Preferred Language
Articles
/
2hbJSYsBVTCNdQwCe8jM
A Corpus-Based Approach to the Study of Vocabulary in English Textbooks for Iraqi Intermediate Schools
...Show More Authors

Learning the vocabulary of a language has great impact on acquiring that language. Many scholars in the field of language learning emphasize the importance of vocabulary as part of the learner's communicative competence, considering it the heart of language. One of the best methods of learning vocabulary is to focus on those words of high frequency. The present article is a corpus based approach to the study of vocabulary whereby the research data are analyzed quantitatively using the software program "AntWordprofiler". This program analyses new input research data in terms of already stored reliable corpora. The aim of this article is to find out whether the vocabularies used in the English textbook for Intermediate Schools in Iraq are consistent with the vocabulary selection criteria already established in the field in terms of high/low frequency, coverage, word families and recycling. The findings of this study reveal that the Iraqi first intermediate school English textbook (English for Iraq) contains numerous number of vocabulary with low frequency, low number of word families, an average around 90% of coverage, and no/ or insufficient recycling. Therefore, a re-evaluation and modification was suggested to be done for this course.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 19 2025
Journal Name
Annals Of Applied Sport Science
A Comparative Study of the Average Motor Response Time for the Arms and Legs of Handball, Basketball, and Volleyball Players Aged 14-16 Years
...Show More Authors

Background. The motor response is a fundamental ability that is evident during any physical or motor activity. However, the need for this ability varies from one sport to another and depends on the specific skills required in each sport. Objectives. This study aims to compare the average motor reaction times of the arm and leg among handball, basketball, and volleyball players aged 14 to 16 years. Methods. The sample included 30 players aged 14-16 years from the sports talent care center, evenly distributed on handball, basketball, and volleyball. Standardized tests were used to measure the speed of motor response, including the Batak Micro test for hands, which records the number of responses to light stimuli in 30 seconds, and the Saqer t

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Journal Of The College Of Education For Women
The Exploratory and Confirmatory Factorial Structure of Test-Wiseness Scale: A Field Study on a Sample of Students in Hama University
...Show More Authors

The current research aims to recognize the exploratory and confirmatory factorial structure of the test-wiseness scale on a sample of Hama University students, using the descriptive method. Thus, the sample consists of (472) male and female students from the faculties of the University of Hama. Besides, Abu Hashem’s 50 item test-wiseness scale (2008) has been used. The validity and reliability of the items of the scale have also been verified, and six items have been deleted accordingly. The results of the exploratory factor analysis of the first degree have shown the presence of the following five acceptable factors: (exam preparation, test time management, question paper handling, answer sheet handling, and revision).  Moreover,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Use the le'vy Model on stock returns for some Iraqi banks estimate
...Show More Authors

 

In this article we  study a single stochastic process model for the evaluate the assets pricing and stock.,On of the models le'vy . depending on the so –called Brownian subordinate as it has been depending on the so-called Normal Inverse Gaussian (NIG). this article aims as the estimate that the parameters of his model using my way (MME,MLE) and then employ those  estimate of the parameters is the study of stock returns and evaluate asset pricing for both the united Bank and Bank of North which their data were taken from the Iraq stock Exchange.

which showed the results to a preference MLE on MME based on the standard of comparison the average square e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 29 2024
Journal Name
Journal Of Humanities And Social Sciences Researches
Measuring and Analysis the Relationship between the Internal Public Debt and the Exchange Rate in the Iraqi Economy for The Period 2004 – 2022
...Show More Authors

The scholastic view of public religion differed, and this difference was on two extremes. All economic schools agreed that public debt is a monetary liquidity that was unjustly deducted from the income and output cycle as a result of the imbalance in the economic balance and the departure from the conditions of balance between aggregate demand and aggregate supply. Debt is a waste of financial resources allocated to productive accumulation. Except for the Keynesian school, which considers public debt to be an addition to aggregate demand after the decline in the role of the private sector in investment as a result of pessimistic expectations that warn of signs of economic contraction. Public debt is linked to the ex

... Show More
Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Chemical Sensor Based on a Hollow-Core Photonic Crystal Fiber
...Show More Authors

In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.

View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Programming a Pneumatic Processes Sequence based on PLC by Demonstration
...Show More Authors

Abstract

Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref