Preferred Language
Articles
/
EWE1bZkBdMdGkNqjGyf1
The Role of Nominalization in Social Media Discourse An English Corpus Based Analysis دور التعابير الاسمية في خطاب وسائل التواصل الاجتماعي : تحليل يعتمد البيانات المحوسبة في اللغة الانكليزية
...Show More Authors

The expansion of the social media environment has created its own linguistic realities which involve more colloquial communication and practical employment of language. This research focuses on nominalizations in detail, which are originally formed words that have been changed for a noun role. These nominalizations are examined within the context of Facebook posts. The research aims to discover the various nominalizations used and how often they appear in a large sample of data from Public Facebook Posts Corpora. Computational linguistics opened new fields of study and enabled researchers to study large amounts of data easily, making it easier to identify patterns. Two computational methods of identifying nominalization in a large dataset were tested and evaluated from different aspects. Additionally, machine learning analysis tools were conducted to determine how nominalization affects the complexity and readability of the texts. Accordingly, Flesch-Kincaid Grade Level and Flesch Readability results were studied to identify nominalizations’ effect on the texts. The results present a high density of verbal nominalizations indicating that there is a preference to refer to actions or processes in an abbreviated manner. Instead, the study also explores the semantic and functional properties of nominalizations, discovering their employment for emotions and opinions, focusing on the ideas and informal nature of Facebook. Despite what the readability formulas imply about the relation between nominalization density and text difficulty, the research does not discount the fact that these metrics have their shortcomings, especially when comprehending direct user understanding is not taken under consideration. In conclusion, this study adds to the current literature on nominalizations by identifying their role in the social media discourse and importing important knowledge on the progressive changes in online linguistic usage

Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 25 2025
Journal Name
Iet Networks
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Studies In Systems, Decision And Control
The Effect of Using an Accounting Information System Based on Artificial Intelligence in Detecting Earnings Management to Enhance the Sustainability of Economic Units
...Show More Authors

This research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Multiwavelet and Estimation by Interpolation Analysis Based Hybrid Color Image Compression
...Show More Authors

Nowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band  by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained

View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Applying A* Path Planning Algorithm Based on Modified C-Space Analysis
...Show More Authors

In this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Mon May 27 2024
Journal Name
Eureka: Physics And Engineering
Systematic development of an autonomous robotic car for fire-fighting based on the interactive design approach
...Show More Authors

Fire incidences are classed as catastrophic events, which mean that persons may experience mental distress and trauma. The development of a robotic vehicle specifically designed for fire extinguishing purposes has significant implications, as it not only addresses the issue of fire but also aims to safeguard human lives and minimize the extent of damage caused by indoor fire occurrences. The primary goal of the AFRC is to undergo a metamorphosis, allowing it to operate autonomously as a specialized support vehicle designed exclusively for the task of identifying and extinguishing fires. Researchers have undertaken the tasks of constructing an autonomous vehicle with robotic capabilities, devising a universal algorithm to be employed

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages
Cultural Diversity in Native and Non-Native Speakers of English Communication
...Show More Authors

With the advancement of technology ,the study of cross-cultural communication via on line has become an important and researchable topic in linguistic theory and its applications.The aims of this study are two- fold (a) exploring the influence of cultural diversity on on-line interaction between American native speakers (NSs) and Iraqi non-native speakers (NNSs) of English which, together with other factors might potentially lead to what Thomas(1983) calls "pragmatic failure" (PF), a main cause of communication breakdowns and (b) specifying which type of PF occurs more frequently between the two groups along with the reasons behind such failures. To achieve these objectives , a number of online chats conducted between

... Show More
View Publication
Crossref
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
Cultural Diversity in Native and Non-Native Speakers of English Communication
...Show More Authors

With the advancement of technology ,the study of  cross-cultural communication via on line  has become  an important and researchable topic in linguistic theory and its applications.The  aims of  this study are two- fold (a)  exploring the influence of cultural diversity on on-line interaction between American  native  speakers (NSs) and  Iraqi non-native speakers (NNSs) of English which, together with other factors might potentially lead to what Thomas(1983) calls  "pragmatic failure" (PF), a main cause of communication breakdowns  and (b) specifying  which  type of PF  occurs more frequently between the two groups along with the reasons behind such failures. To achie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Rigeo
A Stylistic Study of Vocative Particles in Selected English Literary Texts
...Show More Authors

A vocative expression can be defined as an expression of direct address where the participant identity is set forth explicitly within a sentence. This study aims at showing how the vocative particles are used in literally texts, namely in the short story “The Garden Party" written by Kathryn Mansfield and identifying the forms of these vocative particles as used by the characters along with the functions of these vocative particles. For the analysis of vocative forms, the researcher used Quirk and Greenbaum (1973) model. Functionally, the data were analyzed based on Quirk et al. (1985) model. However, the results of this study shows that the characters in “The Garden Party” short story used various forms of vocative particles and

... Show More
View Publication Preview PDF