Rule Based Approach for Arabic Part of Speech Tagging and Name Entity Recognition
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 6
Abstract
The aim of this study is to build a tool for Part of Speech (POS) tagging and Name Entity Recognition for Arabic Language, the approach used to build this tool is a rule base technique. The POS Tagger contains two phases:The first phase is to pass word into a lexicon phase, the second level is the morphological phase, and the tagset are (Noun, Verb and Determine). The Named-Entity detector will apply rules on the text and give the correct Labels for each word, the labels are Person(PERS), Location (LOC) and Organization (ORG).
Authors and Affiliations
Mohammad Btoush, Abdulsalam Alarabeyyat, Isa Olab
Grid Approximation Based Inductive Charger Deployment Technique in Wireless Sensor Networks
Ensuring sufficient power in a sensor node is a challenging problem now-a-days to provide required level of security and data processing capability demanded by various applications scampered in a wireless sensor network....
IMPLEMENTATION OF NODE ENERGY BASED ON ENCRYPTION KEYING
This paper deals with Designing cost-efficient, secure network protocols for any Networks is a challenging problem because node in a network itself is resource-limited. Since the communication cost is the most dominant f...
An Intelligent Software Workflow Process Design for Location Management on Mobile Devices
Advances in the technologies of networking, wireless communication and trimness of computers lead to the rapid development in mobile communication infrastructure, and have drastically changed information proc...
Meteonowcasting using Deep Learning Architecture
The area of deep learning has enjoyed a resurgence on its peak, in almost every field of interest. Weather forecasting is a complicated and one of the most challenging tasks that includes observing and processing huge am...
Power Analysis Attacks on ECC: A Major Security Threat
Wireless sensor networks (WSNs) are largely deployed in different sectors and applications, and Elliptic Curve Cryptography (ECC) is proven to be the most feasible PKC for WSN security. ECC is believed to provide same le...