Preferred Language
Articles
/
JRd2uI0BVTCNdQwC7Rop
Request Constructions in Classical Arabic versus Modern Arabic: A Corpus-based Study
...Show More Authors

The present study aims to investigate the various request constructions used in Classical Arabic and Modern Arabic language by identifying the differences in their usage in these two different genres. Also, the study attempts to trace the cases of felicitous and infelicitous requests in the Arabic language. Methodologically, the current study employs a web-based corpus tool (Sketch Engine) to analyze different corpora: the first one is Classical Arabic, represented by King Saud University Corpus of Classical Arabic, while the second is The Arabic Web Corpus “arTenTen” representing Modern Arabic. To do so, the study relies on felicity conditions to qualitatively interpret the quantitative data, i.e., following a mixed mode method. The findings of the present study show that request constructions vary in terms of occurrence between Classical Arabic and Modern Arabic. In Classical Arabic, (/laa/ لا) of prohibition is the most frequent construction, which is rarely used in the Web corpus where the command in the form of (/lam/لام + verb) is the most commonly emerging one, which is, in turn, seldom employed in the former corpus. The vocative (/ya/ يا) is the second most frequent construction in Classical Arabic, whilst the interrogative (/hel/ هل) emerged in the other genre. The third most common request construction is the interrogative (/hel/ هل) in Classical Arabic, but the vocative (/ya/ يا) is used in Modern Arabic. Nonetheless, some of these constructions fail to accomplish two or more conditions and hence are regarded as infelicitous requests. Such infelicitous constructions serve other functions than requests, such as negation, exclamation, and sarcasm.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Demand Priority in a Power System With Wind Power Contribution Load Shedding Scheme Based
...Show More Authors

The load shedding  scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy  resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind po

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Separation And Purification Technology
A comprehensive review on the use of Ti3C2Tx MXene in membrane-based water treatment
...Show More Authors

View Publication
Scopus (25)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Innovations in t-way test creation based on a hybrid hill climbing-greedy algorithm
...Show More Authors

<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Acquisition provisions in Islamic jurisprudence: A model - a comparative study
...Show More Authors

Acquisition provisions in Islamic jurisprudence

View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Under Different Priors &Two Loss Functions To Compare Bayes Estimators With Some of Classical Estimators For the Parameter of Exponential Distribution
...Show More Authors

المستخلص:

          في هذا البحث , استعملنا طرائق مختلفة لتقدير معلمة القياس للتوزيع الاسي كمقدر الإمكان الأعظم ومقدر العزوم ومقدر بيز في ستة أنواع مختلفة عندما يكون التوزيع الأولي لمعلمة القياس : توزيع لافي  (Levy) وتوزيع كامبل من النوع الثاني وتوزيع معكوس مربع كاي وتوزيع معكوس كاما وتوزيع غير الملائم (Improper) وتوزيع

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة بين الطريقة التقليدية Classical Method وطريقة تحليل الطيف Spectral Analysis لإيجاد ثابت التمهيد التكيفي عند وجود قيم شاذة Outlier Values
...Show More Authors

   In this paper , two method which deal with finding the optimal value for adaptive smoothing constant, are compared .This constant is used in adaptive Single Exponential Smoothing (ASES).

The comparing is between a method uses time domain and another uses frequency domain when the data contain outlier value for autoregressive model of order one AR(1) , or Markov Model, when the time series are stationary and non stationary with deferent samples .    

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 17 2022
Journal Name
Al–bahith Al–a'alami
(دراسة تحليلية): ( A field study )
...Show More Authors

The research aimed to identify the effects of the modern of technology on translating the media term from English language to Arabic. and try to identify the use of the impact of foreign media terminologies on the Arabic media term, and to know the effect of the translation process on Arabic media terminologies.

This research is considered an analytical study by using survey study for 111 items and the results for the study as following:

1.High percentage of the (use of foreign terms work to low the level of production) was (68.13%) and average 3.55

2.The percentage of (The multiplicity of translation of the foreign term into Arabic effects on the opinions and cognitive ideas of the Arab researcher and affects the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref