: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.
This study aims to show, the strength of steel beam-concrete slab system without using shear connectors (known as a non-composite action), where the effect of the friction force between the concrete slab and the steel beam has been investigated, by using finite element simulation.
The proposed finite element model has been verified based on comparison with an experimental work. Then, the model was adopted to study the system strength with a different steel beam and concrete slab profile. ABAQUS has been adopted in the preparation of all numerical models for this study.
After validation of the numerical models, a parametric study was conducted, with linear and non-linear Regression analysis. An equation re
... Show MoreConversation analysis has long been the concern of many linguists who work in the field of discourse analysis. In spite of the fact that there are many researches have been done in the field of short stories but up to the researcher knowledge the investigation of the selected short stories has not been studied yet. Hence, this paper aims at answering the following questions: what are the features of children’s short stories language and the differences between short stories of four years old and those of six years old. Hence, the devices used by the story tellers in reciting the short stories should be observed. Thus, the researcher has consulted the models presented by Johnson and Fillmore (2010) to show tenses and sentence str
... Show MoreThe development of Web 2.0 has improved people's ability to share their opinions. These opinions serve as an important piece of knowledge for other reviewers. To figure out what the opinions is all about, an automatic system of analysis is needed. Aspect-based sentiment analysis is the most important research topic conducted to extract reviewers-opinions about certain attribute, for instance opinion-target (aspect). In aspect-based tasks, the identification of the implicit aspect such as aspects implicitly implied in a review, is the most challenging task to accomplish. However, this paper strives to identify the implicit aspects based on hierarchical algorithm incorporated with common-sense knowledge by means of dimensionality reduction.
This research deals with the rhetoric purposes of the passive voice in the holy Quran. First, we put an introductory to the concept of the Quran language and its difference of the spoken Arabic language during the revelation period. Besides; we gave a brief about the structure passive voice form of Arabic language. Second, we explained the purposes of passive voice used in the holly Quran with sufficient examples, commentaries and clarifications about all the cases. Rhetoric purposes that we deals with are: concision, emphasize an idea, avoid using the subject because it is known and clear for all or because it is really unknown, etc. This part has contained the most important purposes for the use of passive voice in holy Quran. At the end
... Show MoreСтатья посвящена возможности использования в обучении русскому языку как иностранному лингвоориентированной методики для арабских студентов. Обосновывается термин «лингвоориентированная методика», предложенный В. Н. Вагнер, и на основе положений заявленной методики проводится сопоставление изучаемого (русского) языка с родным (арабским) языком обучающихся.
The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreData security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm in order to remove these weakness points, Will be generated dynamic substitution box (S-B
... Show MoreThis study focuses on the slab-beam interaction in one-way systems. In the context of this study, slab-beam interaction means how beam deflection can affect moment distribution in one-way slabs. This interaction is usually neglected in the traditional approximate analysis that is adopted in engineering practice and design codes. Slab positive moments have been considered as indicators on the accuracy of approximate methods, as they overestimate negative moments while underestimating positive moments.
After proposing of effecting parameters in slab-beam interaction including of panel length and width, beam dimensions, and slab thickness, Buckingham’s theorem has been adopted to transform the dimensional-mo
... Show MoreThe growth of social media is now utilized all over the world. In the past several years social media is used to communicate between person for information sharing and entertainment but now social media is also used for the hiring. This work collects data through questionnaire and online dataset on the recruitment process for three social media i.e. Facebook, Twitter, and LinkedIn. Pythagorean Fuzzy Relation (PFR) is an expansion of both Fuzzy Relationship and Fuzzy Intuitionist Relationship. The Pythagorean fuzzy set is a modern conceptual structure with greater capacity to deal with imprecision rooted in decision making. So we used this technique to identify a social media containing more number of positive respondents in recrui
... Show MoreGetting knowledge from raw data has delivered beneficial information in several domains. The prevalent utilizing of social media produced extraordinary quantities of social information. Simply, social media delivers an available podium for employers for sharing information. Data Mining has ability to present applicable designs that can be useful for employers, commercial, and customers. Data of social media are strident, massive, formless, and dynamic in the natural case, so modern encounters grow. Investigation methods of data mining utilized via social networks is the purpose of the study, accepting investigation plans on the basis of criteria, and by selecting a number of papers to serve as the foundation for this arti
... Show More