Preferred Language
Articles
/
jcolang-737
A study of the nomenclature of Russian vocabulary of Arabic origin denoting some religious worship, or denoting some political and social positions: «Лексика арабского происхождения со значением «служители религиозного культа, социального статуса» и её функционирование в русской речи»
...Show More Authors

      The present paper discusses one of the most important Russian linguistic features of Arabic origin Russian lexes denoting some religious worship or some political and social positions like Qadi, Wally, Sultan, Alam, Ruler, Caliph, Amir, Fakih, Mufti, Sharif, Ayatollah, Sheikh.. etc.  A lexical analysis of the two of the most efficient and most used words of Arabic origin Russian lexes that are “Caliph and Sheikh” is considered in the present study. The lexicographic analysis of these words makes it possible to identify controversial issues related to their etymology and semantic development.

The study is conducted by the use of the modern Russian and Arabic dictionary, specifically, (Intermediate lexicon Dictionary) where many linguistic terms borrowed from Arabic into Russian have been identified. A comparative study of lexical Data used in Russian dictionaries and that of Arabic dictionary (Intermediate lexicon Dictionary) shows significant differences in their lexical modeling. The present study provides a lexical analysis and shows the semantic, grammatical and spelling acoustic of Arabic adapted words in Russian discourse. It is safe to say that through another intermediate language, large number of Arabic lexes have, directly and indirectly, been used in Russian, something clearly modeled in Derivative Russian dictionaries.

  Аннотация

   В данной  работе обьём статьи ограничён, поэтому мы рассматрваем только два найболее эффективных, найболее интересных и найболее уботребительных слов в русском языке, это лексемы хали́ф / кали́ф и шейх, которые известно носителям русского языка и активно функционируют в русской речи.

     Лексикографический анализ этих слов позволил выявить спорные вопросы, связанные с их этимологией, показать специфику толькований арабизмов и развитие их семантики. На материале документов Национального корпуса русского языка исследовано функционирование иноязычий в речи, определено отношение слов к нарицательной и собственноименной лексике, к терминонологической системе языка-реципиента.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
SIMULATION OF OPTIMAL SPEED CONTROL FOR A DC MOTOR USING LINEAR QUADRATIC REGULATOR (LQR)
...Show More Authors


This paper describes DC motor speed control based on optimal Linear Quadratic Regulator (LQR) technique. Controller's objective is to maintain the speed of rotation of the motor shaft with a particular step response.The controller is modeled in MATLAB environment, the simulation results show that the proposed controller gives better performance and less settling time when compared with the traditional PID controller.

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Mar 05 2016
Journal Name
International Journal Of Science And Research (ijsr)
Molecular Docking Studies of Human Ubiquitin Conjugating Enzyme RAD6: A Systematic in Silico Approach
...Show More Authors

This study confirms the ubiquitin conjugating enzyme 2B (Rad6) plays a significant role in the DNA repair pathway also because the ubiquitin-conjugating pathway. The DNA repair pathway could be a variety of bypass repair mechanism where the broken base pair is bypassed by permitting the replication fork to labor under the site of injury. This is often done by a shift mechanism wherever deoxyribonucleic acid enzyme - δ is switched with DNA enzyme - η (DNAP - η). Site of DNAP - η is massive enough to permit the broken ester to labor under, and so bypass the broken nucleotide. However, this is often potential solely through the involvement of Proliferating cell nuclear antigen (PCNA) that could be a processivity issue and it acts as a plat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
Modeling of violence in a speech creativity photogrammetry Iraqi contemporary: أريج سعد عدنان الهنداوي
...Show More Authors

The latest events in Iraq and notably the fall of Mosul in the summer of 2014 have marked a turning point in The modern history of Iraq. Violent terrorist groups have overrun a vast area comprising of many towns in mid and northern Iraq causing many casualties and mass migration. Despite Iraq’s long history of pain and suffering the events of the second half of the year 2014 have been the most violent ever witnessed. From this point of view the researcher has tried to identify specifically in this time and place the effect these events have had on the Iraqi artist and to understand how the Iraqi artists depicted this violence in their works of art. The research comprises four parts; the first looked at the language used and the and pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 12 2014
Journal Name
Wireless Personal Communications
A Multi-objective Disjoint Set Covers for Reliable Lifetime Maximization of Wireless Sensor Networks
...Show More Authors

View Publication
Scopus (19)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Variation of non-diatomic algae in a martyr monument lake under different climate factors
...Show More Authors
Abstract<p>The current study was conducted in the environment of the Martyr Monument Lake in the city center of Baghdad during 2019 to monitor the impact of climatic conditions such as drought, water shortage, high temperatures in the environment of the city and the lack of water flow during the years 2015 to 2018 and their effects on some of the physical and chemical factors of water and the dynamics of the phytoplankton community in the lake environment. Heterogeneity of some studied environmental factors, including air and water temperature, permeability, water depth, pH, DO, BOD5, nutrients, nitrate, NO3, and phosphates were found. The results showed the effect of climate change and the pres</p> ... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
In vitro assessment of bracket adhesion post enamel conditioning with a novel etchant paste
...Show More Authors

Background: 37% phosphoric acid (PA) is the traditional enamel etching technique prior to bracket ‎adhesion, yet it has been implicated in numerous enamel injuries. The purpose of the current study was to create a calcium phosphate (CaP) etching paste in a ‎‎simplified capsule ‎formula that can underpin clinically ‎adequate bracket bond strength ‎without jeopardizing the ‎integrity of enamel upon ‎the debracketing procedure. Materials and Methods: micro-sized hydroxyapatite (HA) powder was mixed with 40% PA solution to prepare ‎experimental acidic CaP paste. Sixty human premolars were ‎assigned into two groups of 30 each. ‎Enamel conditioning was accomplished using 37% PA-gel‎ for control group and CaP paste for e

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Engineering
Experimental Investigation of Natural Convection into a Horizontal Annular Tube with Porous Medium Effects
...Show More Authors

In this work, an experimental investigation has been done for heat transfer by natural-convection through a horizontal concentric annulus with porous media effects. The porous structure in gap spacing consists of a glass balls and replaced by plastic (PVC) balls with different sizes. The outer surface of outer tube is isothermally cooled while the outer surface of inner tube is heated with constant heat flux condition. The inner tube is heated with different supplied electrical power levels. Four different radius ratios of annulus are used. The effects of porous media material, particles size and annulus radius ratio on heat dissipation in terms of average Nusselt number have been analyzed.

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 29 2021
Journal Name
Research Journal Of Pharmacy And Technologythis Link Is Disabled.
Exploration of a new fluoride resistance gene (Fram gene) in oral streptococcus mutans maw
...Show More Authors

Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.