Preferred Language
Articles
/
jxcTa5IBVTCNdQwC_q8K
Social Media and Language Evolution: A Review of Current Theoretical Efforts on Communication and Language Change
...Show More Authors

This article is an endeavour to highlight the relationship between social media and language evolution. It reviews the current theoretical efforts on communication and language change. The descriptive design, which is theoretically based on technological determision, is used. The assumption behind this review is that the social media plays a significant role in language evolution. Moreover, different platforms of social media are characterized by being the easiest and fastest means of communication. It concludes that the current theoretical efforts have paid much attention to the relationship between social media and language evolution. Such efforts have highlighted the fact that social media platforms are awash with a lot of acronyms, cyber slangs, initialisms, morphological shortenings, etc. Much importantly, previous research has suggested that the larger the network size is, the more will be its effect on language evolution.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
SOME RESULTS ON T_PURE SUBMODULES RELATED TO SUBMODULE
...Show More Authors
Abstract<p>The aim of this work is studying many concepts of a pure submodule related to sub-module L and introducing the two concepts, T_pure submodule related to submodule and the crossing property of T_pure related to submodule. Another characterizations and study some properties of this concept.</p>
View Publication
Scopus Crossref
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
Ruling on dealing with Jews in Muslim countries
...Show More Authors

Praise be to God, who is satisfied with Islam as our religion, “He opened a clear conquest for us,” and whoever works with us through the Shari’ah works and protects us. And that our master and Mawlana Muhammad His servant and Messenger is a prophet who has been merciful and compassionate. "
And after:
The occupation of Iraq and the accompanying bone events, and the following severe obstacles, resulted in a set of problems that require legitimate stances, and satisfactory answers, remove confusion and delusion, amid the clash of opinions and contradictions of jurisprudence. Work and application.
Among the difficult problems that surfaced in light of the new political developments on the land of Iraq: (the ruling on dealing

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 12 2017
Journal Name
Int'l Journal Of Computing, Communications & Instrumentation Engg.(ijccie)
Variant Parameters effect on OFDM Estimation Power Consumption
...Show More Authors

Publication Date
Wed Nov 13 2024
Journal Name
Innovation And Technological Advances For Sustainability
Ecofriendly method to control fusarium wilt on tomato
...Show More Authors

Fusarium wilt causes economic losses on tomatoes every year. Thus, a variety of chemicals have been used to combat the disease. Pesticides have been effective in managing the disease, but they keep damaging the environment. Recently, eco-friendly approaches have been used to control plant diseases. This study aimed to achieve an environmentally safe solution using biological agents to induce systemic resistance in tomato plants to control Fusarium wilt disease caused by Fusarium oxysporum f.sp. lycopersici (FOL) in the greenhouse. The pathogen (FOL) has been molecularly confirmed and the biological agents have been isolated from the Iraqi environment. The effectiveness of the biological agents has been tested and confirmed. Results showed t

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon May 15 2017
Journal Name
International Journal Of Image And Data Fusion
Image edge detection operators based on orthogonal polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (10)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
GNSS Baseline Configuration Based on First Order Design
...Show More Authors

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic

... Show More
View Publication
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Information And Communication Convergence Engineering
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai

... Show More
Preview PDF
Scopus (7)
Scopus
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
On New Weibull Inverse Lomax Distribution with Applications
...Show More Authors

In this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data  sets

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Load Effect on Wall Attachment Fluidics Amplifier Performance
...Show More Authors

An experimental work has been conducted on wall attachment fluidics amplifiers, one of them to study the effect of output pressure or load on the amplifier performance. The output load has been simulated as a piston connected to the device output and the piston can be loaded accordingly. The results shows that the output volume flow rate increases as the supply pressure increases under different load and the output pressure remains constant as the supply pressure increases under constant load.

View Publication Preview PDF