The exchanges in various fields,like economics, science, culture, etc., have been enhanced unceasingly among different countries around the world in the twenty-first century, thus, the university graduate who masters one foreign language does not meet the need of the labor market in most countries.So, many universities began to develop new programs to cultivate students who can use more foreign languages to serve the intercultural communication. At the same time, there is more scientific research emerged which is related to the relationship between the second and third languages. This humble research seeks to explain the relevant concepts and analyze the real data collected from Shanghai International Studies University in China, to explore this relationship transparently in front of readers and provide recommendations for non-native speakers,especially Chinese learners. Additionally, as a sample study, it aims to serve other researchers and future studies as well.The research results will be produced according to the quantitative and qualitative analyses at the same timeto guarantee the objectivity and validity of the data. As for the part of the qualitative analysis, the paper will explain some related concepts generated in the western world, including their characteristics, benefits, and differences. As for the part of the quantitative analysis, it will refer to the statistics program SPSS. Then, it will produce relevant data with drawings and tables. Lastly, it will clarify the meanings of those data and the relationships among them.
يهدف هذا البحث إلي معرفة معنى اللغة وتجلياتها في نتاجات الاديب الإسرائيلي الأكثر جدلا في القرن العشرين، إلا وهو الاديب "موشيه سيملانسكي". فقد طغت صورة العربي في الكثير من أعماله الأدبية وتبوات مكانا واضحا، وكانت النظرة تجاهه، نظرة واضحة أيضا، فصورته لم تتغير بتغير الظروف والاتفاقيات، بشكل يتناسب وهذه الظروف، وإنما بقيت تراوح مكانها، ولم تتبدل بنظرة احترام على الأقل، بل على العكس من ذلك، فهناك بعض المطالبات
... Show MoreComputational linguistics is a modern branch of linguistics concerned with computer processing of natural languages. It makes computer as human brain simulate to human mind to understand language endoscopy and application. It stems from the use of computers to create programs and information systems that help the user to solve linguistic issues such as translation, analysis, parsing, and others This research seeks to show the employability of Arabic grammar, especially the past tense of it, in the light of this theory The study made use of the computer program (Madamera) to apply its samples of past phrasal verbs, In its methodology
يتناول هذا البحث موضوع (( فعل الامر في صيغة المبني للمجهول في اللغة الاكدية )) وهو يتعلق بقواعد اللغة الاكدية , وقد تضمن هذا البحث مقدمة وشقين : صيغة المبني للمجهول وفعل الامر. اما ما يخص المقدمة فقد شملت تعريف الفعل وانقساماته حسب قوة احرفه , الجذر , المعنى , والفاعل , كما تضمنت المقدمة أيضا الحديث عن الصيغ الفعلية الرئيسة الأربعة التي يتألف الفعل الاكدي منها إضافة الى الصيغ الثانوية التي تتضمنها الصيغ الرئيسة . و
... Show MoreAraştırmamın adı: Türkçe'de –madan, -meden Ulaç Ekinin Yazılışı ve Kullanılışıdır.
Ulaçlar, kişi ve zaman kavramı olmadan temel cümlenin yada yan cümlenin yüklemini niteleyen, cümlede genellikle zarf tümleci olarak görev yapan fiilimsilerdir. İkinci bir görevleri yardımcı fiillerle birlikte kullanılarak birleşik fiiller kurmak olan ulaçlar, cümlede bağlaç görevinde kullanılabilirler, ve birleşik cümleler kurabilirler. Bazı ulaç ekleri zarf, edat gibi kalıcı sözcük yapımında da kullanılırlar.
Bu araştırmada Orhun Türkçesi'nde başlayıp Türkiye Türkçesine kadar uzanan tarihi dönemlere ait eserlerden –m
... Show MoreSince her early beginning in 1974 in her novel "Les armoires vides", Annie Ernaux writing about life in all its various aspects remained her main goal. This novel gave the earliest signals of what would happen later on in her literary career. Indeed, her works showed abilities of echoing reality, her sufferance and experiences via the use of simple and clear language. Add to this, her writings are to be viewed as an expression of deep felt journey, and a continuous search due to the consequent changes coming out of her identity.
We try here to give an answer to the question about writing as to whether being, to Ernaux herself, a need for the search about her social and feminist identity, or a pure literary work
... Show MoreThe foreign policy of china is considered an important subject generally, in addition its very significant towards the Middle East specifically. It is the most valued topic, that needs deep academic investigations in order to identify the important factors causes and its consequences, this kind of research provides a proper understanding to the researchers and politicians, it will prove the reasons for China's with the impact to the region, the rivalry with the United States in the coming years
Abstract The goal of current study was to identify the relationship between addiction of self-images (Selfie) and personality disorder of narcissus, and the difference of significance the relationship between addiction self-images (selfie) and personality disorder narcissus at students of Mustansiriya university, addiction self- images (selfie) defined: a photograph that one has taken of oneself, typically one taken with a smartphone or webcam and shared via social media, edit and down lowed to social networking sites, and over time, the replacement of normal life virtual world, which is accompanied by a lack of a sense of time, and the formation of repeated patterns increase the risk of social and personal problems. To achieve the goals
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreObjectives : This study was seeks to determine the IgG and IgM in serum mothers and their babies of Iraqi patient suffering from congenital anomalies toward some microorganisms such as Cytomegalovirus (CMV), Congenital toxoplasmosis , Congenital rubella and Genital herpes simplex virus (HSV) correlated with age and babies gender the sample was collected from AL- Alwayia hospital for children / Baghdad . Methodology : Fifth blood sample have been collected from mothers and their babies suffering from congenital anomalies to detection IgG and IgM of some viruses including as Cytomegalovirus (CMV), congenital tox