Preferred Language
Articles
/
jcolang-347
Areas in phonetics and phonology Differences Between Speech and Writing
...Show More Authors

In any language there is some amount of difference between written language (planned) and spoken language (spontaneous). Since planned speech could be considered a form of written language, it could be inferred that there are also differences between planned speech and spontaneous speech. Some of these differences are very clear in terms of syntax, lexis, phonology and discourse.  These differences are highlighted in order to make a clear distinction between spontaneous and planned speech.

             This paper is an attempt to show the differences between the two forms of a language (written & spoken English) as far as number of linguistic features are tackled

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Effect of growth regulators on sex expression and some quantitatve properties
...Show More Authors

This study was conducted in an orchard pomegranate's Department of Horticulture College of Agriculture, University of Baghdad for two seasons 1999-2000 on cultivars pomegranate Salimi and narrators seedless to study the effect spraying Nizant growth in sex ratio of flowers and recipes flowering and winning was selected 27 trees per class 15 years old planted

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Some properties of the Osvillatory and nonoscillatory solutions of second order
...Show More Authors

in this paper sufficient conditions of oscillation of all of nonlinear second order neutral differential eqiation and sifficient conditions for nonoscillatory soloitions to onverage to zero are obtained

View Publication Preview PDF
Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Aaps Pharmscitech
Formulation and Characterization of Oleogel as a Topical Carrier of Azithromycin
...Show More Authors

This study aims to formulate azithromycin oleogel to locally treat skin infections such as acne vulgaris and skin wound infection. Providing a form of azithromycin that can be administered topically is highly desired to prevent unwanted systemic complications including diarrhea, nausea, and abdominal pain. Additionally, it will avoid first pass metabolism, improves patient acceptance, provides an alternative in nauseated patients, decreases the dose by direct contact with the pathological site, and provides a noninvasive and convenient mode of administration. Furthermore, for treating wound infections, the gel will act as a scaffold biomaterial for wound closure besides its antibacterial effect. Herein, we propose the use of grapeseed oil-b

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Novel Dynamic S-Box Based on Password Key and Circle Map
...Show More Authors

     Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm.  It is necessary to make this algorithm more efficient and powerful through

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Synthesis, Characterizations, and Magnetic Properties of Mixed Spinel Mg1-xZnxFe2O4 Ferrites
...Show More Authors

    Mixed spinel Mg1-xZnxFe2O4 ferrites (where x = 0, 0.2, 0.4, and 0.6) nanoparticles were synthesized by using microwave-assisted combustion route. As-synthesized powdered samples were checked by XRD analysis, field emission-scanning electron microscopy, and vibration sample magnetometer to investigate the structural,   morphology, and magnetic properties, respectively. XRD results exhibited that the crystallite size increases with the decrease of Zn+2 ion concentration for series of mixed spinel Mg1-xZnxFe2O4 ferrite expect x=0.2. All the mixed spinel Mg1-xZnxFe2O4 ferrite has different gr

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Journal Of Engineering
Synthesis and Characterization of Titanium Dioxide Nanoparticles under Different pH Conditions
...Show More Authors

Ethanol as a solvent, a precursor of titanium isopropoxide and a stabilizer of either hydrochloric acid or ammonium hydroxide was used to prepare a titanium dioxide aqueous solution. The aqueous solutions with different values of pH and the morphology of the resultant reaction of the nanoparticles of titanium dioxide were investigated. The X-ray diffraction showed that at low temperatures and with acidic solutions, rutile structures are more favorable to grow on titanium dioxide synthesized, while at low and average temperatures and with base solutions, anatase phase is more pronounced. The crystalline form and the re-confirmation of the crystallite size growth were observed by the scanning electron microscopy. The atomi

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Iraqi Journal Of Applied Physics
Fabrication and Improvement of Optoelectronic Properties of Copper Chalcogenide Thin Films
...Show More Authors

Scopus
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Study to modify the fat cow's milk for children and infants
...Show More Authors

This study Ajert to modify the chemical composition of milk fat cows and make it similar to the installation of milk fat mother through the addition of protein and soybean oil to be given Alkhltatnsp sensory protein that the best plan is the ratio of 1:1

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (14)
Crossref (13)
Scopus Clarivate Crossref