Lexicography, the art and craft of dictionary-making, is as old as writing. Since its very early stages several thousands of years ago, it has helped to serve basically the every-day needs of written communication among individuals in communities speaking different languages or different varieties of the same language. Two general approaches are distinguished in the craft of dictionary-making: the semasiological and the onomasiological. The former is represented by usually-alphabetical dictionaries as such, i.e. their being inventories of the lexicon, while the latter is manifested in thesauruses. English and Arabic have made use of both approaches in the preparation of their dictionaries, each having a distinct aim ahead. Wit
... Show MoreReading is an interactive process that goes on between the reader and the text, resulting in comprehension. The text presents letters, words, sentences, and paragraphs that encode meaning. The reader uses knowledge, skills, and strategies to determine what that meaning is. Reading comprehension is much more than decoding; it results when the reader knows which skills and strategies are appropriate for the type oftext, and understands how to apply them to accomplish the reading purpose.Reading comprehension is important because without it reading is nothing more than tracking symbols on a page with your eyes and sounding them out leaving the reader with no information. Instead of promoting traditional approaches, reading should be taught
... Show MoreReading is an interactive process that goes on between the reader and the text, resulting in comprehension. The text presents letters, words, sentences, and paragraphs that encode meaning. The reader uses knowledge, skills, and strategies to determine what that meaning is. Reading comprehension is much more than decoding; it results when the reader knows which skills and strategies are appropriate for the type oftext, and understands how to apply them to accomplish the reading purpose.Reading comprehension is important because without it reading is nothing more than tracking symbols on a page with your eyes and sounding them out leaving the reader with no information. Instead of promoting traditional approaches, reading should be ta
... Show MoreThis research aims at analysing epitaphs written by Thomas Moore for the memory of Rupert Southey, the epitaph is analysed linguistically and stylistically on four levels graphology, phonology, morphology, and lexico-syntax level to explore the elements that the writer uses the most at each level. Bearing in mind Nowottny approach (1962) (to text analysis) who believes that the linguistic analysis of a literary text is not just a marginal but a necessity” (Bakuuro etal., 2018:34). The researcher has selected and analysed a written epitaph of famous individual associated with English, literature. The study involves both literary and linguistic analysis, with much more concentration through the analysis on the aspect of linguistics. In fact
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreIn this work, satellite images for Razaza Lake and the surrounding area
district in Karbala province are classified for years 1990,1999 and
2014 using two software programming (MATLAB 7.12 and ERDAS
imagine 2014). Proposed unsupervised and supervised method of
classification using MATLAB software have been used; these are
mean value and Singular Value Decomposition respectively. While
unsupervised (K-Means) and supervised (Maximum likelihood
Classifier) method are utilized using ERDAS imagine, in order to get
most accurate results and then compare these results of each method
and calculate the changes that taken place in years 1999 and 2014;
comparing with 1990. The results from classification indicated that
The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show More