Preferred Language
Articles
/
JRd2uI0BVTCNdQwC7Rop
Request Constructions in Classical Arabic versus Modern Arabic: A Corpus-based Study
...Show More Authors

The present study aims to investigate the various request constructions used in Classical Arabic and Modern Arabic language by identifying the differences in their usage in these two different genres. Also, the study attempts to trace the cases of felicitous and infelicitous requests in the Arabic language. Methodologically, the current study employs a web-based corpus tool (Sketch Engine) to analyze different corpora: the first one is Classical Arabic, represented by King Saud University Corpus of Classical Arabic, while the second is The Arabic Web Corpus “arTenTen” representing Modern Arabic. To do so, the study relies on felicity conditions to qualitatively interpret the quantitative data, i.e., following a mixed mode method. The findings of the present study show that request constructions vary in terms of occurrence between Classical Arabic and Modern Arabic. In Classical Arabic, (/laa/ لا) of prohibition is the most frequent construction, which is rarely used in the Web corpus where the command in the form of (/lam/لام + verb) is the most commonly emerging one, which is, in turn, seldom employed in the former corpus. The vocative (/ya/ يا) is the second most frequent construction in Classical Arabic, whilst the interrogative (/hel/ هل) emerged in the other genre. The third most common request construction is the interrogative (/hel/ هل) in Classical Arabic, but the vocative (/ya/ يا) is used in Modern Arabic. Nonetheless, some of these constructions fail to accomplish two or more conditions and hence are regarded as infelicitous requests. Such infelicitous constructions serve other functions than requests, such as negation, exclamation, and sarcasm.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Civil Engineering Journal
Calibration of a New Concrete Damage Plasticity Theoretical Model Based on Experimental Parameters
...Show More Authors

The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop

... Show More
Scopus (29)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Journal Of Engineering
A Cognition Path Planning with a Nonlinear Controller Design for Wheeled Mobile Robot Based on an Intelligent Algorithm
...Show More Authors

This paper presents a cognition path planning with control algorithm design for a nonholonomic wheeled mobile robot based on Particle Swarm Optimization (PSO) algorithm. The aim of this work is to propose the circular roadmap (CRM) method to plan and generate optimal path with free navigation as well as to propose a nonlinear MIMO-PID-MENN controller in order to track the wheeled mobile robot on the reference path. The PSO is used to find an online tune the control parameters of the proposed controller to get the best torques actions for the wheeled mobile robot. The numerical simulation results based on the Matlab package show that the proposed structure has a precise and highly accurate distance of the generated refere

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 13 2018
Journal Name
Al-adab Journal
A Victim of "Love": A Study of Beatrice’s Character in "Rappaccini's Daughter" By Nathanial Hawthorne
...Show More Authors

Nathaniel Hawthorne (1804-1864) has been widely known for his special interest in the female characters. In many of his novels, he narrates the conditions, values, and the institutions that surround and control the life of women, leading them to be victims. In “Rappaccini’s Daughter” (1844), the heroine, Beatrice is created to be victimized by her loved ones (her father and lover). This paper focuses on the term “victim,” it shows its aspects through the development of Beatrice’s character. The paper also studies a female character in the male-dominated society, to show the cruelty done to her, and how she is considered to be a second rate person, who is unable to live normally, or at least to save herself from dea

... Show More
View Publication
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
A Study in Tess of the D’Urbervilles as A Call for Liberal Education for Women
...Show More Authors

Amongst the literary writers who used their art to direct the attention towards the issue of woman and her rights in a proper life is the English poet and novelist Thomas Hardy (1840-1928), who has been praised for his “openness to the feminine principle” 1 as Irving Howe put it. Hardy’s wide readings have changed his way of dealing with and thinking about so many critical issues which started to float on the surface of the English society during the mid and late of the 19th century. His readings for a number of writers, who seem of huge impact on his writings as he later admits that – “[his] pages show harmony of view with

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 15 2021
Journal Name
Arab World English Journal
How Impoliteness Is Portrayed in a School Context: The Marva Collins as a Case Study
...Show More Authors

The present study attempts to examine verbal/nonverbal impoliteness in the classroom interaction and outside it in one of the movies, namely, The Marva Collins. Impoliteness, which is significantly studied within pragmatics, is a negative attitude towards particular behaviors. It always presumes to have emotional concerns for at least one participant who has caused it. This study is an attempt to examine verbal/nonverbal impoliteness in The Marva Collins movie. The study aims to investigate the different types of impoliteness strategies used in the four selected scenes and find out whether the speaker’s status has anything to do with the types of impoliteness. Besides, the functions performed are also examined by following a qual

... Show More
View Publication Preview PDF
Crossref (2)
Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Random Number Generation for Quantum Key Distribution Systems Based on Shot-Noise Fluctuations in a P-I-N Photodiode
...Show More Authors

A simple setup of random number generator is proposed. The random number generation is based on the shot-noise fluctuations in a p-i-n photodiode. These fluctuations that are defined as shot noise are based on a stationary random process whose statistical properties reflect Poisson statistics associated with photon streams. It has its origin in the quantum nature of light and it is related to vacuum fluctuations. Two photodiodes were used and their shot noise fluctuations were subtracted. The difference was applied to a comparator to obtain the random sequence.

View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Organizational Tactics An Approach to Strategic Agility A field study in a sample of mobile operators in Iraq
...Show More Authors

The current research dealt with the issue of organizational skillfulness as an entry point to reach strategic agility. The study has been tested in Iraq's mobile operators - Asia Cell, Zain Iraq and Cork Telecom. The study was applied to a sample of (93) managers distributed at various levels of management (board members, general managers, commissioners, department managers, people managers, unit managers, office managers). The survey used the questionnaire as a key tool for collecting data and information as well as personal interviews. It has sought to test a number of hypotheses related to correlation and influence relationships between the variables of the study, in order to answer the questions related to the problem of stud

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Paraphilia in Iraq, a general sketch A study in the sex clinic, at Al-Rashad teaching mental hospital
...Show More Authors

Background; paraphilias were studied in the sex
clinic, at Al-Rashad teaching mental hospital, in the
years 2009-2010, a subject never touched before in the
field of psychiatry in Iraq.
Aims of the study :
1-to identify the prevalence of types and number of
paraphilias in those patients.
2-to study the relationship of paraphilias with
sociodemographic factors of the patients.
Patients and methods; using the diagnostic criteria of
DSM IV TR, 52 patients from the outpatient sex clinic
at Al-Rashad mental hospital, collected and studied (41
males and 11 females).
Results; the ratio of men to women was 3.7 : 1, the
majority of our sample was in the age range of 21-30
years (36.35%), with a limited

... Show More
View Publication Preview PDF