Preferred Language
Articles
/
jcolang-588
Pragmatic Presupposition: An ExtraLinguisitic Concept
...Show More Authors

Presupposition, which indicates a prior assumption, is a vital notion in both semantic and pragmatic disciplines. It refers to assumptions implicitly made by interlocutors, which are necessary for the correct interpretation of an utterance. Although there is a general agreement that presupposition is a universal property of Language, there are various propositions concerning its nature. However, this research work proposes that presupposition is a contextual term, thus, is more pragmatic than semantic in its nature.Although Semantics and Pragmatics are two distinct disciplines, they are interrelated and complementary to each other, since meaning proper involves both, and since there is no clear borderline between the two disciplines. However, due to the limitations of the research paper, presupposition is dealt with as a contextual notion, thus pragmatically.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2012
Journal Name
Ijcsi International Journal Of Computer Science
Implementing a novel approach an convert audio compression to text coding via hybrid technique
...Show More Authors

Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
An Approximate solution for two points oundary value problem corresponding to some optimal control
...Show More Authors

this paper presents a novel method for solving nonlinear optimal conrol problems of regular type via its equivalent two points boundary value problems using the non-classical

View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Viii. International Scientific Congress Of Pure, Applied And Technological Sciences (minar Congress)
DETERMINING AN APPROPRIATE INITIAL VALUE OF ECCENTRICITY FOR LOW EARTH SATELLITES USING EULER METHOD
...Show More Authors

The major goal of this research was to use the Euler method to determine the best starting value for eccentricity. Various heights were chosen for satellites that were affected by atmospheric drag. It was explained how to turn the position and velocity components into orbital elements. Also, Euler integration method was explained. The results indicated that the drag is deviated the satellite trajectory from a keplerian orbit. As a result, the Keplerian orbital elements alter throughout time. Additionally, the current analysis showed that Euler method could only be used for low Earth orbits between (100 and 500) km and very small eccentricity (e = 0.001).

View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Intermediate Schools EFL Teachers Evaluation of An In-ervice Training Programme on “Iraq Opportunities”
...Show More Authors

Training and retraining of teachers have become a central issue in Iraq recently especially in-service training of English teachers on the new curricula (Iraq opportunities). English teachers should be objectively evaluated and assessed.
A sample of (40) trained teachers of English is included in the study and a questionnaire is used as the main instrument of the study.
The main findings of the study were the following:
1. The trainees were serious in training on the new course (item 6) the programme helped increase their information (item 4) and motivate them towards better teaching (item 3). The aims of the programme were clear (item1). The programme helped develop their teaching skills (item 2) and was comprehensive (item 5).

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 26 2024
Journal Name
Journal Of Optics
Cysteine-cupped CdSe/CdS quantum dots as an opticalbiosensor for early skin cancer detection
...Show More Authors

This study represents an optical biosensor for early skin cancer detection using cysteine-cupped CdSe/CdS Quantum Dots (QDs). The study optimizes QD synthesis, surface, optical functionalization, and bioconjugation to enhance specificity and sensitivity for early skin cancer cell detection. The research provides insights into QD interactions with skin cancer biomarkers, demonstrating high-contrast, precise cellular imaging. Cysteine-capped CdSe/CdS absorption spectra reveal characteristic peaks for undamaged DNA, while spectral shifts indicate structural changes in skin-cancer-damaged DNA. Additionally, fluorescence spectra show sharp peaks for undamaged DNA and notable shifts and intensity variations when interacting with skin cancer. This

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
An algorithm for binary codebook design based on the average bitmap replacement error (ABPRE)
...Show More Authors

In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
An Analytic Solution for Riccati Matrix Delay Differential Equation using Coupled Homotopy-Adomian Approach
...Show More Authors

An efficient modification and a novel technique combining the homotopy concept with  Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced  in this paper  . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sat Nov 27 2021
Journal Name
Lecture Notes In Civil Engineering
An Experimental Study on Concavely Curved Soffit Reinforced Concrete Beams Externally Bonded with FRP
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Health Education And Health Promotion
Effectiveness of an Educational Program on Nannies' Practice Regarding Cholera Infection in the Nurseries
...Show More Authors

Scopus (2)
Scopus
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref