Preferred Language
Articles
/
jcoeduw-1325
Data-Driven Approach for Teaching Arabic as a Foreign Language: Eygpt
...Show More Authors

Corpus linguistics is a methodology in studying language through corpus-based research. It differs from a traditional approach in studying a language (prescriptive approach) in its insistence on the systematic study of authentic examples of language in use (descriptive approach).A “corpus” is a large body of machine-readable structurally collected naturally occurring linguistic data, either written texts or a transcription of recorded speech, which can be used as a starting-point of linguistic description or as a means of verifying hypotheses about a language.  In the past decade, interest has grown tremendously in the use of language corpora for language education. The ways in which corpora have been employed in language pedagogy can be divided into two main categories: indirect and direct application. In the former corpora are used in designing and developing the syllabuses, dictionaries, tests, and teaching materials, while later, corpus data are used for data-driven learning and what is known as grammar safari. So this research aims at employing corpus data in teaching Arabic grammar. Functional syntactic analysis of corpus is a must for this purpose, so Quranic corpus is the most appropriate one. In this paper,I examined the specification phenomenon (التمييز) in Quranic corpus and compared the descriptive and prescriptive approaches in teaching causative object as a grammatical phenomenon in Arabic.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 28 2024
Journal Name
Journal Of Physical Education
The effect of a psychological counselling approach on cognitive load and mental fatigue among young 110-meter hurdles athletes
...Show More Authors

The research aimed to identify and build two specialized scales for cognitive load and mental stress and to identify the level of each of them among 110-meter steeplechase runners among youth, and to prepare a psychological counseling approach to reduce the level of cognitive load and mental stress among 110-meter steeplechase runners among youth, so that the two research hypotheses are that there are differences. There are statistically significant differences between the results of the pre- and post-tests of the experimental group in measuring cognitive load. There are statistically significant differences between the results of the pre- and post-tests of the experimental group in measuring mental stress. The experimental method w

... Show More
View Publication
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Modis Satellite Data Evaluation for Detecting the Dust Storm Using Remote Sensing Techniques Over Iraq
...Show More Authors
Abstract<p>The phenomena of Dust storm take place in barren and dry regions all over the world. It may cause by intense ground winds which excite the dust and sand from soft, arid land surfaces resulting it to rise up in the air. These phenomena may cause harmful influences upon health, climate, infrastructure, and transportation. GIS and remote sensing have played a key role in studying dust detection. This study was conducted in Iraq with the objective of validating dust detection. These techniques have been used to derive dust indices using Normalized Difference Dust Index (NDDI) and Middle East Dust Index (MEDI), which are based on images from MODIS and in-situ observation based on hourly wi</p> ... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Correlation of Penetration Rate with Drilling Parameters For an Iraqi Field Using Mud Logging Data
...Show More Authors

This paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.

View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Matec Web Of Conferences
Assessing the performance of commercial Agisoft PhotoScan software to deliver reliable data for accurate3D modelling
...Show More Authors

3D models delivered from digital photogrammetric techniques have massively increased and developed to meet the requirements of many applications. The reliability of these models is basically dependent on the data processing cycle and the adopted tool solution in addition to data quality. Agisoft PhotoScan is a professional image-based 3D modelling software, which seeks to create orderly, precise n 3D content from fixed images. It works with arbitrary images those qualified in both controlled and uncontrolled conditions. Following the recommendations of many users all around the globe, Agisoft PhotoScan, has become an important source to generate precise 3D data for different applications. How reliable is this data for accurate 3D mo

... Show More
View Publication
Scopus (22)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Wed Oct 09 2019
Journal Name
Journal Of The College Of Education For Women
Silence as a Means of Communication in Harold Pinter’s The Caretaker
...Show More Authors

Harold Pinter’s The Caretaker(1959) clearly portrays a lack of communication among the characters of the play which refers to the condition of modern man. This failure of communication led Harold Pinter to use a lot of pauses and silences in all the plays he wrote instead of words. Samuel Beckett preceded Pinter in doing so in his plays and one way to express the bewilderment of modern man during the 20th century is through the use of no language in the dramatic works. Language is no more important to modern man; instead, he uses silence to express his feelings. Silence is more powerful than the words themselves. That’s why long and short pauses can be seen throughout all Pinter’s plays.

In this play, th

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 02 2025
Journal Name
Applied Computing And Informatics
WisdomModel: convert data into wisdom
...Show More Authors

Scopus (3)
Scopus
Publication Date
Thu Oct 01 2015
Journal Name
Al-academy
Power of language and carriers meaning in communication discourse: كاظم مؤنس عزيز
...Show More Authors

It reveals speech communication whether it is legible audible or visible on a comprehensive formula inhabited open language on the modalities for reporting cases of the source say, making communication cognitive processes, is not to produce arguments as it is about the generation of the content of communication, so the contact of any kind remains practice for the cognitive action by the language in which it operates as a way agreed to their units between the poles of communication circle in the framework of a certain socio-cultural context, and that becomes the basis of the text of the message external referrals, making it feasible for multiple readings in semantic dimensions and deliberative

 
... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Secure E-voting authentication system employing biometric technology, Crypto-Watermarking Approach and blockchain technology: A Review
...Show More Authors

Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or

... Show More
View Publication
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iosr Journal Of Computer Engineering (iosr-jce)
A New Approach to DNA, RNA, and Protein Motifs Templates Visualization and Analysis via Compilation Technique
...Show More Authors

Motifs template is the input for many bioinformatics systems such codons finding, transcription, transaction, sequential pattern miner, and bioinformatics databases analysis. The size of motifs arranged from one base up to several Mega bases, therefore, the typing errors increase according to the size of motifs. In addition, when the structures motifs are submitted to bioinformatics systems, the specifications of motifs components are required, i.e. the simple motifs, gaps, and the lower bound and upper bound of each gap. The motifs can be of DNA, RNA, or Protein. In this research, a motif parser and visualization module is designed depending on a proposed a context free grammar, CFG, and colors human recognition system. GFC describes the m

... Show More
Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Pharmacological Research
Resveratrol-mediated attenuation of superantigen-driven acute respiratory distress syndrome is mediated by microbiota in the lungs and gut
...Show More Authors

View Publication Preview PDF
Scopus (59)
Crossref (55)
Scopus Clarivate Crossref