Les formes verbales augmentées de l’arabe moderne de presse: une étude statistique et syntaxico-sémantique à travers un corpus de presse

Arabica ◽  
2011 ◽  
Vol 58 (5) ◽  
pp. 404-429
Author(s):  
Marie Baize-Robache

AbstractThis article deals with contemporary Arabic through a corpus extracted from the website <ext-link ext-link-type="url" xlink:href="www.aljazeera.net">www.aljazeera.net</ext-link>. Before comparing the extended verbal forms of this corpus with the same verbal forms found in the newspaper al-ayāt, it first defines the object as well as the analysis method of the corpora. In a third part, it moves on to the study of the extended verbal forms, like this: (1) the analysis of few significant instances, (2) the statistical report of this few values for the forms of each corpus. The whole of these instances reveals that, if there are some evolutions in the functioning of the forms in relation to the Arabist standard, the Internet corpus does not present any single one in comparison to the paper corpus.

Author(s):  
Duygu Dersan Orhan

Through the development of technology, the understanding of traditional foreign policy has changed. Foreign policy making, which was shaped by diplomatic correspondence, visits, agreements, and notes between countries, is carried out today via messages sent over the Internet. Twitter is the most frequently used internet tool in the hands of institutions, decision makers, and leaders in foreign policy making. US President Donald J. Trump is one of the leaders who use Twitter most effectively. Twitter was the center of Trump's messages, both during the presidential campaign and after his election. Trump is not just using Twitter as a platform for meeting his supporters and announcing the country's official policies. Twitter has also been an important way for Trump to challenge and send harsh messages to certain countries, companies, and individuals. Iran is one of the countries that Trump targets through Twitter. This study aims to examine the use of Twitter as a platform in foreign policy making by using content analysis method through Trump's tweets about Iran.


2018 ◽  
Vol 2018 ◽  
pp. 1-8 ◽  
Author(s):  
P. Priyanka ◽  
Yousaf B. Hadi ◽  
G. J. Reynolds

Objective. Patients are increasingly using the Internet to inform themselves of health-related topics and procedures, including EGD. We analyzed the quality of information and readability of websites after a search on 3 different search engines. Methods. We used an assessment tool for website quality analysis that we developed in addition to using validated instruments for website quality, Global Quality Score (GQS) and Health on Net (HON) certification. The readability was assessed using Flesch-Kincaid Reading Ease (FRE) and Flesch-Kincaid Grade level (FKG). 30 results of each search terms ‘EGD’ and ‘Upper Endoscopy’ from Google and 15 each from Bing and Yahoo were analyzed. A total of 45 websites were included from 100 URLs after removing duplicates, video links, and journal articles. Results. Only 3 websites were found to have good quality and comprehensive and authentic information. These websites were https://www.healthline.com, https://www.uptodate.com, and https://www.emedicine.medscape.com. There were additional 13 sites with moderate quality of information. The mean Flesch-Kincaid Reading Ease (FRE) score was 46.92 (range 81.6-6.5). The mean Flesch-Kincaid Grade level (FKG) was 11th grade, with a range of 6th grade to 12th grade and above making them difficult to read. Conclusions. Our study shows that there are quite a few websites with moderate quality content. We recommend 3 comprehensive and authentic websites out of 45 URLs analyzed for information on Internet for EGD. In addition, the readability of the websites was consistently at a higher level than recommended by AMA at 11th grade level. In addition, we identified 3 websites with moderate quality content written at 8th grade and below readability level. We feel that gastroenterologists can help their patients better understand this procedure by directing them to these comprehensive websites.


2020 ◽  
Author(s):  
Masahiro Inagawa ◽  
Toshinobu Takei ◽  
Etsujiro Imanishi

Abstract Many cooking robots have been developed in response to the increasing demand for such robots. However, most of the existing robots must be programmed according to the recipes to enable cooking through the robotic arms, which requires considerable time and expertise. Therefore, this paper proposes a method to allow a robot to cook by analyzing the recipes available on the internet without any programming. The proposed method can plan robot motion by analyzing the cooking procedure of a recipe. We developed a cooking robot to execute the proposed method, and evaluated the effectiveness of the approach by analyzing 50 recipes. More than 25 recipes could be implemented using the proposed approach.


