Learning the vocabulary of a language has great impact on acquiring that language. Many scholars in the field of language learning emphasize the importance of vocabulary as part of the learner's communicative competence, considering it the heart of language. One of the best methods of learning vocabulary is to focus on those words of high frequency. The present article is a corpus based approach to the study of vocabulary whereby the research data are analyzed quantitatively using the software program "AntWordprofiler". This program analyses new input research data in terms of already stored reliable corpora. The aim of this article is to find out whether the vocabularies used in the English textbook for Intermediate Schools in Iraq are consistent with the vocabulary selection criteria already established in the field in terms of high/low frequency, coverage, word families and recycling. The findings of this study reveal that the Iraqi first intermediate school English textbook (English for Iraq) contains numerous number of vocabulary with low frequency, low number of word families, an average around 90% of coverage, and no/ or insufficient recycling. Therefore, a re-evaluation and modification was suggested to be done for this course.
The semantic analysis is characterized by its ability to describe the communicative pattern and its high efficiency in questioning its semantic manifestations and its deliberative purposes, which helped to understand the symbolic, contextual and cultural manifestations of the structure of the pattern, whether verbal or nonverbal. In order to highlight the role of the semiautomatic approach and its application to a sample of slogans collected from "media, social networking sites, in-kind views, media institutions, etc." to study the components and analyze the contents and highlight the signs. His boat logo is not just uttered as a linguistic transmission of a message, but as a political Tghieria actually . For example, the slogan "People Wan
... Show MoreThe Iraqi and Iranian pottery has a significant role in the contemporary world pottery space, despite the fact that influences created those formulation, thus the researcher supposes that there is a relation between the potter and his environment within Iraq's environment and Iran's environment, which are similar at times and different at other times. The researcher, hence, found himself in front of a number of questions:
1- How much was the Iraqi potter inspired by the environment compared to the Iranian potter?
2- Has the Iraqi and Iranian pottery been really inspired by the environment items or there were modified metaphors?
The current research aims at (identifying the influential environmental characteristics in the Iraq
The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire
... Show MoreThe research aims to identify the importance of using the style of the cost on the basis of activity -oriented in time TDABC and its role in determining the cost of products more equitably and thus its impact on the policy of allocation of resources through the reverse of the changes that occur on an ongoing basis in the specification of the products and thus the change in the nature and type of operations . The research was conducted at the General Company for Textile Industries Wasit / knitting socks factory was based on research into the hypothesis main of that ( possible to calculate the cost of activities that cause the production through the time it takes to run these activities can then be re- distributed product cost
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe study aims to identify the colleges women in the USA where he was browsing the Internet for five universities and sixty-two women's college located these colleges in 25 states only three general and other civil 51% supported by the churches and religious associations of various began its founding in Alqrnn eighteenth and continued in the nineteenth and twentieth and to provide an opportunity for women to complete higher education, while most men's colleges opened their doors to the admission of women and turned it on coeducation