Preferred Language
Articles
/
whZ58osBVTCNdQwCzeZw
The Impact of Teachers using Storytelling Techniques through Virtual Instruction to Increase English Speaking Ability
...Show More Authors

DBN Rashid, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021

View Publication
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Different Development Scenarios to Increase the Production Rates for Fauqi Oil Field Southeastern Iraq
...Show More Authors

The Fauqi field is located about 50Km North-East Amara town in Missan providence in Iraq. Fauqi field has 1,640 MMbbl STOIIP, which lies partly in Iran. Oil is produced from both Mishrif and Asmari zones. Geologically, the Fauqi anticline straddles the Iraqi/Iranian border and is most probably segmented by several faults. There are several reasons leading to drilling horizontal wells rather than vertical wells. The most important parameter is increasing oil recovery, particularly from thin or tight reservoir permeability. The Fauqi oil field is regarded as a giant field with approximately more than 1 billion barrels of proven reserves, but it has recently experienced low production rate problems in many of its existing wells. This study

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 30 2018
Journal Name
Pharmacy Practice
Measuring the health literacy level of Arabic speaking population in Saudi Arabia using translated health literacy instruments
...Show More Authors

View Publication
Scopus (17)
Crossref (5)
Scopus Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-adab Journal
Applying the Theory of Grammatical Metaphor to Two English Short Stories
...Show More Authors

This paper identifies and describes the textual densities of ideational metaphors through the application of GM theory (Halliday, 1994) to the textual analysis of two twentieth century English short stories: one American (The Mansion (1910-11), by Henry Jackson van Dyke Jr.), and one British (Home (1951), by William Somerset Maugham). One aim is to get at textually verifiable statistical evidence that attests to the observed dominance of GM nominalization in academic and scientific texts, rather than to fiction (e.g. Halliday and Martin (1993). Another aim is to explore any significant differentiation in GM’s us by the two short- story writers. The research has been carried out by identifying, describing, and statistically analysi

... Show More
View Publication
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
The degree of using electronic educational alternatives in education from the teachers 'and female teachers' point of view Intermediate stage in southern border schools and its relationship to some variables
...Show More Authors

The aim of the current research is to know the degree to which middle school teachers and female teachers in the southern border schools use electronic educational alternatives in the field of education from their point of view and its relationship to some variables, and to achieve this goal, a random sample of (200) teachers was selected in southern border schools, and a questionnaire was prepared to collect The data, as well as the descriptive approach was used to achieve this goal. T-test and analysis of variance were used for the statistical treatment. The results concluded that the educational courses provided to male and female teachers are not sufficient. It has also been concluded that the use of electronic educational alternativ

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Mar 04 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
Functional Load and Pronunciation Instruction in the Iraqi EFL Context
...Show More Authors

MR Younus, 2022

View Publication
Publication Date
Thu May 30 2019
Journal Name
لارك
Approaches to Lexicography in English and Arabic
...Show More Authors

Lexicography, the art and craft of dictionary-making, is as old as writing. Since its very early stages several thousands of years ago, it has helped to serve basically the every-day needs of written communication among individuals in communities speaking different languages or different varieties of the same language. Two general approaches are distinguished in the craft of dictionary-making: the semasiological and the onomasiological. The former is represented by usually-alphabetical dictionaries as such, i.e. their being inventories of the lexicon, while the latter is manifested in thesauruses. English and Arabic have made use of both approaches in the preparation of their dictionaries, each having a distinct aim ahead. Wit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The contribution of information systems to increase tax revenues: An applied research at the General Commission of Taxes
...Show More Authors

The research aims to study the contribution of tax information systems to increase tax revenues, and to identify how efficiently used information systems currently by the tax authority and their effectiveness in the detection of irregularities by the tax payers such as the cleclaration of incorrect statements that do not show real results of their business activities or hide information from sources related to their income subject to tax, which would negatively affect the outcome of tax revenues and thus damage important sourse of the public treasury of the states resources. The data of research was collected by studying and analysing the tax information systems used by the General Commission of taxs and its branches and a number of prac

... Show More
View Publication
Crossref
Publication Date
Wed May 09 2018
Journal Name
International Journal Of Advanced Computer Science And Applications
New Techniques to Enhance Data Deduplication using Content based-TTTD Chunking Algorithm
...Show More Authors

View Publication
Scopus (11)
Crossref (8)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
The 2d International Conference Of Buildings, Construction And Environmental Engineering (bcee2-2015)
Terrestrial Laser Scanning to Preserve Cultural Heritage in Iraq Using Monitoring Techniques
...Show More Authors

English

View Publication