Preferred Language
Articles
/
jcolang-637
Linguistic Errors in second language learning through Error Analysis theory: هه‌ڵه‌ زمانییه‌كان له‌ فێربوونی زمانی دووه‌مدا (له‌ ڕوانگه‌ی تیۆری شیكاری هه‌ڵه‌ییه‌وه‌)
...Show More Authors

Second language learner may commit many mistakes in the process of second language learning. Throughout the Error Analysis Theory, the present study discusses the problems faced by second language learners whose Kurdish is their native language. At the very stages of language learning, second language learners will recognize the errors committed, yet they would not identify the type, the stage and error type shift in the process of language learning. Depending on their educational background of English as basic module, English department students at the university stage would make phonological, morphological, syntactic, semantic and lexical as well as speech errors. The main cause behind such errors goes back to the cultural differences of the language learners. Other errors go back either to the spoken form of the second language itself or to the teacher teaching the second language.       

لە فێربوونی زمانی دووەمدا  فێرخوازی زمانی دووەم دووچاری هەڵەی جۆراوجۆر دەبنەوە، بۆ ئەم مەبەستە (لە ڕوانگەی  تیۆری شكاری هەڵەییەوە) لە هەڵەكانی فێرخوازی زمانی دووەم( ئینگلیزی) دەدوێین، كە زمانی یەكەمیان زمانی كوردییە. فێرخوازان لە سەرەتای فێربوونی زمانی دووەمدا درك بە هەڵەی فێربوونی زمانەكەیان دەكەن، بەڵام  درك بە جۆر و قۆناغ و  گۆڕانی جۆری هەڵەكان ناكەن. لە پڕۆسەی فێربوونی زمانی دووەمدا  فێرخوازان لە قۆناغەكانی خوێندنی زانكۆدا بەتایبەتی لەبەشی زمانی ئینگلیزیدا بە پشتبەستن بە پاشخانی چەند ساڵی ڕابردوویان، كە زمانی ئینگلیزیان وەكو بابەتێكی سەرەكی خوێندووە، ئەوا شێوازی هەڵەی تریان تیدا بەدیدەكرێت، بەتایبەتی لە هەڵەی فۆنەتیكی و مۆرفۆلۆژی و سینتاكسی و واتا سازی و فەرهەنگی، هەروەها لە دركاندنیشدا هەڵەیان هەیە. سەرچاوەی ئەم هەڵەكردنانەش  بۆ كاریگەری زمانی یەكەم، بۆ هه‌ڵه‌ پێشكه‌وتووه‌كان، كه‌  له‌ خودی زمانی دووه‌م به‌رهه‌م دێت، ئه‌و هه‌ڵانه‌ی سه‌رچاوه‌كه‌ی بۆ سروشتی زمانی زاره‌كی، ئه‌و هه‌ڵانه‌ی له‌ فێركاره‌وه‌ ڕووده‌ده‌ن ده‌گه‌ڕێته‌وه.‌       

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 02 2016
Journal Name
Journal Of Educational And Psychological Researches
تحليل كتاب الكيمياء للصف الثالث المتوسط على وفق قضايا العلم والتكنولوجيا والمجتمع والبيئة ( S.T.S.E )
...Show More Authors

The aim of the present research is to know the following :

 What are the Science and technology, society and environment issues (S.T.S.E) which included in the content of the chemistry Book third grade intermediate ?

And to achieve the objective of search The two researchers has prepares a list of science and technology, society and environment issues (STSE) consisted of (9) key issues namely ( Air quality and the atmosphere, sustainable development, water security, health and preventive security, mineral resources investment, pollution of various kinds, energy, food industry, production of weapons technology ) and from which (70) sub-issues emerge, Arbitrators competent agreement has been received . Then, the two re

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 21 2021
Journal Name
Jmerd
stress and strain analysis for the prosthetic hand design actuated by links
...Show More Authors

Prosthetic hands are compensatory devices for the hand amputees as a result of injury, various accidents or birth deformities, types of prosthetic hand vary depending on the mechanism they operate and how they perform. There are common types in use that are characterized by their complex mechanisms, which are difficult for the amputee to use or exclude use because of their high cost, therefore the aim of this research is to design an artificial hand that is suitable in terms of simplicity of use and low cost and similar to a natural hand with regard to dimensions and shape that operated in the mechanism of links. This research involves Stress and strain analysis of the prosthetic hand and its fingers that modelled from (Petg CR)

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 21 2015
Journal Name
Integrated Journal Of Engineering Research And Technology
A HYBRID CUCKOO SEARCH AND BACK-PROPAGATION ALGORITHMS WITH DYNAMIC LEARNING RATE TO SPEED UP THE CONVERGENCE (SUBPL) ALGORITHM
...Show More Authors

BP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.

Publication Date
Sat Nov 22 2025
Journal Name
Journal Of Studies And Researches Of Sport Education
The effect of using the educational bag on the level of learning some offensive skills with the epee weapon
...Show More Authors

View Publication
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (10)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (21)
Crossref (12)
Scopus Crossref
Publication Date
Fri Jan 21 2022
Journal Name
Environmental Science And Pollution Research
Development of new computational machine learning models for longitudinal dispersion coefficient determination: case study of natural streams, United States
...Show More Authors

View Publication
Crossref (31)
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Whoever Abu Dawood said about him is weak in his Sunan
...Show More Authors

Abstract

The research was limited to those whom Imam Abu Dawood

described in his Sunan as weak, so this research does not include

narrators who carried descriptions indicating weakness such as

ignorance or others, nor does it include hadiths that the Imam

described as weak.

The number of narrators whom Imam Abu Dawood described as

weak has reached six narrators, and my methodology was to

mention the words of Imam Abu Dawood, then transfer the

sayings of other advanced scholars, as well as the sayings of

Imam Abu Dawood in his other books, if any, to show the extent

of compatibility between these sayings.

I have reached the following resul

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Artificial Neural Network and Latent Semantic Analysis for Adverse Drug Reaction Detection
...Show More Authors

Adverse drug reactions (ADR) are important information for verifying the view of the patient on a particular drug. Regular user comments and reviews have been considered during the data collection process to extract ADR mentions, when the user reported a side effect after taking a specific medication. In the literature, most researchers focused on machine learning techniques to detect ADR. These methods train the classification model using annotated medical review data. Yet, there are still many challenging issues that face ADR extraction, especially the accuracy of detection. The main aim of this study is to propose LSA with ANN classifiers for ADR detection. The findings show the effectiveness of utilizing LSA with ANN in extracting AD

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Clinical And Experimental Dentistry
Prevalence of periapical lesions in non-endodontically and endodontically treated teeth in an urban Iraqi adult subpopulation: A retrospective CBCT analysis
...Show More Authors

View Publication
Scopus (11)
Crossref (10)
Scopus Crossref