Preferred Language
Articles
/
jcoeduw-731
Build and Implemented Learning Package for Prolog Programming Language Using Visual Basic.Net 2010
...Show More Authors

E-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
facilities. Those facilities are represented in video lessons and their related websites via
internet as well as Google website, tests and administrator part for database manipulation.
Keywords: Prolog, e-learning, database, Prolog's syntax, Microsoft access database.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
The Semantic Displacement of the Sign and the Visual Formation of the Postmodern Theater
...Show More Authors

View Publication
Crossref
Publication Date
Thu Jan 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
Discourse Markers in English spoken Language
...Show More Authors

English, like any other language, has a number of such discourse markers including well, yes, surely, on the contrary, so and nevertheless. They are lexical items or grammatical forms typically serve to relate one utterance to another in discourse.
Discourse markers are considered as cues or signals for the reader or the hearer that make cohesion and coherence, In fact, these markers are found in various grammatical forms such as interjections, linking adverbials, greetings and farewells….etc. Discourse markers. Play a very important role, not only in conversation, but in written text as well.

View Publication Preview PDF
Publication Date
Wed Mar 14 2007
Journal Name
Journal Of Education College Wasit University
On the deviation of literary language
...Show More Authors

DBN Rashid, Journal of Education College Wasit University 1(1):412-423, 2007

View Publication
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of The College Of Basic Education
Subjects Of Phrases in English Language
...Show More Authors

Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Rooting language in Arabic dialect Alkhozstanah
...Show More Authors

This study Arabic dialect prevailing in the province of Khuzestan [southwest Islamic Republic of Iran] as one of the Arabic dialects abundant qualities and characteristics of linguistic entrenched in the foot, which includes among Tithe thousands composed of vocabulary and structures and phrases classical that live up to the pre-Islamic era, if what Tasha researcher and reflect accurately the find of a large number of phrases and vocabulary and acoustic properties by nature accent, and formal, and nature of the synthetic, and characteristics semantic and contextual in this dialect studied without being something of them heavy on the tongue and without displays her tune or Tasha or distortion and so on all of which constitute a catalyst i

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 06 2021
Journal Name
College Of Islamic Sciences
Linguistic deposits in the Arabic language
...Show More Authors

 

Abstract of the research:

     This research sheds light on an important phenomenon in our Arabic language, which is linguistic sediments, and by which we mean a group of vocabulary that falls out of use and that native speakers no longer use it, and at the same time it happens that few individuals preserve the phenomenon and use it in their lives, and it is one of the most important phenomena that  It should be undertaken and studied by researchers;  Because it is at the heart of our huge linguistic heritage, as colloquial Arabic dialects retain a lot of linguistic sediments, and we usually find them at all levels of language: phonetic, banking, grammatical and semantic.  In the

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 01 2008
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
External Auditor of responsibility for financial failure And the discontinuity of Company
...Show More Authors

Accountancy unit is looked is upon as unit that established for the purpose achieve it goals and programmers for unlimited time. Unless otherwise take place such as liquation whether voluntary or mandatory.  Thus going concern logic is considered to be the logical foundation witch the familiar accounting principles are based upon.  The future of a Company real its financial statues and position and the extent of it ability to face events in future.  Hence the success and continuity its activities depend on the extent of the company activity to generate profits. And its ability to retain appropriate liquidity to serve its debts.

Therefore financial statements of the company consider to be on

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
مجلة العلوم و التكنولوجية للنشاطات البدنية و الرياضية
The effect of the think, pair, and share strategy of using educational movies on learning jumping opened legs and closed legs skills on vault in artistic gymnastics for women
...Show More Authors

The research aimed at identifying the effect of the think, pair, and share strategy by using educational movies on learning jumping opened legs and closed legs skills on vault in artistic gymnastics for women. It also aimed at identifying the group that learned better the skills understudy. The researcher used the experimental method on second-grade College of Physical Education and Sport Sciences female students. Twelve female students were selected from each of the two sections to form the subjects of the study. The main program was applied for eight weeks with one learning session per week. The data was collected and treated using SPSS to conclude that the think, pair, and share strategy and the traditional program have positive effects

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Aro-the Scientific Journal Of Koya University
Enhancing Upper Limb Prosthetic Control in Amputees Using Non-invasive EEG and EMG Signals with Machine Learning Techniques
...Show More Authors

Amputation of the upper limb significantly hinders the ability of patients to perform activities of daily living. To address this challenge, this paper introduces a novel approach that combines non-invasive methods, specifically Electroencephalography (EEG) and Electromyography (EMG) signals, with advanced machine learning techniques to recognize upper limb movements. The objective is to improve the control and functionality of prosthetic upper limbs through effective pattern recognition. The proposed methodology involves the fusion of EMG and EEG signals, which are processed using time-frequency domain feature extraction techniques. This enables the classification of seven distinct hand and wrist movements. The experiments conducte

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (4)
Crossref