Preferred Language
Articles
/
F2FKbZkBdMdGkNqjlCe4
The Pragmatic Argumentation of Discourse Markers in English Academic Writing: A Corpus-Based Analysis الحجة التداولية لعلامات الخطاب في الكتابة الأكاديمية الإنكليزية: تحليل يعتمد على البيانات المحوسبة
...Show More Authors

Academic writing is a key skill for success in academic life, particularly for graduate students of a foreign language. The importance of writing to academic culture, practice, and knowledge building has led to a great deal of research in many fields, including rhetoric and composition, linguistics, applied linguistics, and English for Academic Purposes (EAP). Often, studies and research investigating academic writing are motivated by the need to inform the learning of writing to native and non-native English-speaking students, through both descriptions of professional academic writing as well as through comparisons of novice writer (native and non-native Englishspeaking) and expert production. However, while learning about academic writing to better inform teaching content and practices is an important aim, Bazerman (1994, P. 10) points out that understanding language use in the disciplines also helps us to use language more effectively, can guide writers and editors as they work with contributor texts, and helps provide non-specialist readers with access to the discourse of the disciplines. Thus, describing and understanding patterns and pragmatic of argumentation of language use in academic writing allows us to understand the disciplinary cultures and practices that they embody. This is why many linguists and scholars have long been fascinated with the language of academia, particularly in the form of written texts. This interest has developed and expanded over the past few decades, in part due to the premise that much can be learned about disciplinary practices and cultures by examining academic writing: the primary means of the transmission of knowledge in academic fields.

Publication Date
Tue Jul 27 2021
Journal Name
Journal Of Craniofacial Surgery
Morphometric Analysis of the Mental Foramen Variation in an Iraqi Population by Using Cone-Beam Computed Tomography
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2014
Journal Name
كلية التربية -الجامعة المستنصرية
study the electron drift velocity in gas mixtures of SF6 with N2 obtained from Boltzmann equation analysis
...Show More Authors

Publication Date
Tue Jul 01 2008
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
THE STUDY OF MINERALOGICAL AND MICROFACIES ANALYSIS SHIRANISH FORMATION WELL (KH-6) ANSAB AREA IN SOUTHERN IRAQ
...Show More Authors

The study of Shiranish Formation rocks in southern part of Iraq at Ansab area well (KH-6)
were carried out. The formation is tongued with tayarat formation, which bounded from top
and bottom, the upper tongue at thickness 49m. and tongued at depth (476-525m.) the lower
tongue at thickness 4m. tongued at (541-537m.).
The rocks of this formation were divided into three sedimentary microfacies:
1- Dolomitized formininferal Wackestone facies.
2- Dolomitized formininferal Mudstone facies.
3- Dolostone facies.
34 slides were investigated depending on mineralogical, compositional and biological
processes and compared diagenesis which reflect open marine shelf at lower part of formation
(F.Z.2) (S.M.F.8), but at the

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
The Dynamics and Analysis of Stage-Structured Predator-Prey Model Involving Disease and Refuge in Prey Population
...Show More Authors
Abstract<p>Start your abstract here the objective of this paper is to study the dynamical behaviour of an eco-epidemiological system. A prey-predator model involving infectious disease with refuge for prey population only, the (SI_) infectious disease is transmitted directly, within the prey species from external sources of the environment as well as, through direct contact between susceptible and infected individuals. Linear type of incidence rate is used to describe the transmission of infectious disease. While Holling type II of functional responses are adopted to describe the predation process of the susceptible and infected predator respectively. This model is represented mathematically by </p> ... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Analysis of Fatty Acid Composition in the Seed and flower oil of Syrian Ligustrun Lucidum and olive oil
...Show More Authors

The fatty acid composition in the seed and flower of Ligustrun lucidum and olive oil was studied by Gas Chromatography. Results showed that the main components of seed oil were Palmitic (C16:0) 5,893% ,Palmitolic acid (C16:1)0,398%, Steaeic (C18:0)2,911% ,Oleic (C18:1)74,984%,Linoleic (C18:2) 12,959%,and Linolenic (C18:3) 0,997%. The proportion of unsaturated fatty acid was above 89,338%, so the seed oil of L. lucidum ait belonged to unsaturated oil which possessed promising application. The components of flower oil were Palmitic (C16:0) 65,674% ,Palmitolic acid (C16:1)6,516%, Steaeic (C18:0)2,641% ,Oleic (C18:1)14,707%,Linoleic (C18:2) 3,113%,and Linolenic (C18:3) 2,70%. The proportion of unsaturated fatty acid and saturated fatty acid wa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Structures
Reliability analysis of deteriorated post-tensioned concrete bridges: The case study of Ynys-y-Gwas bridge in UK
...Show More Authors

Concrete structures are exposed to aggressive environmental conditions that lead to corrosion of the embedded reinforcement and pre-stressing steel. Consequently, the safety of concrete structures may be compromised, and this requires a significant budgets to repair and maintain critical infrastructure. Prediction of structural safety can lead to significant reductions in maintenance costs by maximizing the impact of investments. The aim of this paper is to establish a framework to assess the reliability of existing post-tensioned concrete bridges. A time-dependent reliability analysis of an existing post-tensioned involving the assessment of Ynys-y-Gwas bridge has been presented in this study. The main cause of failure of this bridge was c

... Show More
View Publication
Scopus (28)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Thu Jun 26 2014
Journal Name
Engineering Optimization
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
...Show More Authors

The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
2017 11th Asian Control Conference (ascc)
Super-twisting based integral sliding mode control applied to a rotary flexible joint robot manipulator
...Show More Authors

In this paper, a single link flexible joint robot is used to evaluate a tracking trajectory control and vibration reduction by a super-twisting integral sliding mode (ST-ISMC). Normally, the system with joint flexibility has inevitably some uncertainties and external disturbances. In conventional sliding mode control, the robustness property is not guaranteed during the reaching phase. This disadvantage is addressed by applying ISMC that eliminates a reaching phase to ensure the robustness from the beginning of a process. To design this controller, the linear quadratic regulator (LQR) controller is first designed as the nominal control to decide a desired performance for both tracking and vibration responses. Subsequently, discontinuous con

... Show More
View Publication
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials &amp; Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Scopus Clarivate Crossref