This study addresses the issue of academic writing in English by comparing pragmatic argumentation in the writing of 40 graduate students studying at Iraqi universities (SSIU) with the writing of 40 graduate students studying at American universities (SSAU). In these 80 theses, six selected aspects of academic writing were analyzed: (a) paragraph structure, (b) length and construction of sentences, (c) organization of information in sentences, (d) vocabulary, (e) topic sentences, and (f) discourse markers. This study seeks to go beyond the traditional and often onedimensional analysis of pragmatics of argumentation in English academic writing to distinguish and describe different aspects of academic writing and their results when used by EFL graduate students and graduate students coming from English-speaking countries. The quantitative analysis of the six selected aspects of academic mentioned above begins with a brief definition and is followed by frequency information from corpus analysis in the corpora. I analyze the selected data with a corpus-based approach and pragmatic theories that are proposed in Chapter Two to see if the results answer the research questions that are proposed in Chapter One. Learners of English who reached the postgraduate level of study should have awareness of the pragmatic aspects involved in writing and reporting academic research. These aspects are, according to their importance, topicality, organization of information, and paragraph structure. Other aspects can serve as an auxiliary function that can help presenting the major aspects above in better manner. These aspects are: length and construction, organization of information, and vocabulary. This study has reached a point at which a conclusion can be hypothesized and conducted. The full observation of these conclusions made the researcher able to suggest recommendations for further such studies.
This study examines the vibrations produced by hydropower operations to improve embankment dam safety. This study consists of two parts: In the first part, ANSYS-CFX was used to generate a three-dimensional (3-D) finite volume (FV) model to simulate a vertical Francis turbine unit in the Mosul hydropower plant. The pressure pattern result of the turbine model was transformed into the dam body to show how the turbine unit's operation affects the dam's stability. The upstream reservoir conditions, various flow rates, and fully open inlet gates were considered. In the second part of this study, a 3-D FE Mosul dam model was simulated using an ANSYS program. The operational turbine model's water pressure pattern is conveyed t
... Show Moreبرز في بداية القرن الماضي اهتمام الباحثين في بعض دول العالم بجمع ودراسة الارث الموسيقي لشعوبهم من خلال ما اكتشفوه من دور لهذه الدراسات في تحديد الهوية الموسيقية لمبتكري ومؤدي ومتلقي هذا الارث .وقد قام كثير من الدول العالم وخصوصا في اوربا وامريكا بانشاء مراكز بحثية خاصة تعنى بجمع وحفظ وتصنيف وتحليل مواد ارثهم الشعبي ومن ثم تحديد سماته وخصائصه الموسيقيةاما في العراق وبرغم تعدد وتنوع اشكال التراث والموروث ال
... Show Moreالحمد لله رب العالمين والصلاة والسلام على نبينا محمد صلى الله عليه وآله وصحبه وسلم اجمين.
وبعد..
فان موضوع هذا البحث هو (اسرار المبالغة في صيغ المفردات في معجم العين) ، وقد جعلت موضوع المبالغة في معجم العين ؛ لان كتاب العين يعد باكورة التأليف المعجمي عند العرب ، والطريقة التي فتقها الخليل بن احمد الفراهيدي في هذا المعجم عند العرب عُدت من اكبر المدارس المعجمية في مضمار التأليف ال
... Show MoreUnderstanding, promoting, and teaching media literacy is an important societal challenge. STEM educators are increasingly looking to incorporate 21st century skills such as media literacy into core subject education. In this paper we investigate how undergraduate Computer Science (CS) students can learn media literacy as a by-product of collaborative video tutorial production. The paper presents a study of 34 third-year CS undergraduates who, as part of their learning, were each asked to produce three video tutorials on Raspberry Pi programming, using a collaborative video production tool for mobile phones (Bootlegger). We provide results of both quantitative and qualitative analysis of the production process and resulting video tutorials,
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More