The Arabic grammatical theory is characterized by the characteristics that distinguish it from other languages. It is based on the following equation: In its entirety a homogeneous linguistic system that blends with the social nature of the Arab, his beliefs, and his culture.
This means that this theory was born naturally, after the labor of maintaining an integrated inheritance, starting with its legal text (the Koran), and ends with its features of multiple attributes.
Saber was carrying the founding crucible of that theory, which takes over from his teacher, Hebron, to be built on what it has reached. It is redundant to point to his location and the status of his book.
So came to my research tagged: (cognitive dimensions of the grammar work at Sibuyh), to get closer to the majestic construction set up by Sibuyh, to recognize those knowledge frameworks, and scientific foci.
Volgett issue of the foundations of knowledge at Sibawayh, and discussed the consideration of grammar and belief, and limped on the concept of grammar, and then separated to say in the fact of the grammar factor, and the related interpretation, rejection, and acceptance.
This paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.
Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati
... Show MoreThis study aims at evaluating the performance of MA students in the College of Education for Women in using the digital transformation and identifying the significant difference in performance evaluation according to the variable of academic qualification (Master or PHD). In order to achieve the aim of the research the researcher prepared a questionnaire of 20 items, and this happens after the researcher's getting acquaintance of the literature of previous studies related to the variable of the research. The apparent validity of the items was examined by exposing them to 10 juries specialized in education, psychology and evaluation and measurement. The stability of the items was examined via two methods, the test-repetition and half-divisio
... Show Moreالمستخلص
يهدف البحث إلى وضع إطار معرفي ومفاهيمي شامل لموضوع البحث, واغناء القارئ والمستفيد بالمعلومات الوافية عنه وتقليص الفجوات المعرفية للمهتمين به وقياس مدى ما هو متوفر وغير متوفر من المتطلبات الأساسية والضرورية لإنشاء صناديق التحوط في البيئة العراقية, وتمثلت صناديق التحوط بالمتغير الرئيس للبحث اما المتغيرات الفرعية فشملت (المتطلبات المالية, المتطلبات البشرية, البيئة التشريعية, الب
... Show MoreIn this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation) structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of these procedures and compare them using generated data.
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreIn the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreThis review article summarizes our research focused on Cu(In, Ga)Se2 (CIGS) nanocrystals, including their synthesis and implementation as the active light absorbing material in photovoltaic devices (PVs). CIGS thin films were prepared by arrested precipitation from molecular precursors consisting of CuCl, InCl3, GaCl3 and Se metal onto Mo/soda-lime glass (SLG) substrates. We have sought to use CIGS nanocrystals synthesized with the desired stoichiometry to deposit PV device layers without high temperature processing. This approach, using spray deposition of the CIGS light absorber layers, without high temperature selenization, has enabled up to 1.5 % power conversion efficiency under AM 1.5 solar illumination. The composition and morphology
... Show MoreThe aim of the research is to identify the impact of the dimensions of the European Excellence Model in evaluating the performance of the bank of the research sample, as well as to interpret which dimensions are more important to the banks of the research sample. Based on the dimensions of this model, the United Bank for Investment and Finance has chosen a research community, and has met with officials of the United Bank for Investment and Finance at various administrative levels to measure the practices of excellence management in the European model, and the analytical approach has been the case study and the construction of the checklist as a tool to collect information. The research has reached the most important results There is a discr
... Show MoreThe current study is considered a field study to measure the level of satisfaction of the academic programs of Media Masters students. That was accomplished through surveying the attitudes of the students who are enrolled in the faculties of media at the following universities: (Petra University, The Middle East University (MEU), and Al-Yarmouk University). Those students were enrolled in the master’s program within the formal educational system during the second semester of the academic year (2015 – 2016). This survey aims to identify the services, facilities and academic programs provided by the concerned faculties. It, also, aims to identify the public relations, administrative, educational and services aspects of those faculties.
... Show More