This research examines the phonological adaptation of pure vowels in English loanwords in Iraqi Arabic (IA). Unlike previous small-scale studies, the present study collected 346 loanwords through document review and self-observation, and then analyzed them using quantitative content analysis to identify the patterns of pure vowel adaptation involved in incorporating English loanwords into IA. The content analysis findings showed that most pure vowel adaptations in English loanwords in IA follow systematic patterns and may thus be attributed to specific characteristics of both L1 and L2 phonological systems. Specifically, the findings suggest that the IA output forms typically preserve the features of the input pure vowel to the maximum degree feasible by either converting input pure vowels to their direct IA counterparts or replacing them with their closest IA match.
Abstract
Nephrotoxicity is defined as rapid deterioration in kidney functions. It arises from direct exposure to drugs or their metabolites. Methotrexate is a famous chemotherapeutic drug with anti-inflammatory and immunosuppressive properties. A high-dose methotrexate-induced renal dysfunction can be life threatening. Cyanocobalamin, one of the forms of vitamin B12, acts as a coenzyme in the conversion of homocysteine to methionine in the cytosol, and the conversion of methylmalonyl-CoA to succinyl-CoA in the mitochondrion. This study is designed to examine the effect of cyanocobalamin in two different doses each co-administered with methotrexate at 20 mg/kg induced nephrotoxicity in rat
... Show MoreThe modification of hydrophobic rock surfaces to the water-wet state via nanofluid treatment has shown promise in enhancing their geological storage capabilities and the efficiency of carbon dioxide (CO2) and hydrogen (H2) containment. Despite this, the specific influence of silica (SiO2) nanoparticles on the interactions between H2, brine, and rock within basaltic formations remains underexplored. The present study focuses on the effect of SiO2 nanoparticles on the wettability of Saudi Arabian basalt (SAB) under downhole conditions (323 K and pressures ranging from 1 to 20 MPa) by using the tilted plate technique to measure the contact angles between H2/brine and the rock surfaces. The findings reveal that the SAB's hydrophobicity intensif
... Show MoreThis research delves into the realm of asphalt technology, exploring the potential of nano-additives to enhance traditional asphalt binder properties. Focusing on Nano-Titanium Dioxide (NT), Nano-Aluminum Oxide (NA), and Nano-Silica Oxide (NS), this study investigates the effects of incorporating these nanomaterials at varying dosages, ranging from 0% to 8%, on the asphalt binder’s performance. This study employs a series of experimental tests, including consistency, storage stability, rotational viscosity, mass loss due to aging, and rheological properties, to assess the impact of nano-additives on asphalt binder characteristics. The findings indicate a substantial improvement in the consistency of the asphalt binder with the add
... Show MoreHeart disease is a significant and impactful health condition that ranks as the leading cause of death in many countries. In order to aid physicians in diagnosing cardiovascular diseases, clinical datasets are available for reference. However, with the rise of big data and medical datasets, it has become increasingly challenging for medical practitioners to accurately predict heart disease due to the abundance of unrelated and redundant features that hinder computational complexity and accuracy. As such, this study aims to identify the most discriminative features within high-dimensional datasets while minimizing complexity and improving accuracy through an Extra Tree feature selection based technique. The work study assesses the efficac
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More