Preferred Language
Articles
/
jcoeduw-1631
Constructing Imminent Carcinogenic Attack in English and Arabic Scientific Discourse: A Corpus-Based Contrastive Study
...Show More Authors

Cancer is one of the critical health concerns. Health authorities around the world have devoted great attention to cancer and cancer causing factors to achieve control against the increasing rate of cancer. Carcinogens are the most salient factors that are accused of causing a considerable rate of cancer cases. Scientists, in different fields of knowledge, keep warning people of the imminent attack of carcinogens which are surrounding people in the environment and may launch their attack at any moment. The present paper aims to investigate the linguistic construction of the imminent carcinogen attack in English and Arabic scientific discourse. Such an investigation contributes to enhancing the scientists’ awareness of the linguistic conduct they follow in attracting people’s attention towards the risk of the approaching attack. The linguistic awareness also helps maintain better promotion of people’s pre-emptive responses that can reduce the potential for cancer cases. To achieve this aim, the paper adopts dual methodological procedures of qualitative and quantitative analyses. Cap’s (2013) proximization theory of threat and crisis construction is adopted for both qualitative and quantitative procedures. The mathematical calculations and statistical results for discourses in both languages are maintained by corpus linguistic analysis using Anthony’s (2019) software, AntConc. The paper has come up to certain conclusions that shed light on the similarities and differences in the construction of the imminent carcinogen attack in both languages. English scientific discourse has shown more reliance on temporal proximization to envisage the imminent attack of carcinogens against human bodies. Categories 1, 2, 3 and 5 are all more dominant in the English scientific discourse. However, both English and Arabic discourses show diversity in the density and employment of the lexico- grammatical tools (categories) that manifest the carcinogen attack.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Authority control and its role in uniting old arabic authors entries at the Central Library of the University of Baghdad and the Al-Mustansiriya: A Comparative Study
...Show More Authors

The research aims to identify the positives formulation entrances authors depending on the setting retaining the names of the authors of Arab veterans and cons of setting the entrances to Arab authors ancient depending on the nickname by desktop diligence without reference to a setting retaining the potential to benefit other libraries disciple of retaining existing in sober university libraries. Use the survey method and adopted a questionnaire distributed to the research sample consisting of employees working in the libraries in question and the total number of forms that have been distributed (50) form .tousel search phrase conclusions from them .

1-The lack of authority control depends on it to find a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An exploratory study of history-based test case prioritization techniques on different datasets
...Show More Authors

In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Theatrical Play Strategy in Enabling and Constructing the Child's Character: سافرة ناجي جاسم
...Show More Authors

  Since the human being knew simulation as an expressive style of expressing himself which developed into dramatic arts that have their aesthetic uniqueness involving their own constructive techniques, the art of the theatre had a pioneering role in the development of the human awareness of himself. That’s why it was and still is in all its aesthetic manifestations a free space for the self –disclosure thus man has been simulated as he is the main theme of the existence and its main wealth. Thus the interest in the child's theatre began, because this theatrical pattern has its effectiveness in the construction of the human self and enabling it to be a productive source for a life that accommodates and elevates the human action t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Ontological Methodologies for Counselling Intervention: Do’a and Zikr Al-Mā’thur Corpus
...Show More Authors

Do’a and Zikr al-Mā’thur (authentic supplications and remembrance of ALLAH ‘Azza wa Jalla) can be suggested to Muslims to help them deal with challenges or issues in life. Counselling cases affect a person’s feelings. Do’a and Zikr al-Mā’thur are often applied as a counselling intervention. Unfortunately, the authentic Do’a and Zikr al-Mā’thur are dispersed in many resources not visible to users, and the fact that not all online resources offer access to accurate Do’a and Zikr al-Mā’thur to users and the dubious Do’a and Zikr al-Mā’thur frequently credited to the Prophet (pbuh). The goal of this research is to develop an ontology

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Social indications (Marriage websites) - A field study in internet cafes
...Show More Authors

Marriage is considered one of the strongest ties that links between two human beings , but after the evolutions that happened in our Arab communities and specifically in the Iraqi community , marriage through the internet websites appeared . this kind of marriage is considered one of the new phenomena that appeared in the present time in many societies. That was through internet websites like yahoo , Facebook and other websites that have chat features.
The Islamic sharia looks negatively at marriage through the internet announcing that this way is harmful for both the man and the woman

View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
the role of time management in facilitate the work requirements for employees of the administrative department at the ministry of higher education and scientific research
...Show More Authors

The aim of the present study is to provide the adequate knowledge about the role of time management in facilitate the work requirements for employees of the administrative department at the Ministry of Higher Education and Scientific Research. The research depend on studying four important dimensions which are (time planning, time organization, time direction and time observation). In addition to study other five dimensions which are (new procedures, clear procedures, short procedures, the available information and the simplicity of the methods

used).Questionnaire sheets consist of (38 questions) distributed to (170) employees and (146)  sheets only were considered in the study. SPSS program was used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 18 2021
Journal Name
Review Of International Geographical Education Online
Chomsky&#39;s Political Views as a Case Study in a Critical Discourse Analysis of Ideology in the Iraqi Wars
...Show More Authors

APDBN Rashid, Review of International Geographical Education Online (RIGEO), 2021

View Publication
Publication Date
Sun Jun 11 2017
Journal Name
Al-academy
Regularity Relations Signals According Pillars Expressive Between the Narrator and Narrative Discourse Alcinmatugrave Legend Movie In 1900 A Model
...Show More Authors

This study is concerned with the concept of offering a point of view as a narrative construction element, especially the element and point of view of the novel to the letter Alcinmatugrave both business taken from masterpieces and literary works in the foundation or set of cinema. On the whole, the narrator participate in mock narrative process and support the narrator visual image, especially stories that need to exist scenes prove added to the image that uses signs of reality to take those marks a new dimension not only across the image, but also the intervention of the narrator in the re-formation of this realism marks surrounding Palms perceived and visible and put markers regularly between what the narrative of privacy and image, fo

... Show More
View Publication Preview PDF
Crossref