. The intrusion detection system is used to detect various attacks occurring on sensor nodes of Wireless Sensor Netwo...
Improved Design of an Adaptive Massive MIMO Spherical Antenna Array
Massive capacity and connectivity are the main boundaries towards standing the Internet of Everything (IoE) basis and defining modern wireless generation requirements. These needs cannot be achieved by already deployed p...
Causal Impact Analysis on Android Market
Google play store contains a large repository of apps for android users. Play store has two billion active users that have two million apps to download and use. App developers are competing to get a higher success rate a...
Tele-Ophthalmology Android Application: Design and Implementation
Diabetic retinopathy is the leading cause of blind-ness in the world population. Early detection and appropriate treatment can significantly reduce the risk of loss of sight. Medical authorities recommend an annual revie...
Detecting Distributed Denial of Service Attacks Using Data Mining Techniques
Users and organizations find it continuously challenging to deal with distributed denial of service (DDoS) attacks. . The security engineer works to keep a service available at all times by dealing with intruder attacks....