Borrowing in linguistics refers to the process whereby a group of speakers incorporates certain foreign linguistic components into their home language via a process known as linguistic borrowing. The process by which these foreign linguistic elements, known as loanwords, go through phonological, morphological, or semantic changes in order for them to fit the grammar of the recipient language is referred to as loanword adaptation. Loanwords go through these changes in order for them to become compatible with the grammar of the recipient language. One of the most divisive topics in loanword phonology is whether adaptations occur at the phonemic or phonetic levels, and current literature distinguishes three primary viewpoints: nativization-through-perception, nativization-through-production, and the Optimality Model. This article provides an overview of lexical borrowing and then presents a detailed account of the three models of phonological loanword adaptation.
In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreHeritage is considered as the civilization and cultural wealth accumulated over the . centuries, whereas architectural heritage is the physical witness of that civilization. Despite the fact that architectural heritage is the most important effort for economic development of any communit,، it suffers from deterioration and neglection especially in the Arab communities. Recently awareness has increased about the importance of investing on architectural heritage generally and sustainable investment particularly. The goal of investment process in heritage areas is to revive economic activity in addition to attempt to revive the heritage and community values. Research aims to examine the relationship between sustainable investment and
... Show MoreProducing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreThis study examines strategies of cultural domestication in Muravyov and Kistyakovsky’s Russian translation of (The Fellowship of the Ring). It documents transformations of character names, toponyms, dialogues, and cultural references, highlighting systematic Russification and the infusion of Soviet political commentary that reshape the text into cultural rewriting.
بهذا البحث نقارن معاييرالمعلومات التقليدية (AIC , SIC, HQ , FPE ) مع معيارمعلومات الانحراف المحور (MDIC) المستعملة لتحديد رتبة انموذج الانحدارالذاتي (AR) للعملية التي تولد البيانات,باستعمال المحاكاة وذلك بتوليد بيانات من عدة نماذج للأنحدارالذاتي,عندما خضوع حد الخطأ للتوزيع الطبيعي بقيم مختلفة لمعلماته
... Show More