Preferred Language
Articles
/
jcoeduw-1325
Data-Driven Approach for Teaching Arabic as a Foreign Language: Eygpt
...Show More Authors

Corpus linguistics is a methodology in studying language through corpus-based research. It differs from a traditional approach in studying a language (prescriptive approach) in its insistence on the systematic study of authentic examples of language in use (descriptive approach).A “corpus” is a large body of machine-readable structurally collected naturally occurring linguistic data, either written texts or a transcription of recorded speech, which can be used as a starting-point of linguistic description or as a means of verifying hypotheses about a language.  In the past decade, interest has grown tremendously in the use of language corpora for language education. The ways in which corpora have been employed in language pedagogy can be divided into two main categories: indirect and direct application. In the former corpora are used in designing and developing the syllabuses, dictionaries, tests, and teaching materials, while later, corpus data are used for data-driven learning and what is known as grammar safari. So this research aims at employing corpus data in teaching Arabic grammar. Functional syntactic analysis of corpus is a must for this purpose, so Quranic corpus is the most appropriate one. In this paper,I examined the specification phenomenon (التمييز) in Quranic corpus and compared the descriptive and prescriptive approaches in teaching causative object as a grammatical phenomenon in Arabic.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Quadrupole Moment & Deformation Parameter for Even-Even 38Sr (A=76-102) Nuclide
...Show More Authors

View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Jul 10 2023
Journal Name
Journal Of Engineering
Theoretical Evaluation of Solar Assisted Desiccant Cooling System for a Small Meeting-Hall
...Show More Authors

The performance of a solar assisted desiccant cooling system for a meeting-hall located in the College of Engineering/University of Baghdad was evaluated theoretically. The system was composed of four components; a solar air heater, a desiccant dehumidifier, a heat exchanger and an evaporative cooler. A computer simulation was developed by using MATLAB to assess the effect of various design and operating conditions on the performance of the system and its components. The actual weather data on recommended days were used to assess the load variation and the system performance during those days. The radiant time series method (RTS) was used to evaluate the hourly variation of the cooling load. Four operation modes were employed for perform

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Swarm And Evolutionary Computation
A new multi-objective evolutionary framework for community mining in dynamic social networks
...Show More Authors

View Publication
Scopus (23)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
2023 Ieee 36th International Symposium On Computer-based Medical Systems (cbms)
Toward a Minimal sEMG Setup for Knee and Ankle Kinematic Estimation during Gait
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Education For Health
Determinants of social accountability for medical schools in Iraq: A qualitative case study
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Topology-Based Modularity and Modularity Density for Detecting Protein Complexes: A Comparative Study
...Show More Authors

     Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
A Recognition System for Subjects' Signature Using the Spatial Distribution of Signature Body
...Show More Authors

This investigation proposed an identification system of offline signature by utilizing rotation compensation depending on the features that were saved in the database. The proposed system contains five principle stages, they are: (1) data acquisition, (2) signature data file loading, (3) signature preprocessing, (4) feature extraction, and (5) feature matching. The feature extraction includes determination of the center point coordinates, and the angle for rotation compensation (θ), implementation of rotation compensation, determination of discriminating features and statistical condition. During this work seven essential collections of features are utilized to acquire the characteristics: (i) density (D), (ii) average (A), (iii) s

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 17 2023
Journal Name
Journal Of Engineering
A Simulation of Core Displacement Experiments for the Determination of the Relative Permeability
...Show More Authors

Computations of the relative permeability curves were made through their representation by two functions for wetting and nonwetting phases. Each function contains one parameter that controls the shape of the relative permeability curves. The values of these parameters are chosen to minimize an objective function, that is represented as a weighted sum of the squared differences between experimentally measured data and the corresponding data calculated by a mathematical model simulating the experiment. These data comprise the pressure drop across core samples and the recovery response of the displacing phase. Two mathematical models are constructed in this study to simulate incompressible, one-dimensional, two-phase flow. The first model d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref