Preferred Language
Articles
/
-WG4bJkBdMdGkNqjTiaO
ANALYZING POSTGRADUATE STUDENTS' USE OF PRAGMATIC FEATURES AND ARGUMENTATION IN THESIS WRITING: A CORPUS-BASED STUDY تحليل استخدام طلبة الدراسات العليا للسمات التداولية و الحجج في كتابة الرسائل العلمية : دراسة تعتمد تحليل البيانات المحوسبة
...Show More Authors

This study addresses the issue of academic writing in English by comparing pragmatic argumentation in the writing of 40 graduate students studying at Iraqi universities (SSIU) with the writing of 40 graduate students studying at American universities (SSAU). In these 80 theses, six selected aspects of academic writing were analyzed: (a) paragraph structure, (b) length and construction of sentences, (c) organization of information in sentences, (d) vocabulary, (e) topic sentences, and (f) discourse markers. This study seeks to go beyond the traditional and often onedimensional analysis of pragmatics of argumentation in English academic writing to distinguish and describe different aspects of academic writing and their results when used by EFL graduate students and graduate students coming from English-speaking countries. The quantitative analysis of the six selected aspects of academic mentioned above begins with a brief definition and is followed by frequency information from corpus analysis in the corpora. I analyze the selected data with a corpus-based approach and pragmatic theories that are proposed in Chapter Two to see if the results answer the research questions that are proposed in Chapter One. Learners of English who reached the postgraduate level of study should have awareness of the pragmatic aspects involved in writing and reporting academic research. These aspects are, according to their importance, topicality, organization of information, and paragraph structure. Other aspects can serve as an auxiliary function that can help presenting the major aspects above in better manner. These aspects are: length and construction, organization of information, and vocabulary. This study has reached a point at which a conclusion can be hypothesized and conducted. The full observation of these conclusions made the researcher able to suggest recommendations for further such studies.

Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Ssrn Electronic Journal
Developing a Predictive Model and Multi-Objective Optimization of a Photovoltaic/Thermal System Based on Energy and Exergy Analysis Using Response Surface Methodology
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Control Program for Hydropower Operation Based on Minimizing the Principal Stress Values on the Dam Body: Mosul Dam Case Study
...Show More Authors

This study examines the vibrations produced by hydropower operations to improve embankment dam safety. This study consists of two parts: In the first part, ANSYS-CFX was used to generate a three-dimensional (3-D) finite volume (FV) model to simulate a vertical Francis turbine unit in the Mosul hydropower plant. The pressure pattern result of the turbine model was transformed into the dam body to show how the turbine unit's operation affects the dam's stability. The upstream reservoir conditions, various flow rates, and fully open inlet gates were considered. In the second part of this study, a 3-D FE Mosul dam model was simulated using an ANSYS program. The operational turbine model's water pressure pattern is conveyed t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2007
Journal Name
Al-academy
البناء اللحني في الردات الحسينية في محافظة كربلاء
...Show More Authors

برز في بداية القرن الماضي اهتمام الباحثين في بعض دول العالم بجمع ودراسة الارث الموسيقي لشعوبهم من خلال ما اكتشفوه من دور لهذه الدراسات في تحديد الهوية الموسيقية لمبتكري ومؤدي ومتلقي هذا الارث .وقد قام كثير من الدول العالم وخصوصا في اوربا وامريكا بانشاء مراكز بحثية خاصة تعنى بجمع وحفظ وتصنيف وتحليل مواد ارثهم الشعبي ومن ثم تحديد سماته وخصائصه الموسيقيةاما في العراق وبرغم تعدد وتنوع اشكال التراث والموروث ال

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 16 2025
Journal Name
Al-bahith Journal
التعليم في عصر الرسالة وأثره الفكري في التاريخ
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Sep 30 2018
Journal Name
College Of Islamic Sciences
أسرارُ المبالغةِ في صيغ المفردات في معجم العين
...Show More Authors

الحمد لله رب العالمين والصلاة والسلام على نبينا محمد صلى الله عليه وآله وصحبه وسلم اجمين.

وبعد..

فان موضوع هذا البحث هو (اسرار المبالغة في صيغ المفردات في معجم العين) ، وقد جعلت موضوع المبالغة في معجم العين ؛ لان كتاب العين يعد باكورة التأليف المعجمي عند العرب ، والطريقة التي فتقها الخليل بن احمد الفراهيدي في هذا المعجم عند العرب عُدت من اكبر المدارس المعجمية في مضمار التأليف ال

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 28 2017
Journal Name
Proceedings Of The 2017 Acm Conference On Innovation And Technology In Computer Science Education
Media Literacy as a By-Product of Collaborative Video Production by CS Students
...Show More Authors

Understanding, promoting, and teaching media literacy is an important societal challenge. STEM educators are increasingly looking to incorporate 21st century skills such as media literacy into core subject education. In this paper we investigate how undergraduate Computer Science (CS) students can learn media literacy as a by-product of collaborative video tutorial production. The paper presents a study of 34 third-year CS undergraduates who, as part of their learning, were each asked to produce three video tutorials on Raspberry Pi programming, using a collaborative video production tool for mobile phones (Bootlegger). We provide results of both quantitative and qualitative analysis of the production process and resulting video tutorials,

... Show More
View Publication
Scopus (20)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref