Honorifics are linguistic expressions which maintain social as well as religious respect to other people. They are linguistic techniques which express politeness to other interlocutors. Semantically speaking, honorifics are of two types: al-Laqab (title) and al-Kuniya (teknonyms) following a specific word order. They form part of the Arab recognitions and are mold into their social and communicative competence.
The study focuses upon religious and regional honorifics which convey deference and respect. It assumes that religious and cultural recognitions play vital roles in formulating and embedding the sense of honorifics. It is hypothesized that Arab people express respect to religious personalitie
... Show MoreThis study was aimed to examined effect of Januvia treatment on methionine synthases Meth and cystathionine B- synthase (CBS) in Iraqi patients type2 without treated and another group who taken Januvia treated in addition to diabetic patients with complication without treated with Januvia Also, to found the relationship between these parameters with BMI, FBS, HbA1C and Insulin levels. Firstly, the blood sampling date for this research between December and February 2019 - 2020. Blood sampling was withdrawn from 8:00 to 10:00 in the case of fasting of all substances . five milliliters of venous blood were collected by means of an antecubital venipuncture divided into two parts, one of which (2ml) was put in a tube containing anticoagulant fac
... Show MoreThe research aims to: build and record a measure of cognitive participation among second-year female students at the College of Physical Education and Sports Sciences, University of Baghdad. The researchers used the descriptive approach in the survey style for the research sample. The sample was selected from female students and divided into: (10) female students for the survey sample, and (80) female students for the construction and codification sample. The data were statistically analyzed by the researchers using SPSS, the T-test for independent and correlated samples, Pearson's simple correlation coefficient, Cronbach's alpha, Chi-square, and Spearman-Brown. They were recruited for the samples. The study concluded that constr
... Show MoreAbstract
were determine the problem of current research to answer the question on the consciousness of the Ministry of Agriculture to adopt Staffing strategy and identify the shortcomings as the independent variable, represented by the three dimensions (recruitment , selection, placement) and its impact on high performance, as dependent variable is described in four dimensions (leadership, strategy, structure and processes, culture), in this research were Used analytical descriptive style . This research aims to identify the correlation and impact of Staffing strategy at high-performance in Ministry of Agriculture , To clarify the relationship between
... Show MoreCoupling reaction of m-and p- amino acetop henone and p-amino benzoic acid with (LHistidine) gave the new bidentate azo ligands (L1, L2 and L3). The prepared ligands were identified by FT-IR, UV-Vis, 1HNMR and GC- mass sp ectroscopic technique. Treatment of the prepared ligands with the following metal ions (CoII, NiII, CuII, ZnII, CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M (L)2 Cl2]. The prepared complexes were characterized by using flame atomic absorption, FT-IR, UV-Vis and 1HNMR spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). The nature of the com
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThis study assesses the short-term and long-term interactions between firm performance, financial education and political instability in the case of Malaysia Small to Medium Enterprises (SMEs). The simultaneous insertion of financial education and political instability within the study is done intentionally to inspect the effect of these two elements in one equation for the Malaysian economy. Using the bound testing methodology for cointegration and error correction models, advanced within an autoregressive distributed lag (ARDL) framework, we examine whether a long-run equilibrium connection survives between firm performance and the above mentioned independent variables. Using this method, we uncover evidence of a positive long-term link b
... Show Moremajor goal of the next-generation wireless communication systems is the development of a reliable high-speed wireless communication system that supports high user mobility. They must focus on increasing the link throughput and the network capacity. In this paper a novel, spectral efficient system is proposed for generating and transmitting twodimensional (2-D) orthogonal frequency division multiplexing (OFDM) symbols through 2- D inter-symbol interference (ISI) channel. Instead of conventional data mapping techniques, discrete finite Radon transform (FRAT) is used as a data mapping technique due to the increased orthogonality offered. As a result, the proposed structure gives a significant improvement in bit error rate (BER) performance. Th
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show More