Kurdish language multifunctional morphemes indicate the different functional morphological, syntactical, and semantic tasks of the morphemes. The present study discusses the multifunctional task of the Morpheme Le in Kurdish Language. The Morpheme Le has marginally been included in other studies, yet up to the present times, there has not been a research inclusively dedicated to thoroughly discuss and clarify its multifunctional aspects. The present study is divided into two chapters: Chapter one discusses the theoretical aspect of chapter two that is entirely concerned with the practical aspect of the morpheme Le. The first part of chapter one sheds light on the morphological aspect of the morpheme while part two discusses the concept of multifunction in Kurdish language including its concepts, types and characteristics. Chapter two is concerned with the practical aspect of the morpheme. Part one of chapter two describes the morphemes’ morphological aspect and part two explains its syntactical aspects. The conclusion sums up the study most important findings and the number of the academic references referred. پوختەی توێژینەوەکە: توێژینەوەکە لەژێر ناونیشانی (فرەئەرکی مۆرفیمەکان لە زمانی کوردیدا، مۆرفیمی (لە) بەنموونە)یە. ئەو ئەرکانە دەخاتەڕوو کە مۆرفیمی (لە) دەیگێڕێت. ئەم کارە بۆ چەمکی فرەئەرکی لە زمانی کوردیدا تەرخانکراوە، یەکێک لە مۆرفیمە پڕئەرکەکان دەخاتەبەرباس، کە ئەویش مۆرفیمەکانی (لە)یە. مۆرفیمی (لە) لە سەرچاوەی جیاوازدا کەم و زۆر باسکراوە، بەڵام توێژینەوەیەکی تایبەتی سەربەخۆی لەسەر نەنووسراوە، نووسرابێتیش بە قووڵی نەچوونەتە بنج و بناوانی و بە تێروتەسەلی لێیان نەکۆڵیوەتەوە. لە هەندێ کاری زانستیدا باسکراوه، بەڵام کارەکە تەنها بۆ ئەو مۆرفیمە تەرخاننەکراوە، بەڵکو لە میانەی ئەو کارەدا، مۆرفیمی (لە)ش هاتۆتە بەرباسکردن. لەم توێژینەوەیەدا هەوڵدراوە، تا بکرێت باس لە هەموو لایەنەکانی مۆرفیمی (لە) بکرێت لە ڕووی وشەسازی و ڕستەسازی و تەنانەت لەڕووی واتاشەوە و ئەرکە جیاجیاکانی دیاریبکرێت. مۆرفیمی (لە) یەکێکە لە مۆرفیمە چالاکەکانی زمانی کوردی و لە زۆربەی ئاستەکانی زماندا ئەرکی پێسپێردراوە. گرنگیی ئەم توێژینەوە لەوەدایە، بە پوختی و تێروتەسەلی تیشک دەخاتەسەر ئەرکە جیاجیاکانی مۆرفیمی (لە) لەڕووی وشەسازی و ڕستەسازی ...ەوە،هتد. سنووری توێژینەوەکەش لە هەردوو ئاستی وشەسازی و ڕستەسازیدا ئەنجامدراوە، جارجاریش پەنجە بۆ لایەنی واتاییش بردراوە. لەم توێژینەوەیەدا ڕێبازی وەسفی شیکاری-ڕەخنەیی بەکارهاتووە و نموونەکان وەرگیراون و شیکردنەوەیان بۆ کراوە و لەهەر شوێنێکیش هەڵە و کەموکووڕی بەدیکرابێ، سەرنج و ڕەخنە لە بارەیانەوە تۆمارکراوە. توێژینەوەکە بۆ دوو بەش، دابەشکراوه:
The study scrutinises intermingled relations between children literature and some ecological issues. Such interwoven relationships would be highly recommended to encourage children to explore and identify themselves with nature from early ages to avoid facing an extreme experience later on. The research limits its scope to two novels Suzanne Collins’ (1962) The Hunger Games trilogy (2003-2007) and William Golding’s (1911-1993) Lord of the Flies (1954), and both novels have no direct connections with Ecology and the Eco-consciousness, yet it offers an insightful description about Man’s experience with Nature. Moreover, it raises serious moral questions, raises awareness, heals wounds and suggests solutions for the problems th
... Show MoreA solar cell was manufactured from local materials and was dyed using dyes extracted from different organic plants. The solar cell glass slides were coated with a nano-porous layer of Titanium Oxide and infused with two types of acids, Nitric acid and Acetic acid. The organic dyes were extracted from Pomegranate, Hibiscus, Blackberry and Blue Flowers. They were then tested and a comparison was made for the amount of voltage they generate when exposed to sunlight. Hibiscus sabdariffa extract had the best performance parameters; also Different plants give different levels of voltage.
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreIt is an analytical study carried out at university of Basra using a sample included the dean ,assistants and managers of scientific dept. in the university for about(63)managers .The study aimed at discovering a model of crises management in the university.The researcher adopted the descriptive survey methodology.To achieve the objective of the study ,a questionnaire of (41)statements was developed covering five main variables like ,signal detection, prevention and preparedness, response, recovery and learning .The validity of the questionnaire was done by a group of referees .Its stability was determined by Cronbach,s Alfa .The questionnair,s stability coefficient was(0.
... Show MoreIn this paper, an approximate solution of nonlinear two points boundary variational problem is presented. Boubaker polynomials have been utilized to reduce these problems into quadratic programming problem. The convergence of this polynomial has been verified; also different numerical examples were given to show the applicability and validity of this method.
The global food supply heavily depends on utilizing fertilizers to meet production goals. The adverse impacts of traditional fertilization practices on the environment have necessitated the exploration of new alternatives in the form of smart fertilizer technologies (SFTs). This review seeks to categorize SFTs, which are slow and controlled-release Fertilizers (SCRFs), nano fertilizers, and biological fertilizers, and describes their operational principles. It examines the environmental implications of conventional fertilizers and outlines the attributes of SFTs that effectively address these concerns. The findings demonstrate a pronounced environmental advantage of SFTs, including enhanced crop yields, minimized nutrient loss, improved nut
... Show More