This study aims to reveal the similarities and differences between Iraqi and Malay university learners and their genders in producing the supportive moves of criticism. To this end, 30 Iraqi and 30 Malay university learners have participated in this study. A Discourse Completion Test (DCT) and a Focus Group Interview (FGI) are conducted to elicit responses from the participants. Nguyen’s (2005) classification of criticism supportive moves is adapted to code the data. The data are analysed qualitatively and quantitatively. Overall, the findings unveil that both groups use similar categories of supportive moves, but Iraqis produce more of these devices than Malays in their criticisms. Although both females and males of both groups use id
... Show MoreIn the present paper, the researcher attempts to shed some light on the objective behind inserting some Qur'anic verses by Al-Zahraa (Peace Be Upon Her) in her revered speech. Besides, it tries to investigate the hidden meaning of these verses and to study them in the light of pragmaticreferences. This task is supported by Books of Tafseer as well as the books that explained this speech to arrive at its intended meaning. It is possible say that this is astep towards studying speeches of 'Ahlul Bayt' (People of the Prophet's household) in terms of modern linguistic studies, as well as employing modern methods to explore the aesthetic values of these texts.
The need for detection and investigation of the causes of pollution of the marshes and submit a statistical study evaluated accurately and submitted to the competent authorities and to achieve this goal was used to analyze the factorial analysis and then obtained the results from this analysis from a sample selected from marsh water pollutants which they were: (Electrical Conductivity: EC, Power of Hydrogen: PH, Temperature: T, Turbidity: TU, Total Dissolved Solids: TDS, Dissolved Oxygen: DO). The size of sample (44) sites has been withdrawn and examined in the laboratories of the Iraqi Ministry of Environment. By illustrating SPSS program) the results had been obtained. The most important recommendation was to increase the pumping of addit
... Show Morethis research aims at a number of objectives including Developing the tax examination process and raise its efficiency without relying on comprehensive examination method using some statistical methods in the tax examination and Discussing the most important concepts related to the statistical methods used in the tax examination and showing its importance and how they are applied. the research represents an applied study in the General Commission of taxes. In order to achieve its objectives the research has used in the theoretical side the descriptive approach (analytical), and in the practical side Some statistical methods applied to the sample of the final accounts for the contracting company (limited) and the pharmaceutical industry (
... Show MoreSeveral specimens of the avocet, Recurvirostra avocetta L. are found infected with
Himantocestus gigantivcus sp. nov. ( Cestoda , Diploposthidae) . This cestode is related to H.
blanksoni Ukoli 1965 but easily differentiated from it in having longer and wider strobila,
larger size of testes but lesser in number, cirrus situated in the middle of mature segment
histead of anterior third and slightly posterior to the middle in gravid segment instead of the
middle , ovary and vitelline gland are larger , and the uterus has more branches.
A survey of haemoproteids among the eight species of Iraq rallids were carried out in the
middle, south, and west of Iraq. Two haemoproteods were recorded, Haeomproteus porzanae
(Galli-Valerio, 1907) as a new record for Iraq and the new species H. baghdadensis described
from Fulica atra L. collected in the middle of Iraq.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More