2020 ◽  
Vol 30 (3) ◽  
pp. 312-327
Author(s):  
Kazuhisa KOBAYASHI ◽  
Kazuhiro KAZAMA ◽  
Mitsuo YOSHIDA ◽  
Ikki OHMUKAI ◽  
Sho SATO

Kosmik Hukum ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 121
Author(s):  
Reza Hikmatulloh ◽  
Evy Nurmiati

Cybercrime can be defined as illegal activities with computer intermediaries that can be carried out through global electronic networks. In computer networks such as the internet, the problem of crime is becoming increasingly complex due to its wide scope. The purpose of this study is to see what strategies are suitable for preventing cybercrime actions via cell phones based on the ITE Law in Indonesia. The data analysis method used in this study is to use routine activity theory. Cohen and Felson's incidence that crime against crime is related to three variables, namely someone who is motivated, the target who is the target, and the absence of protection from the target (absence of a capable guard). The suggestion is that Gojek provides education about awareness in this fraud case. Gojek appeals to users on their social media to be more careful in trusting information. In addition, the government should not only give warnings to its users as a form of vigilance, but the government should be more optimal in giving more effort.Keywords: Cybercrime, ITE Law, Routine Activity Theory


The internet is one of the basic needs of everyone's life. The internet can be easily accessed anywhere with the uses of smartphones in which people can obtain any information and current news by the fingertip. Pornography is estimated to be one of the most frequent search topics on the Internet. This research is being conducted through a quantitative method which is a surveying method that uses a questionnaire that includes a profile of sexual behavior and using the Pornography Consumption Inventory (PCI) questionnaire. This questionnaire was distributed to 1340 respondent that come from the youth of man and woman between age 15 until 40 in Malaysia. The research use Z-test analysis method which is N=421 for male and N=919 for female. The outcome of this research that was being analysed using Z-test show a significant difference of mean score from four factors which are Sexual Curiosity (SC), Emotional Avoidance (EA), Excitement Seeking (ES), and Sexual Pleasure (SP) between gender. Based on the Ztest, the p-value of all factors is <0.0001 which is less than 0.05.


Author(s):  
Samuel Sinambela ◽  
Aditya Robbi Pangestu ◽  
Rangga Feriyanto

Abstrak: Terkadang pengguna android tidak hati-hati saat berselancar diinternet dan tanpa sadar sebuah malware telah terinstal di perangkat mereka. Malware inilah yang nantinya akan menjadi jalan bagi penyerang untuk mengambil sesuatu di perangkat korban. Maka dari itu, diperlukannya analisis untuk mengetahui apa saja akses yang dibutuhkan ketika sebuah Malware terunduh di perangkat korban. Tujuan Penelitian adalah untuk menganalisis mendapatkan informasi malware yang terdapat pada aplikasi. Metode yang dipakai dalam penelitian ini menggunakan metode kuantitatif. Sample malware akan diambil melalui iklan dan menganalisis malware tersebut menggunakan metode analisis static yang hanya membaca informasi malware tanpa harus menginstalnya. Hasil dari analisis, terdeteksi Malware dan memiliki perizinan yang tidak pada tempatnya. Seperti yang terlihat, aplikasi game tidak memerlukan izin untuk melihat panggilan yang berlangsung. Maka dari itu, diperlukannya kejelian pengguna agar tidak sembarangan mengunduh atau mengklik sesuatu ketika berinternet. User juga harus update pada keamanan perangkat yang dimiliki.Kata kunci: Malware, Analisis Statik, AndroidAbstract: Sometimes Android users are not careful when surfing the internet and unknowingly have malware installed on their devices. This malware is what will later become a way for attackers to take something on the victim's device. Therefore, analysis is needed to see what access is needed when malware is downloaded on the victim's device. The research objective is to analyze the malware information contained in the application. The method used in this research is quantitative methods. Malware samples will be taken through advertisements and analyze the malware using a static analysis method that only reads malware information without having to install it. As a result of the analysis, the malware was detected and had inappropriate permissions. As you can see, the game application is not allowed to see the ongoing calls. Therefore, users need carefulness, so they do not download or click something when surfing the internet. Users also have to update on their own devicesKeywords: Malware, Static Analysis, Android  


