Assimilation is defined ,by many phoneticians like Schane ,Roach ,and many others, as a phonological process when there is a change of one sound into another because of neighboring sounds.This study investigates the phoneme assimilation as a phonological process in English and Arabic and it is concerned specifically with the differences and similarities in both languages. Actually ,this study reflects the different terms which are used in Arabic to refer to this phenomenon and in this way it shows whether the term 'assimilation ' can have the same meaning of 'idgham' in Arabic or not . Besides, in Arabic , this phenomenon is discussed from the point of view the modern and classical Arab linguists especially Sibawayh's indication to this natural process in classical Arabic and different views of the tajweed scholars and Qura'an reciters are involved in the discussion where detailed examples are taken mostly from the Qura'an . However ,it is found that kinds of assimilation in Arabic are more varied than in English and the researcher tries to state the major and minor ones briefly. It is hoped that this study can contribute to a better understanding of this phenomenon in both languages .
Ferrite with general formula Ni1-x Cox Fe2O4(where x=0.0.1,0.3,0.5,0.7, and 0.9), were prepared by standard ceramic technique. The main cubic spinel structure phase for all samples was confirmed by x-ray diffraction patterns. The lattice parameter results were (8.256-8.299 °A). Generally, x -ray density increased with the addition of Cobalt and showed value between (5.452-5.538gm/cm3). Atomic Force Microscopy (AFM) showed that the average grain size and surface roughness was decreasing with the increasing cobalt concentration. Scanning Electron Microscopy images show that grains had an irregular distribution and irregular shape. The A.C conductivity was found to increase with the frequency and the addition of Cobal
... Show MoreThis work consists of a numerical simulation to predict the velocity and temperature distributions, and an experimental work to visualize the air flow in a room model. The numerical work is based on non-isothermal, incompressible, three dimensional, k turbulence model, and solved using a computational fluid dynamic (CFD) approach, involving finite volume technique to solve continuity, momentum and energy equations, that governs the room’s turbulent flow domain. The experimental study was performed using (1/5) scaled room model of the actual dimensions of the room to simulate room air flow and visualize the flow pattern using smoke generated from burnt herbs and collected in a smoke generator to delivered through
... Show MoreThe skull is one of the largest bones in the body. It is classified into flat bones that maintain the important organic structures; which are the brain, eyes, and tongue. The skull is a strong support for preserving these organs but they are various according to the type of animals and the environments in which they live and the nature of their nutrition. There are many differences among living organisms in terms of the bones in the skull, their difference or disappearance and their length in the shape of the head. The samples were taken from the scientific storage in the Iraq Natural History Research Center and Museum; Cape hare Lepus capensis (Linnaeus, 1758) and Red fox Vulpes vulpes (Linnaeus, 1758) and the study was conducted o
... Show MoreThe skull is one of the largest bones in the body. It is classified into flat bones that maintain the important organic structures; which are the brain, eyes, and tongue. The skull is a strong support for preserving these organs but they are various according to the type of animals and the environments in which they live and the nature of their nutrition. There are many differences among living organisms in terms of the bones in the skull, their difference or disappearance and their length in the shape of the head. The samples were taken from the scientific storage in the Iraq Natural History Research Center and Museum; Cape hare Lepus capensis (Linnaeus, 1758) and Red fox Vulpes vulpes (Linnaeus, 1758) and the study was conducted o
... Show MoreIncreasing demands on producing environmentally friendly products are becoming a driving force for designing highly active catalysts. Thus, surfaces that efficiently catalyse the nitrogen reduction reactions are greatly sought in moderating air-pollutant emissions. This contribution aims to computationally investigate the hydrodenitrogenation (HDN) networks of pyridine over the γ-Mo2N(111) surface using a density functional theory (DFT) approach. Various adsorption configurations have been considered for the molecularly adsorbed pyridine. Findings indicate that pyridine can be adsorbed via side-on and end-on modes in six geometries in which one adsorption site is revealed to have the lowest adsorption energy (–45.3 kcal/mol). Over a nitr
... Show MoreAdsorption of Acetone and 2-Butanone on Iraqi siliceouns rocks powder have been investigated. UV technique has been used to determine the adsorption isotherms. The results showed that the adsorption isotherms obeyed Freundlich adsorption equation. The results showed that the adsorption increases with increasing acidity of solutions. The adsorption was exothermic process, increasing temperature leads to decreasing adsorption. H, S, G were calculated
In this work, a test room was built in Baghdad city, with (2*1.5*1.5) m3 in dimensions, while the solar chimneys (SC) were designed with aspect ratio (ar) bigger than 12. Test room was supplied by many solar collectors; vertical single side of air pass with ar equals 25, and tilted 45o double side of air passes with ar equals 50 for each pass, both collectors consist of flat thermal energy storage box collector (TESB) that covered by transparent clear acrylic sheet, third type of collector is array of evacuated tubular collectors with thermosyphon in 45o instelled in the bottom of TESB of vertical SC. The TESB was
... Show More<p>Photovoltaic (PV) systems are becoming increasingly popular; however, arc faults on the direct current (DC) side are becoming more widespread as a result of the effects of aging as well as the trend toward higher DC voltage levels, posing severe risk to human safety and system stability. The parallel arc faults present higher level of current as compared with the series arc faults, making it more difficult to spot the series arc. In this paper and for the aim of condition monitoring, the features of a DC series arc fault are analyzed by analysing the arc features, performing model’s simulation in PSCAD, and carrying out experimental studies. Various arc models are simulated and investigated; for low current arcs, the heur
... Show MoreMaximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More