Native speakers of English from different parts of the world have different accents,but the differences of accents are mainly the result of differences in the sound of vowels and consonants . The actual use of all these sounds in combination leads the speaker to produce a number of segments which only appear on the production level and realized on the perceptual one . RP pronunciation represents the teachable variety in all Iraqi universities because it is the most acceptable and understandable accent all over the world and not only in South East London ..The structure of the English syllable in RP pronunciation is influenced by the appearance of certain allophones especially aspiration and glottalization which ch
... Show MoreThe alternating direction implicit method (ADI) is a common classical numerical method that was first introduced to solve the heat equation in two or more spatial dimensions and can also be used to solve parabolic and elliptic partial differential equations as well. In this paper, We introduce an improvement to the alternating direction implicit (ADI) method to get an equivalent scheme to Crank-Nicolson differences scheme in two dimensions with the main feature of ADI method. The new scheme can be solved by similar ADI algorithm with some modifications. A numerical example was provided to support the theoretical results in the research.
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreAerial manipulation of objects has a number of advantages as it is not limited by the morphology of the terrain. One of the main problems of the aerial payload process is the lack of real-time prediction of the interaction between the gripper of the aerial robot and the payload. This paper introduces a digital twin (DT) approach based on impedance control of the aerial payload transmission process. The impedance control technique is implemented to develop the target impedance based on emerging the mass of the payload and the model of the gripper fingers. Tracking the position of the interactional point between the fingers of gripper and payload, inside the impedance control, is achieved using model predictive control (MPD) approach.
... Show MoreThe aim of this research is to know the effect of two strategies of active learning, the five fingers and traffic signals, on the first grade intermediate level student's achievement and personal intelligence. The research sample was chosen from the Al- Mansour intermediate school for boys, including (101) students divided into three groups chosen randomly which represented the first experimental group (32) students, the second experimental group (34) students, and the control group (33) students. To achieve the research aims, the research prepared a physics achievement test containing (26) items, and a personal intelligence test containing (20) items. The psychometric characteristics, of the tests were checked up the following results were
... Show MoreThe research aims to know the impact of the innovative matrix strategy and the problem tree strategy in teaching mathematics to intermediate grade female students on mathematical proficiency. To achieve the research objectives, an experimental approach and a quasi-experimental design were used for two equivalent experimental groups. The first is studied according to the innovative matrix strategy, the second group is studied according to the problem tree strategy. The research sample consisted of (32) female students of the first intermediate grade, who were intentionally chosen after ensuring their equivalence, taking into several factors, most notably (chronological age, previous achievement, and intelligence test). The research tools con
... Show MoreLearn new methods of teaching mathematics contribute to raising the level of pupils to acquire mathematical concepts primary stage
Attempt advancement in the level of mathematics teaching for the better through the use of modern teaching strategies. The research aims at the progress in the acquisition of mathematical concepts schoolgirls after subjecting the fourth grade to teach in active learning strategies, the number of research sample (60) schoolgirl, by (30) schoolgirl experimental group and 30 pupils of the control group. Clear from the results shown the presence of a statistically significant difference between the acquisition of concepts of schoolgirls two groups (experimental and control) for the benefit of pupils of the exp
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show More