2015 ◽  
Vol 6 (3) ◽  
pp. 439 ◽  
Author(s):  
Lidiyawati Lidiyawati ◽  
Ratih Wulandari

This study was conducted to analyze the factors that affect the timeliness of financial reporting on the Internet in the Consumer Goods sector companies listed in Indonesia Stock Exchange (IDX). Variables used were leverage, profitability, size of company, the issuance of stock and the quality of auditors. Data analysis method used was logistic regression at the 0.05 level. The data used were secondary data and using sample Consumer Goods companies listed in the Indonesia Stock Exchange in 2010-2012. This study tested the effect of variable leverage, profitability, firm size, auditor quality stocks, and the timeliness of financial reporting on the Internet. The results obtained from these tests support the timeliness of audit quality of financial reporting on theInternet. However, other variables such as leverage, profitability, firm size, stock issuance did not support the timeliness of financial reporting on the Internet.


2020 ◽  
pp. 33
Author(s):  
Marya Yenita Sitohang ◽  
Angga Sisca Rahadian ◽  
Puguh Prasetyoputra

The impact of the pandemic has influenced every aspect of people’s life. One of the positive impacts of the pandemic in Indonesia is the existence of the community initiative to prevent the COVID-19 spreading. This article aims to explore several initiatives coming from the society in relation to COVID-19 and the lesson learned for the society to have preparedness in facing health disasters. The data come from the 39 online news on the internet, the data was then analysed using a content analysis method. The authors found that Indonesian community initiative can be distinguished by two purposes i.e. to prevent the transmission of COVID-19 and to help the vulnerability group cope with the economic impact of COVID-19. Furthermore, mostly the initiative originally came from society without the intervention of the government. It is important to note that the collaboration between the government, both the centre and local, and the society should be strengthened.


2021 ◽  
Vol 7 (1) ◽  
pp. 30-39
Author(s):  
Fadlan Abdillah Hasibuan ◽  
Subhiyanto

Abstract— This research aims to create a proxy hotspot network to connect to the internet with a login system for users,namely teachers, staff and students at Madrasah Aliyah Al-Azhaar Ummu Suwanah and create a user management system on the hotspot so that network administrators can control and monitor users. and network security can be covered. Building a mikrotik hotspot network at Madrasah Aliyah Al-Azhaar Ummu Suwanah with the PIECES modeling analysis method using Winbox, while for network development with Usermanager. The test results conducted by the user have been connected to the proxy hotspot and got the bandwidth according to the package received. The design of the proxy hotspot network at Madrasah Aliyah Al-Azhaar Ummu Suwanah shows that the proxy hotspot provides convenience and practicality in using the internet. Intisari— Penilitian ini bertujuan untuk membuat sebuah jaringan hotspot mikrotik agar terhubung ke internet dengansistem login untuk para pengguna yaitu, guru, staff maupun siswa di Madrasah Aliyah Al-Azhaar Ummu Suwanah danmembuat sebuah sistem manajemen user pada hotspot sehingga administrator jaringan dapat mengontrol dan memonitoringuser serta keamanan jaringan bisa tertutupi. Membangun jaringan hotspot mikrotik di Madrasah Aliyah Al-Azhaar UmmuSuwanah dengan metode analisis pemodelan PIECES menggunakan winbox, sedangkan untuk pengembanganjaringan dengan usermanager. Hasil uji coba yang dilakukan pengguna sudah terhubung ke hotspot mikrotik dan mendapatbandwidth sesuai dengan paket yang didapat. Rancang bangun jaringan hotspot mikrotik di Madrasah Aliyah Al-Azhaar UmmuSuwanah ini menunjukkan bahwa hotspot mikrotik memberikan kemudahan dan kepraktisan dalam penggunaan internet.


Sign in / Sign up

Export Citation Format

Share Document