Preferred Language
Articles
/
2hbJSYsBVTCNdQwCe8jM
A Corpus-Based Approach to the Study of Vocabulary in English Textbooks for Iraqi Intermediate Schools
...Show More Authors

Learning the vocabulary of a language has great impact on acquiring that language. Many scholars in the field of language learning emphasize the importance of vocabulary as part of the learner's communicative competence, considering it the heart of language. One of the best methods of learning vocabulary is to focus on those words of high frequency. The present article is a corpus based approach to the study of vocabulary whereby the research data are analyzed quantitatively using the software program "AntWordprofiler". This program analyses new input research data in terms of already stored reliable corpora. The aim of this article is to find out whether the vocabularies used in the English textbook for Intermediate Schools in Iraq are consistent with the vocabulary selection criteria already established in the field in terms of high/low frequency, coverage, word families and recycling. The findings of this study reveal that the Iraqi first intermediate school English textbook (English for Iraq) contains numerous number of vocabulary with low frequency, low number of word families, an average around 90% of coverage, and no/ or insufficient recycling. Therefore, a re-evaluation and modification was suggested to be done for this course.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
Peculiarity of Colloquial and Popular Vocabulary in a Collection of the Poet Alexi Kaltsof's Letters: Varonech Bazars: Специфика просторечной и диалектной лексики в эпистолярном дискурсе «воронежского прасола» Алексея кольцова
...Show More Authors

The paper studies the description of the colloquial and popular vocabulary  used by wholesales tradesmen in Varonech before the Bolshevik Revolution . The vocabulary were used in the personal letters written by the poet and sent to famous poets and critics like Belenisky, kryvesky and Malsheve. And some were sent to his father and his sister. Not only did these letter bear the personal taste, but they represented a literary product reflecting on the poet's impressions, views, ambitions, and opinion in arts, poetry, prose, and theatre. The researcher used about thirty instances of various levels of grammar, style and phonology, all representing colloquial vocabulary used commonly at the time of Alexi&nbsp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The effect of constructivist model of yager in acquiring the geographical concepts among first intermediate students in geography
...Show More Authors

The purpose of the study is to investigate the effect of the constructivist model of yager in acquiring the geographical concepts among first intermediate students in geography. The study was carried on based on the null hypothesis, which states, there is no significant difference at the level of (0.05) between the experimental group that follows yager model in learning the principles of geography, and the control group that studies the same subject considering the traditional methods of learning, the. To do so, a sample of (70) first-intermediate student were chosen purposefully from two random class for the academic year (2016-2017) divided into two groups. The selected schools located at Al-rusafa side in the city of Baghdad, as well

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 15 2022
Journal Name
Nasaq Journal
Componential Analysis of Hatred Synonymy in the Lexicons of English and Standard Arabic
...Show More Authors

ABSTRACT This paper has a three-pronged objective: offering a unitary set of semantic distinctive features to the analysis of nominal “hatred synonyms” in the lexicon of both English and Standard Arabic (SA), applying it procedurally to test its scope of functionality crosslinguistically, and singling out the closest noun synonymous equivalents among the membership of the two sets in this particular lexical semantic field in both languages. The componential analysis and the matching procedures carried have been functional in identifying ten totally matching equivalents (i.e. at 55.6%), and eight partially matching ones (i.e. at %44.4%). This result shows that while total matching equivalences do exist in the translation of certain Eng

... Show More
View Publication
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
View Publication Preview PDF
Scopus
Publication Date
Thu Nov 03 2022
Journal Name
Res Militaris
The Concept and Relation between Pragmatics and Politics in English Language
...Show More Authors

Language is essential for politics, for producing, disseminating, engaging with, and reacting to political discourse. The pragmatics of political speeches is crucial to the development of effective political communication tactics. Thus, speech is situated at the intersection of rhetoric, linguistics, and politics. In communication, intent is a pragmatic factor that plays a crucial role at the time of the communication process. Speech is of paramount importance to the social and political domains. Through the use of concepts and the relationship between language and politics, the study analyzes the function of language in communication and interpretation of intentions. The study of the relationships between language and the situations in whi

... Show More
Preview PDF
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
Perceptual Curiosity among Students of Religious Schools in Anbar Province
...Show More Authors

Abstract

The aim of the research is to identify the cognitive curiosity of students of religious schools in the al-Anbar Governorate. The sample consisted of (346) students from the secondary stage in religious schools affiliated with the Department of Religious Education and Islamic Studies. The sample included (232) males, (114) females, and (225) represented the intermediate stage, (121) represented the preparatory stage in religious schools. The researcher developed a scale of perceptual curiosity comprising (30) items with three alternatives (always applicable to me, rarely applicable to me, not applicable to me). The results showed that religious school students have a perceptive curiosity; there are no sta

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 10 2024
Journal Name
Al-mustansiriyah Journal Of Arts
Strategies for Achieving an Equivalent Level of Appellation in Arabic Tourist Texts as Translated into English
...Show More Authors

Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Adsorption Study for Chromium (VI) on Iraqi Bentonite
...Show More Authors

The subject of this research involves studying adsorption to remove hexavalent chromium Cr(VI) from aqueous solutions. Adsorption process on bentonite clay as adsorbent was used in the Cr(VI) concentration range (10-100) ppm at different temperatures (298, 303, 308 and 313)K, for different periods of time. The adsorption isotherms were obtained by obeying Langmuir and Freundlich adsorption isotherm with R2 (0.9921-0.9060) and (0.994-0.9998), respectively. The thermodynamic parameters were calculated by using the adsorption process at four different temperatures the values of ?H, ?G and ?S was [(+6.582 ? +6.547) kJ.mol-1, (-284.560 ? -343.070) kJ.mol-1 and (+0.977 ? +1.117) kJ.K-1.mol-1] respectively. This data indicates the spontaneous sorp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref