Preferred Language
Articles
/
3RYlS4wBVTCNdQwCAPoI
The Multifunctional Morphemes in Kurdish Language the Morpheme Le as an example
...Show More Authors

Kurdish language multifunctional morphemes indicate the different functional morphological, syntactical, and semantic tasks of the morphemes. The present study discusses the multifunctional task of the Morpheme Le in Kurdish Language. The Morpheme Le has marginally been included in other studies, yet up to the present times, there has not been a research inclusively dedicated to thoroughly discuss and clarify its multifunctional aspects. The present study is divided into two chapters: Chapter one discusses the theoretical aspect of chapter two that is entirely concerned with the practical aspect of the morpheme Le. The first part of chapter one sheds light on the morphological aspect of the morpheme while part two discusses the concept of multifunction in Kurdish language including its concepts, types and characteristics. Chapter two is concerned with the practical aspect of the morpheme. Part one of chapter two describes the morphemes’ morphological aspect and part two explains its syntactical aspects. The conclusion sums up the study most important findings and the number of the academic references referred. پوختەی توێژینەوەکە: توێژینەوەکە لەژێر ناونیشانی (فرەئەرکی مۆرفیمەکان لە زمانی کوردیدا، مۆرفیمی (لە) بەنموونە)یە. ‌ئەو ئەرکانە دەخاتەڕوو کە مۆرفیمی (لە) دەیگێڕێت. ئەم کارە بۆ چەمکی فرەئەرکی لە زمانی کوردیدا تەرخانکراوە، یەکێک لە مۆرفیمە پڕئەرکەکان دەخاتەبەرباس، کە ئەویش مۆرفیمەکانی (لە)یە. مۆرفیمی (لە) لە سەرچاوەی جیاوازدا کەم و زۆر باسکراوە، بەڵام توێژینەوەیەکی تایبەتی سەربەخۆی لەسەر نەنووسراوە، نووسرابێتیش بە قووڵی نەچوونەتە بنج و بناوانی و بە تێروتەسەلی لێیان نەکۆڵیوەتەوە. لە هەندێ کاری زانستیدا باسکراوه، بەڵام کارەکە تەنها بۆ ئەو مۆرفیمە تەرخاننەکراوە، بەڵکو لە میانەی ئەو کارەدا، مۆرفیمی (لە)ش هاتۆتە بەرباسکردن. لەم توێژینەوەیەدا هەوڵدراوە، تا بکرێت باس لە هەموو لایەنەکانی مۆرفیمی (لە) بکرێت لە ڕووی وشەسازی و ڕستەسازی و تەنانەت لەڕووی واتاشەوە و ئەرکە جیاجیاکانی دیاریبکرێت. مۆرفیمی (لە) یەکێکە لە مۆرفیمە چالاکەکانی زمانی کوردی و لە زۆربەی ئاستەکانی زماندا ئەرکی پێسپێردراوە. گرنگیی ئەم توێژینەوە لەوەدایە، بە پوختی و تێروتەسەلی تیشک دەخاتەسەر ئەرکە جیاجیاکانی مۆرفیمی (لە) لەڕووی وشەسازی و ڕستەسازی ...ەوە،هتد. سنووری توێژینەوەکەش لە هەردوو ئاستی وشەسازی و ڕستەسازیدا ئەنجامدراوە، جارجاریش پەنجە بۆ لایەنی واتاییش بردراوە. لەم توێژینەوەیەدا ڕێبازی وەسفی شیکاری-ڕەخنەیی بەکارهاتووە و نموونەکان وەرگیراون و شیکردنەوەیان بۆ کراوە و لەهەر شوێنێکیش هەڵە و کەموکووڕی بەدیکرابێ، سەرنج و ڕەخنە لە بارەیانەوە تۆمارکراوە. توێژینەوەکە بۆ دوو بەش، دابەشکراوه:

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Computers, Materials & Continua
An Optimal Method for Supply Chain Logistics Management Based on Neural Network
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
An Energy-Aware and Load-balancing Routing scheme for Wireless Sensor Networks
...Show More Authors

<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (11)
Scopus Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Topical 15% zinc sulfate solution is an effective therapy for feet odor
...Show More Authors

KE Sharquie, AA Noaimi, SD Hameed, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 15

View Publication
Publication Date
Wed Sep 07 2022
Journal Name
2022 Iraqi International Conference On Communication And Information Technologies (iiccit)
Construct an Efficient DDoS Attack Detection System Based on RF-C4.5-GridSearchCV
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Education Program on Youth's Awareness towards Household Waste Control
...Show More Authors

Objective: determine the effectiveness of an education program on youth's level of awareness towards
household waste control.
Methodology: A Quazi-experimental study was conducted. Non-probability (quota sample) of (80) young
persons is selected from Baghdad Governorate. They are divided into two equal groups of (40) subjects for the
study group which is exposed to the household waste control educational program. The remaining is the
control group which is not exposed to the educational program.
Results: The findings of the study indicated that youth of the study group have got benefits from the
implementation of the educational program towards household waste control and change has occurred to
their awareness tow

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2022
Journal Name
2022 International Conference On Data Science And Intelligent Computing (icdsic)
An improved Bi-LSTM performance using Dt-WE for implicit aspect extraction
...Show More Authors

In aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Islamic feminism is a discussion of paths for establishing an Islamic epistemology
...Show More Authors

If feminist philosophy in the context of feminist research focuses on how to produce an alternative knowledge and culture for women and forming anew awareness of their roles in the face of prevailing misconceptions then the topic of Islamic feminism is presented as a philosophical topic in the field of human knowledge to discuss how to produce an alternative knowledge of traditional knowledge prevailing in patriarchal societies to restore the balance of power and authority in the relationship between the sexes to create an effective feminist role in advocating for and defending womenś issues to achieve this Islamic feminism sought to establish an Islamic epistemology .

View Publication Preview PDF
Crossref
Publication Date
Sat Aug 31 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Credit Card Fraud Detection Using an Autoencoder Model with New Loss Function
...Show More Authors

View Publication
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Bat Algorithm Based an Adaptive PID Controller Design for Buck Converter Model
...Show More Authors

The aim of this paper is to design a PID controller based on an on-line tuning bat optimization algorithm for the step-down DC/DC buck converter system which is used in the battery operation of the mobile applications. In this paper, the bat optimization algorithm has been utilized to obtain the optimal parameters of the PID controller as a simple and fast on-line tuning technique to get the best control action for the system. The simulation results using (Matlab Package) show the robustness and the effectiveness of the proposed control system in terms of obtaining a suitable voltage control action as a smooth and unsaturated state of the buck converter input voltage of ( ) volt that will stabilize the buck converter sys

... Show More
View Publication Preview PDF
Crossref (1)
Crossref