Author of the publication

Enhanced Arabic Information Retrieval: Light Stemming and Stop Words.

, , and . M-CAIT, volume 378 of Communications in Computer and Information Science, page 219-228. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison between Ad-hoc Retrieval and Filtering Retrieval Using Arabic Documents., , , and . Int. J. Comput. Proc. Oriental Lang., 17 (3): 181-199 (2004)Arabic Text Categorization System - Using Ant Colony Optimization-Based Feature Selection., and . ICSOFT (PL/DPS/KE), page 384-387. INSTICC Press, (2008)Enhanced Algorithm for Extracting the Root of Arabic Words., , , and . CGIV, page 388-391. IEEE Computer Society, (2009)An Intelligent Health Care System for Detecting Drug Abuse in Social Media Platforms Based on Low Resource Language., , , , , , and . IEEE ACM Trans. Audio Speech Lang. Process., (2024)Design and Implementation of Automatic Indexing for Information Retrieval with Arabic Documents., , and . JASIS, 48 (10): 867-881 (1997)Impact of Stemmer on Arabic Text Retrieval., , , and . AIRS, volume 8870 of Lecture Notes in Computer Science, page 314-326. Springer, (2014)Enhanced Arabic Information Retrieval: Light Stemming and Stop Words., , and . M-CAIT, volume 378 of Communications in Computer and Information Science, page 219-228. Springer, (2013)Emotion analysis of Arabic articles and its impact on identifying the author's gender., , , , and . AICCSA, page 1-6. IEEE Computer Society, (2015)The Failure of E-government in Jordan to Fulfill Potential. International Journal of Advanced Computer Science and Applications(IJACSA), (2013)Genetic Algorithm Solution of the Knapsack Problem Used in Finding Full Issues in the Holy Quran Based on the Number (19)., , , , and . Computer and Information Science, 6 (2): 18-30 (2013)