The majority of Iraqi translator-student have problems at two main levels: the conceptual level and the productive level. From different perspectives, such problems are either related to ‘language’ or to ‘cognition’. This binary view is an indication to the implicit and interchangeable relationship between language and cognition. The relationship between cognition language and translator starts with the first language and its effect on the Iraqi translators. Identifying the effect is the aim of the present study. It is hypothesized that Iraqi students are negatively influenced by the problems and weaknesses of first language schema. This reflects the major claim and later concludes that first language instruction in the Iraq
... Show MoreThe current works included morphological features study (vegetative and floral parts) for five species of the genus Silene L., S. ampullata, S. chlorifolia, S. colorata, S. conoidea and S. longipetala belong to the family Caryophyllaceae, samples were collected from various areas of northern Iraq. Confirmation in the description was on the most critical parts of the plant, including the shape of the leaves, length, and shape of the calyx tube and venation, the modification shapes of coronal scales petals and appendages, anther ornamentation and structures of pistils. Images enhanced the morphological characteristics under study. Information on the locations and dates of the collection
... Show MoreBN Rashid, Social Sciences, 2022
Due to the Geographical links, language is one of the multiple affects among Arabs and Turks. As the different studies demonstrate, Turkish contains many words derived from other languages, yet Arabic remains the language that has great affects on Turkish. Unlike Turkish language, Arabic is a derivative language that requires no suffixes. Thus, Arabic verbs are tuned into Turkish verbs by adding auxiliary verbs. The present study traces some of the Turkish compound words of Arabic roots with an explanation that shows the Auxiliary added to form the Turkish verb as found in the stories of Otman Chevek Sawy’s Like A voice in the Dark. The conclusion sums up the findings of the study illustrated by numbers.
Özet<
... Show MoreThe picture has taken a place that sometimes enables it to take precedence over media analysis، psychology، and political communication.
The image has the ability to influence to obtain persuasion، not only emotionally or
dramatically، but also on the level of commercial and political persuasion. In every
image، the intention of that persuasion is hidden.
It can be identified by a set of underlying dimensions such as vitality، social dominance، and confidence، for which a group of specific suggestions or movements، such
as a smile، the movement of hands، or the nature and way of looking with the eyes، is
established. The visual image often precedes its verbal counterpart in the proce
This study was conducted in the Department of Employment and Loans at the Ministry of Labor and Social Affairs to indicate the importance and impact of both the empowerment and the functional flexibility in evaluating the performance of the employees. To achieve the objectives of the study, the data was collected through a questionnaire form designed for this purpose based on previous studies. Data obtained for a significant evaluation of the relationship between the components of both the empowerment and the functional flexibility with the components of the evaluation and determining the degree of importance of each component of both the empowerment and functional flexibility for the components of the evaluation by the extractio
... Show MoreAbstract:
The distribution or retention of profits is the third decision among financial management decisions in terms of priority, whether at the level of theory or practice, as the issue of distribution or retention is multi-party in terms of influence and impact, as determining the optimal percentage for each component is still the subject of intellectual debate because these decisions are linked to the future of the organization and several considerations, The research focus on the nature of the policies followed by the Iraqi banking sector As the sample chosen by the intentional sampling method was represented by the Commercial Bank of
... Show MoreIn this work, the adsorption of crystal violet dye from aqueous solution on charcoal and rice husk has been investigated, where the impact of variable factors (contact time; the dosage of adsorbent, pH, temperature, and ionic strength) have been studied. It has been found that charcoal and rice husk have an appropriate adsorption limit with regards to the expulsion of crystal violet dye from fluid arrangements. The harmony adsorption is for all intents and purposes accomplished in 45 min for charcoal and 60 min for rice husk. The amount of crystal violet dye adsorbed (0.4 g of charcoal and 0.5 g of rice husk) increased with an increasing pH and the value of 11 is the best
... Show MoreThe current research aims to identify the level of strategic orientation and its dimensions (vision, mission, goals, and values) in the Iraqi National Security Service (INSS). The researchers followed the descriptive analytical approach as one of the forms of analysis and organized scientific interpretation to describe a specific phenomenon or problem, adopting the form questionnaire being the main source in collecting data and preparing for this. Based on the program of the Statistical Package of Social Sciences (SPSS 26) to analyze the data and come up with the final research results to identify the opinions of the intended sample on the subject of research, and the questionnaire of (20) paragraphs included the search variable, and was
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More