ABSTRACT This paper has a three-pronged objective: offering a unitary set of semantic distinctive features to the analysis of nominal “hatred synonyms” in the lexicon of both English and Standard Arabic (SA), applying it procedurally to test its scope of functionality crosslinguistically, and singling out the closest noun synonymous equivalents among the membership of the two sets in this particular lexical semantic field in both languages. The componential analysis and the matching procedures carried have been functional in identifying ten totally matching equivalents (i.e. at 55.6%), and eight partially matching ones (i.e. at %44.4%). This result shows that while total matching equivalences do exist in the translation of certain English/ST nouns, there are many nouns that can only have partially matching equivalents. This finding also asserts the fact that translation is significantly an approximation task. It also highlights the relativity of the scope of functionality ascribable to semantic componential analysis. Key terms:semantic componential analysis, noun synonyms of hatred, closest synonymous equivalence, English and SA
طريقة سهلة وبسيطة ودقيقة لتقدير السبروفلوكساسين في وجود السيفاليكسين او العكس بالعكس في خليط منهما. طبقت الطريقة المقترحة بطريقة الاضافة القياسية لنقطة بنجاح في تقدير السبروفلوكساسين بوجود السيفاليكسين كمتداخل عند الاطوال الموجية 240-272.3 نانوميتر وبتراكيز مختلفة من السبروفلوكساسين 4-18 مايكروغرام . مل-1 وكذلك تقدير السيفاليكسين بوجود السبروفلوكساسين الذي يتداخل باطوال موجية 262-285.7 نانوميتر وبتراكيز مخ
... Show MoreThis research examines the quantitative analysis to assess the efficiency of the transport network in Sadr City, where the study area suffers from a large traffic movement for the variability of traffic flow and intensity at peak hours as a result of inside traffic and outside of it, especially in the neighborhoods of population with economic concentration. &n
... Show MoreAbstract
Zigbee is considered to be one of the wireless sensor networks (WSNs) designed for short-range communications applications. It follows IEEE 802.15.4 specifications that aim to design networks with lowest cost and power consuming in addition to the minimum possible data rate. In this paper, a transmitter Zigbee system is designed based on PHY layer specifications of this standard. The modulation technique applied in this design is the offset quadrature phase shift keying (OQPSK) with half sine pulse-shaping for achieving a minimum possible amount of phase transitions. In addition, the applied spreading technique is direct sequence spread spectrum (DSSS) technique, which has
... Show MoreSchool administration has an effective role in stimulating academic achievement, as it is the ideal regulation and activation of material and human power to achieve the goals of the educational process. This role has axes in the form of interests, aids, and specific procedures exercised by the school administration in improving the educational process, and assisting researchers in achieving the highest levels of academic achievement. This activation is achieved through stages of planning, organizing, coordinating, and evaluating.
To achieve the aims of this research, the researcher pursued the descriptive analytical approach, which is considered one of the most appropriate approaches to the nature of this type of research. The qu
... Show MoreThrough the researchers' acquaintance with the previous studies, the problem was identified as that the preparation of training curricula in all its units must be based on accurate scientific foundations. Positively affect the type of attack and its implication in the presence of correlational relations, whether direct or indirect, i.e., precedence in training and in preparing units Therefore, the researcher decided to build a causal model to know the relationships to show the best model of the direct straight attack. The study aimed to build a causal model for the most important physical measurements and kinetic capabilities of the direct straight attack in the research sample. The two researchers used the descriptive approach in t
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreWater supply and distribution networks play an important role in our daily activities. They make a substantial contribution to public health by providing potable water for public consumption and non-potable applications such as firefighters and other purposes such as irrigation. This study used ArcMap 10.8 and WaterGEMS CONNECT Edition update 1 version to create a hydraulic network model to simulate the pipes’ network. Detailed network information, including pipe lengths, layouts, and diameters, was given by the Baghdad Water Department. The TUF-2000H Handheld digital ultrasonic flow meter has been used to measure the water flows in the network’s source nodes. In eight junctions,
There are different types of corruptions such as administrative, political, economic and financial corruption. The corruption forms also varied such as bribery, nepotism and extortion. All types and forms of corruption play significant role in the all economic variables generally and on investments in particular, and the corruption used to be an intermediate means in reducing the rate of economic growth. The corruption contributes in reducing the domestic investments via pay bribery by investors to officials’ persons for supplemental contracts and tenders which finally leads to reduction in the investment efficiency. The corruption also contributes in rise of operational costs for the investment projects. In additio
... Show MoreBackground: The rapid evolution of Artificial Intelligence (AI) has significantly influenced Education, demonstrating substantial potential to transform traditional teaching and learning methods. AI reshapes teacher-student interactions and the relationship with knowledge. Objective: To analyze the potential benefits, ethical challenges, and limitations of AI in Education based on recent scientific literature, emphasizing the balance between technology and human interaction. Methods: A documentary research approach with a descriptive focus was employed, following the PRISMA protocol for systematic reviews. The search strategy involved analyzing evidence from 18 scientific articles published within the last six years. Results:AI o
... Show MoreEncouraging micro-enterprises for comprehensive economic development are crucial to achieve the ambitious vision 2030 of the Kingdom of Saudi Arabia.
Small and Medium enterprises are inputting around 15.5 per cent to GDP while 33 per cent contribution as a private sector to Saudi Arabia's gross domestic product (GDP). This study aims to identify the most important factors that affect the efficiency of small enterprises in Saudi Arabia. To accomplish this objective, the study was conducted for small projects via the comprehensive inventory method under the supervision of the Institute of Entrepreneurship. A total of 282 questionnaires were collected from entrepreneurs and the differentiation analysis
... Show More