Preferred Language
Articles
/
jcolang-347
Areas in phonetics and phonology Differences Between Speech and Writing
...Show More Authors

In any language there is some amount of difference between written language (planned) and spoken language (spontaneous). Since planned speech could be considered a form of written language, it could be inferred that there are also differences between planned speech and spontaneous speech. Some of these differences are very clear in terms of syntax, lexis, phonology and discourse.  These differences are highlighted in order to make a clear distinction between spontaneous and planned speech.

             This paper is an attempt to show the differences between the two forms of a language (written & spoken English) as far as number of linguistic features are tackled

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Asabe
Effects of Pressure and Moisture Content on Bulk Density of Triticale Grain under Compaction
...Show More Authors

Highlights

Compaction of triticale grain with three moisture contents (8%, 12%, and 16% wet basis) was measured at five applied pressures (0, 7, 14, 34, and 55 kPa).

Bulk density increased with increasing pressure for all moisture contents and was significantly (p < 0.0001) dependent on both moisture content and applied pressure.

A Verhulst logistic equation was found to model the changes in bulk density of triticale grain with R2 of 0.986.

The model showed similar beha

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Designand Implementation of New DES64X and DES128X on 32, 64 Bit Operating System Environments
...Show More Authors

In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 19 2019
Journal Name
Iraqi Journal Of Science
The Structural and Morphological Properties of Heat Treated Hybrid Blend ZnPc/CdS Thin Films
...Show More Authors

CdS Nps (inorganic material) was prepared by the chemical reaction method. ZnPc (organic material) and CdS thin films were prepared separately to compare their characterization with the hybrid BHJ blend ZnPc/CdS thin film (2ml:2ml) by spin coating technique. The structural and morphological properties of the prepared thin films have been measured by XRD and AFM respectively. The XRD pattern for both as-deposited and annealed CdS nanoparticle films shows a hexagonal structure. The crystallite size behavior of as deposited ZnPc films and annealing at 423K for 1h, 2h and 3h was approximately similar to the behavior of heat treated blended films. The grain size was measured by AFM, which decreaseds with annealing temperature for ZnPc films,

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
The removal of Zinc, Chromium and Nickel from industrial waste water using Corn cobs
...Show More Authors

The aim of this study was to use low cost adsorbents, which consist of corn cobs as plant wastes adsorbents in treatment of Industrial waste water by fixed bed column technique and study the effect of two variables (pH value and contact time). The sample of plant waste (Corn cobs) was tested to determine its activity which gives the best performance in heavy metals removal and other pollutants (TSS, TDS and COD). Adsorption tests showed the corn cobs adsorbents had significant heavy metal removal efficiency. The best removal efficiency 95.05% of Cr was occurred at pH 5.4 and 4.18hr. Higher removal efficiency 99.90% of Ni was occurred at pH 6.5 and 2.38hr. While, lower removal efficiency 91.35% for Zn obtained at pH 6.5 and 0.15hr. Remova

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 25 2018
Journal Name
Biomedical And Pharmacology Journal
Comparing the Impact Strength and Transverse Flexure Strength of Three Different Dentures Base Materials
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Kinetic and Theoretical Study of Removal Gentian Violet from Aqueous Solution Using Stachy Plant
...Show More Authors

     The main parameters and methods influencing the removal of Gentian Violet (GV) dye from aqueous media were investigated using a stachy plant in this study. The surface of the stachy plant was determined using FTIR spectra. Adsorption is influenced by the adsorbent's characteristic groups. The research took into account the usual conditions for GV dye adsorption by the stachy plant, such as the impact of contact time. Mass dosage , after 0.3 g the amount of adsorbed dye declines. Study pH and ionic strength, the results obtained showed that at pH 3 the largest adsorption of (GV) was seen, while at pH 9, the lowest adsorption was observed  at 298 K, the adsorption kinetics and equilibrium constants were achieved, and the equilibr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 24 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Evaluating the anti- Pseudomonas Aeroginosa Efficacy and Potential Cytotoxicity of Nerium Oleander Alcoholic Extract
...Show More Authors

Nerium oleander known as oleander has belonged to the poisonous plants its habitat in a tropical andsubtropical region. The chemical analysis with GC-Mass of the alcoholic extract of oleander leaves revealedthat this plant has many chemical compounds more than 80 compounds and high-peaks about 29 compoundswhich are represented by alkaloids, phenol, terpenes, and fatty acid. HPLC analysis showed many essentialoils that have many biological effects.To evaluate the antibacterial activity of the alcoholic extract of N. oleander against locally isolatedPseudomonas aeroginosa the broth micro-dilution method was adapted to different concentrations werestarted from 3.9 to1000 mg/ml. The results revealed that the alcoholic extract has antiba

... Show More
View Publication
Crossref
Publication Date
Mon Dec 21 2020
Journal Name
Frontiers In Medicine
Anxiety, Practice Modification, and Economic Impact Among Iraqi Dentists During the COVID-19 Outbreak
...Show More Authors

Objectives: As health care workers on the front line during the coronavirus (COVID-19) pandemic, dental practitioners are amongst those at risk due to their close contact with potentially infected individuals. The aim of the current study was to assess the anxiety, awareness practice modification, and economic impact amongst Iraqi dentists whilst working during the outbreak.

Methods: This study was performed using an online survey questionnaire with aid of Google forms from 2nd to 23rd July 2020. A total of 484 clinicians responded. The questionnaire was composed of open end, closed end, and Likert five-point scale questions to assess anxiety, awareness and financial impa

... Show More
View Publication Preview PDF
Crossref (33)
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Mon Apr 29 2024
Journal Name
Euphrates Journal Of Agricultural Science
Effect foliar of some organic fertilizers on growth and yield of four potato cultivars
...Show More Authors