Preferred Language
Articles
/
jcolang-637
Linguistic Errors in second language learning through Error Analysis theory: هه‌ڵه‌ زمانییه‌كان له‌ فێربوونی زمانی دووه‌مدا (له‌ ڕوانگه‌ی تیۆری شیكاری هه‌ڵه‌ییه‌وه‌)
...Show More Authors

Second language learner may commit many mistakes in the process of second language learning. Throughout the Error Analysis Theory, the present study discusses the problems faced by second language learners whose Kurdish is their native language. At the very stages of language learning, second language learners will recognize the errors committed, yet they would not identify the type, the stage and error type shift in the process of language learning. Depending on their educational background of English as basic module, English department students at the university stage would make phonological, morphological, syntactic, semantic and lexical as well as speech errors. The main cause behind such errors goes back to the cultural differences of the language learners. Other errors go back either to the spoken form of the second language itself or to the teacher teaching the second language.       

لە فێربوونی زمانی دووەمدا  فێرخوازی زمانی دووەم دووچاری هەڵەی جۆراوجۆر دەبنەوە، بۆ ئەم مەبەستە (لە ڕوانگەی  تیۆری شكاری هەڵەییەوە) لە هەڵەكانی فێرخوازی زمانی دووەم( ئینگلیزی) دەدوێین، كە زمانی یەكەمیان زمانی كوردییە. فێرخوازان لە سەرەتای فێربوونی زمانی دووەمدا درك بە هەڵەی فێربوونی زمانەكەیان دەكەن، بەڵام  درك بە جۆر و قۆناغ و  گۆڕانی جۆری هەڵەكان ناكەن. لە پڕۆسەی فێربوونی زمانی دووەمدا  فێرخوازان لە قۆناغەكانی خوێندنی زانكۆدا بەتایبەتی لەبەشی زمانی ئینگلیزیدا بە پشتبەستن بە پاشخانی چەند ساڵی ڕابردوویان، كە زمانی ئینگلیزیان وەكو بابەتێكی سەرەكی خوێندووە، ئەوا شێوازی هەڵەی تریان تیدا بەدیدەكرێت، بەتایبەتی لە هەڵەی فۆنەتیكی و مۆرفۆلۆژی و سینتاكسی و واتا سازی و فەرهەنگی، هەروەها لە دركاندنیشدا هەڵەیان هەیە. سەرچاوەی ئەم هەڵەكردنانەش  بۆ كاریگەری زمانی یەكەم، بۆ هه‌ڵه‌ پێشكه‌وتووه‌كان، كه‌  له‌ خودی زمانی دووه‌م به‌رهه‌م دێت، ئه‌و هه‌ڵانه‌ی سه‌رچاوه‌كه‌ی بۆ سروشتی زمانی زاره‌كی، ئه‌و هه‌ڵانه‌ی له‌ فێركاره‌وه‌ ڕووده‌ده‌ن ده‌گه‌ڕێته‌وه.‌       

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Computational Thermal Sciences: An International Journal
EXPERIMENTAL AND NUMERICAL ANALYSIS FOR THERMAL PROBLEM OF FRICTIONAL BRAKE SYSTEM
...Show More Authors

The present work aims to validate the experimental results of a new test rig built from scratch to evaluate the thermal behavior of the brake system with the numerical results of the transient thermal problem. The work was divided into two parts; in the first part, a three-dimensional finite-element solution of the transient thermal problem using a new developed 3D model of the brake system for the selected vehicle is SAIPA 131, while in the second part, the experimental test rig was built to achieve the necessary tests to find the temperature distribution during the braking process of the brake system. We obtained high agreement between the results of the new test rig with the numerical results based on the developed model of the brake

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu May 01 2003
Journal Name
Renewable Energy
FT-IR and XPS analysis of a-Si1-xGex:H thin films
...Show More Authors

View Publication
Scopus (15)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Wed May 26 2021
Journal Name
Communications In Mathematical Biology And Neuroscience
Modelling and stability analysis of the competitional ecological model with harvesting
...Show More Authors

The interplay of predation, competition between species and harvesting is one of the most critical aspects of the environment. This paper involves exploring the dynamics of four species' interactions. The system includes two competitive prey and two predators; the first prey is preyed on by the first predator, with the former representing an additional food source for the latter. While the second prey is not exposed to predation but rather is exposed to the harvest. The existence of possible equilibria is found. Conditions of local and global stability for the equilibria are derived. To corroborate our findings, we constructed time series to illustrate the existence and the stability of equilibria numerically by varying the different values

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Engineering
Numerical and Experimental Analysis of Aircraft Wing Subjected to Fatigue Loading
...Show More Authors

This study deals with the aircraft wing analysis (numerical and experimental) which subjected to fatigue loading in order to analyze the aircraft wing numerically by using ANSYS 15.0 software and experimentally by using loading programs which effect on fatigue test specimens at laboratory to estimate life of used metal (aluminum alloy 7075-T651) the wing metal and compare between numerical and experimental work, as well as to formulate an experimental mathematical model which may find safe estimate for metals and most common alloys that are used to build aircraft wing at certain conditions. In experimental work, a (34) specimen of (aluminum alloy 7075-T651) were tested using alternating bending fatigue machine rig. The t

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 18 2023
Journal Name
International Journal Of Development In Social Sciences And Humanities
A CRITICAL DISCOURSE ANALYSIS OF SELECTED POLITICAL SPEECH ON ONLINE EDUCATION
...Show More Authors

PDBN Rashid, International Journal of Development in Social Sciences and Humanities, 2023

View Publication
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
The Bifurcation Analysis of Food Web Prey- Predator Model with Toxin
...Show More Authors
Abstract<p>Local and global bifurcations of food web model consists of immature and mature preys, first predator, and second predator with the current of toxicity and harvesting was studied. It is shown that a trans-critical bifurcation occurs at the equilibrium point <italic>E</italic> <sub>0</sub>, and it revealed the existence of saddle-node bifurcation occurred at equilibrium points <italic>E</italic> <sub>1</sub>, <italic>E</italic> <sub>2</sub> and <italic>E</italic> <sub>3</sub>. At any point, the occurrence of bifurcation of the pitch for</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Mon Oct 09 2023
Journal Name
2023 Ieee 34th International Symposium On Software Reliability Engineering Workshops (issrew)
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Apr 25 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences (ihjpas)
Spectrophotometric Investigations for Simultaneous Analysis of Certain Antibacterial: A Brief Review
...Show More Authors

Antibacterial substances belong to a group of compounds that attack dangerous microorganisms. Therefore, killing bacteria or reducing their metabolic activity will lessen their adverse effects on a biological system. They originated from either synthetic materials, microbes, or mold. Many of these medications treat the gram-negative bacteria from the critical precedence group, such as pseudomonas, carbapenem-resistant acinetobacter, and enterobacterales. This study aims to investigate the simultaneous analysis of specific antibacterial spectrophotometrically. The WHO maintains this list of priority infections with antibiotic resistance. Drug combinations in single dosage forms are becoming increasingly popular in the pharmaceutical industry

... Show More
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Mon Aug 17 2020
Journal Name
International Journal Of Applied Mechanics And Engineering
Analysis of structural concrete bar members based on secant stiffness methods
...Show More Authors

In this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A comparison between numerical and experimental data, illustrated

... Show More
Scopus