Vol. 6, Issue 1 (2025)
Kurdish language multifunctional morphemes indicate the different functional morphological, syntactical, and semantic tasks of the morphemes. The present study discusses the multifunctional task of the Morpheme Le in Kurdish Language. The Morpheme Le has marginally been included in other studies, yet up to the present times, there has not been a research inclusively dedicated to thoroughly discuss and clarify its multifunctional aspects. The present study is divided into two chapters: Chapter one discusses the theoretical aspect of chapter two that is entirely concerned with the practical aspect of the morpheme Le. The first part of chapter one sheds light on the morphological aspect of the morpheme while part two discusses
... Show MoreThe current paper aims at knowing the effect of Exemplar of Wettli On Acquiring Grammatical Concepts Among Basic 7th Class Female Students in Kurdish Language Grammar.
The current paper is confined to a sample of Basic 7th Class Female Students- Khaniqin –belonged Morning schools for the academic year 2014-2015 . The sample amounted 50 female students distributed on two sections ( A,B) . Section A represented experimental group ( 24) female students studied according to the exemplar of ( Wettli) and (B) represented control group (26) female students who have studied with traditional method. The researcher has qualified between these two groups b
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreThere are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.
The importance of kick tolerance in well operations has recently increased due to its implications in well design, in drilling and well control. To study a simple method for the application of kick tolerance concept in an effective way on the basis of field data, this research purpose is to improve knowledge about Kick Tolerance and represents a technical basis for the discussion on revision of standard procedure.
The objective of this work is to review and to present a methodology of determination the kick tolerance parameters using the circulation kicks tolerance concepts.
The proposed method allows to know, to evaluate and to analyze the kick tolerance problem in order to make the drilling exe
... Show MoreThe importance of kick tolerance in well operations has recently increased due to its implications in well design, in drilling and well control. To study a simple method for the application of kick tolerance concept in an effective way on the basis of field data, this research purpose is to improve knowledge about Kick Tolerance and represents a technical basis for the discussion on revision of standard procedure. The objective of this work is to review and to present a methodology of determination the kick tolerance parameters using the circulation kicks tolerance concepts. The proposed method allows to know, to evaluate and to analyze the kick tolerance problem in order to make the drilling execution safer and more economical by reducin
... Show MoreOne study whose importance has significantly grown in recent years is lip-reading, particularly with the widespread of using deep learning techniques. Lip reading is essential for speech recognition in noisy environments or for those with hearing impairments. It refers to recognizing spoken sentences using visual information acquired from lip movements. Also, the lip area, especially for males, suffers from several problems, such as the mouth area containing the mustache and beard, which may cover the lip area. This paper proposes an automatic lip-reading system to recognize and classify short English sentences spoken by speakers using deep learning networks. The input video extracts frames and each frame is passed to the Viola-Jone
... Show More