Preferred Language
Articles
/
jcolang-637
Linguistic Errors in second language learning through Error Analysis theory: هه‌ڵه‌ زمانییه‌كان له‌ فێربوونی زمانی دووه‌مدا (له‌ ڕوانگه‌ی تیۆری شیكاری هه‌ڵه‌ییه‌وه‌)
...Show More Authors

Second language learner may commit many mistakes in the process of second language learning. Throughout the Error Analysis Theory, the present study discusses the problems faced by second language learners whose Kurdish is their native language. At the very stages of language learning, second language learners will recognize the errors committed, yet they would not identify the type, the stage and error type shift in the process of language learning. Depending on their educational background of English as basic module, English department students at the university stage would make phonological, morphological, syntactic, semantic and lexical as well as speech errors. The main cause behind such errors goes back to the cultural differences of the language learners. Other errors go back either to the spoken form of the second language itself or to the teacher teaching the second language.       

لە فێربوونی زمانی دووەمدا  فێرخوازی زمانی دووەم دووچاری هەڵەی جۆراوجۆر دەبنەوە، بۆ ئەم مەبەستە (لە ڕوانگەی  تیۆری شكاری هەڵەییەوە) لە هەڵەكانی فێرخوازی زمانی دووەم( ئینگلیزی) دەدوێین، كە زمانی یەكەمیان زمانی كوردییە. فێرخوازان لە سەرەتای فێربوونی زمانی دووەمدا درك بە هەڵەی فێربوونی زمانەكەیان دەكەن، بەڵام  درك بە جۆر و قۆناغ و  گۆڕانی جۆری هەڵەكان ناكەن. لە پڕۆسەی فێربوونی زمانی دووەمدا  فێرخوازان لە قۆناغەكانی خوێندنی زانكۆدا بەتایبەتی لەبەشی زمانی ئینگلیزیدا بە پشتبەستن بە پاشخانی چەند ساڵی ڕابردوویان، كە زمانی ئینگلیزیان وەكو بابەتێكی سەرەكی خوێندووە، ئەوا شێوازی هەڵەی تریان تیدا بەدیدەكرێت، بەتایبەتی لە هەڵەی فۆنەتیكی و مۆرفۆلۆژی و سینتاكسی و واتا سازی و فەرهەنگی، هەروەها لە دركاندنیشدا هەڵەیان هەیە. سەرچاوەی ئەم هەڵەكردنانەش  بۆ كاریگەری زمانی یەكەم، بۆ هه‌ڵه‌ پێشكه‌وتووه‌كان، كه‌  له‌ خودی زمانی دووه‌م به‌رهه‌م دێت، ئه‌و هه‌ڵانه‌ی سه‌رچاوه‌كه‌ی بۆ سروشتی زمانی زاره‌كی، ئه‌و هه‌ڵانه‌ی له‌ فێركاره‌وه‌ ڕووده‌ده‌ن ده‌گه‌ڕێته‌وه.‌       

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Mobile position estimation using artificial neural network in CDMA cellular systems
...Show More Authors

Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result

... Show More
Publication Date
Fri Sep 01 2017
Journal Name
Pak. J. Pharm. Sci.
Moxifloxacin reduces stenotrophomonas maltophilia adhesion to mouse intestinal tract in vitro
...Show More Authors

Scopus (5)
Scopus
Publication Date
Mon Dec 30 2024
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Formation evaluation for Mauddud Formation in Bai Hassan oilfield, Northern Iraq
...Show More Authors

   Formation evaluation is a critical process in the petroleum industry that involves assessing the petrophysical properties and hydrocarbon potential of subsurface rock formations. This study focuses on evaluating the Mauddad Formation in the Bai Hassan oil field by analyzing data obtained from well logs and core samples. Four wells were specifically chosen for this study (BH-102, BH-16, BH-86, and BH-93). The main objectives of this study were to identify the lithology of the Mauddud Formation and estimate key petrophysical properties such as shale volume, porosity, water saturation, and permeability. The Mauddud Formation primarily consists of limestone and dolomite, with some anhydrites present. It is classified as a clean for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Arpn Journal Of Engineering And Applied Sciences
Assessment of vegetable cover in south Iraq by remote sensing methods
...Show More Authors

The vegetable cover plays an important role in the environment and Earth resource sciences. In south Iraq, the region is classified as arid or semiarid area due to the low precipitations and high temperature among the year. In this paper, the Landat-8 satellite imagery will be used to study and estimate the vegetable area in south Iraq. For this purpose many vegetation indices will be examined to estimate and extract the area of vegetation contain in and image. Also, the weathering parameters must be investigated to find the relationship between these parameters and the arability of vegetation cover crowing in the specific area. The remote sensing packages and Matlab written subroutines may be use to evaluate the results.

Preview PDF
Scopus
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Management And Enterprise Development
Studying The Decision-Making State and Impact in Iraqi Construction Projects
...Show More Authors

View Publication
Crossref
Publication Date
Mon Feb 10 2025
Journal Name
International Linguistics Research
A Semiotic Study of Reduplicative Words in Selected American Slang Expressions
...Show More Authors

This study explores the semiotic aspects of American slang, specifically focusing on the phenomenon of reduplicative expressions in informal speech. Despite the extensive research on American slang, limited attention has been given to the cultural and mythical meanings embedded within reduplicative expressions. To address this gap, the study investigates how these expressions convey denotative, connotative, and mythical meanings within casual American discourse. The objectives of the study include: 1. To what extent does Barthes’ semiotic model hold potential for application in this study? 2. How are reduplicative slang expressions widely used in everyday American life? 3. To what extent do qualitative and quantitative methods hav

... Show More
View Publication
Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Indian Journal Of Forensic Medicine And Toxicology. Vol 14 (2
Psychosocial Consequences of Children with Idiopathic Growth Hormone Deficiency in Baghdad
...Show More Authors

Scopus
Publication Date
Thu Jul 01 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Embryonic Development of Spinal Cord in White Choeked Bulbul (Pycnonotus leucotis)
...Show More Authors

The study concerned the embryonic development of spinal cord of white choeked bulbul Pycnonotus leucotis. The spinal cord at the age 40 hour’s incubation from the neural tube and its tissue wall is composed of two layers, the ependymal layer and mantle layer. The spinal cord differentiation is completed at the age 7 day’s incubation, its, were we notice that the central canal is clear and cavity lined with neurons and we note the arrangement of gray matter in the form of the letter H and its inside and it is characterized by dorsal and ventral horns and the gray matter substance and note the formation of dorsal medium spetum and ventral medium fissure.

Publication Date
Wed Apr 24 2019
Journal Name
Annals Of Telecommunications
Traveling distance estimation to mitigate unnecessary handoff in mobile wireless networks
...Show More Authors

View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will

... Show More
View Publication Preview PDF
Crossref