Preferred Language
Articles
/
jcoeduw-1631
Constructing Imminent Carcinogenic Attack in English and Arabic Scientific Discourse: A Corpus-Based Contrastive Study
...Show More Authors

Cancer is one of the critical health concerns. Health authorities around the world have devoted great attention to cancer and cancer causing factors to achieve control against the increasing rate of cancer. Carcinogens are the most salient factors that are accused of causing a considerable rate of cancer cases. Scientists, in different fields of knowledge, keep warning people of the imminent attack of carcinogens which are surrounding people in the environment and may launch their attack at any moment. The present paper aims to investigate the linguistic construction of the imminent carcinogen attack in English and Arabic scientific discourse. Such an investigation contributes to enhancing the scientists’ awareness of the linguistic conduct they follow in attracting people’s attention towards the risk of the approaching attack. The linguistic awareness also helps maintain better promotion of people’s pre-emptive responses that can reduce the potential for cancer cases. To achieve this aim, the paper adopts dual methodological procedures of qualitative and quantitative analyses. Cap’s (2013) proximization theory of threat and crisis construction is adopted for both qualitative and quantitative procedures. The mathematical calculations and statistical results for discourses in both languages are maintained by corpus linguistic analysis using Anthony’s (2019) software, AntConc. The paper has come up to certain conclusions that shed light on the similarities and differences in the construction of the imminent carcinogen attack in both languages. English scientific discourse has shown more reliance on temporal proximization to envisage the imminent attack of carcinogens against human bodies. Categories 1, 2, 3 and 5 are all more dominant in the English scientific discourse. However, both English and Arabic discourses show diversity in the density and employment of the lexico- grammatical tools (categories) that manifest the carcinogen attack.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
دراسات دولية
Importance of Promoting the Study of Scientific Research Methodology in Political Science
...Show More Authors

There are main methods of scientific research, and that the researcher's choice of the appropriate methodology for scientific research is one of the most important rules on which the researcher must rely in order to prepare scientific research properly. There is no doubt that the methodology of scientific research is of great importance that they all agree on the preparation of accurate scientific research. Scientific research is an organized research that does not come by chance, but comes as a result of the activity of the mind. It is theoretical because it relies on theories for the purposes of perceiving the proportions and relationships between things, and everyone is subjected to testing and experiment.

Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Language Academy
A LINGUISTIC INVESTIGATION OF CONTEXTUALIZATION IN RELIGIOUS DISCOURSE
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Ontological Methodologies for Counselling Intervention: Do’a and Zikr Al-Mā’thur Corpus
...Show More Authors

Do’a and Zikr al-Mā’thur (authentic supplications and remembrance of ALLAH ‘Azza wa Jalla) can be suggested to Muslims to help them deal with challenges or issues in life. Counselling cases affect a person’s feelings. Do’a and Zikr al-Mā’thur are often applied as a counselling intervention. Unfortunately, the authentic Do’a and Zikr al-Mā’thur are dispersed in many resources not visible to users, and the fact that not all online resources offer access to accurate Do’a and Zikr al-Mā’thur to users and the dubious Do’a and Zikr al-Mā’thur frequently credited to the Prophet (pbuh). The goal of this research is to develop an ontology

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Authority control and its role in uniting old arabic authors entries at the Central Library of the University of Baghdad and the Al-Mustansiriya: A Comparative Study
...Show More Authors

The research aims to identify the positives formulation entrances authors depending on the setting retaining the names of the authors of Arab veterans and cons of setting the entrances to Arab authors ancient depending on the nickname by desktop diligence without reference to a setting retaining the potential to benefit other libraries disciple of retaining existing in sober university libraries. Use the survey method and adopted a questionnaire distributed to the research sample consisting of employees working in the libraries in question and the total number of forms that have been distributed (50) form .tousel search phrase conclusions from them .

1-The lack of authority control depends on it to find a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Melodic and Rhythmic Construction of Monologues in Iraq
...Show More Authors

The research studies the melodic and rhythmic characteristics of monologue, in addition to how it was transferred from the Arab homeland to Iraq and   reviewed its most prominent performers, as well as a review     of the monologue types and their propagation in the Arab homeland such as comical, dramatic, and political and guidance monologues. 

The methodological framework included: the problem of the research, the importance of the research and the objective of the research which is to uncover the melodic and rhythmic structure of the monologue in Iraq.   The limits of the research included the objective limit tackling the  art of monologue and the spatial limit which is Baghdad

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An exploratory study of history-based test case prioritization techniques on different datasets
...Show More Authors

In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Mar 18 2021
Journal Name
Review Of International Geographical Education Online
Chomsky&#39;s Political Views as a Case Study in a Critical Discourse Analysis of Ideology in the Iraqi Wars
...Show More Authors

APDBN Rashid, Review of International Geographical Education Online (RIGEO), 2021

View Publication
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Social indications (Marriage websites) - A field study in internet cafes
...Show More Authors

Marriage is considered one of the strongest ties that links between two human beings , but after the evolutions that happened in our Arab communities and specifically in the Iraqi community , marriage through the internet websites appeared . this kind of marriage is considered one of the new phenomena that appeared in the present time in many societies. That was through internet websites like yahoo , Facebook and other websites that have chat features.
The Islamic sharia looks negatively at marriage through the internet announcing that this way is harmful for both the man and the woman

View Publication Preview PDF