Preferred Language
Articles
/
jcoeduw-663
The Concept of Value in De Saussair Linguistics and their Extension in the Book (Arabic Language, Its Meaning and Structure) by Tammam Hassan
...Show More Authors

This research was distributed into two sections, the first section was concerned with the concept of value for De Saussair and its methodological impact on his linguistic structural conceptions with respect of the distinction between synchronism and diachronism, the value role of linking function between the sounds and the though, the basing of his theoretical conception on the language being a form and not a material according to this principle and the value impact on the demonstration that the linguistic element acquires its functional importance from the relations inside the language system. It also stopped at the methodological impact of value on defining the analytical linguistic unit and the value role in semantics through the principle opposition and the relations among the systems vocabulary; addressing the issue of linguistic synonymy as the most important truth that can be treated within the view of the concept of value. As for the second section, it was concerned with the concept of value for Tammam Hassan in his book (Arabic Language, Its Meaning and Structure) explaining the crystallization of the Arabic term of value and the conformity extent of its concept to the theoretical origin of De Saussair showing the precedence of Hassan in terminology and the theoretical receipt of this concept, then the second section addressed the notes recorded by Hassan against the Arab linguists in their heritage explaining conceptions by his basing on the concept of value. The research followed the descriptive analytical methodology for Hassan which was based on the principle of value in distinguishing among the system levels (phonetics, morphology, syntax) revealing the greatvariance between the Saussairian theoretical origin and the applied dimension for Hassan, then it stopped at the issue of lexicon for Hassan and not considering it a system of the language subsystems. The research criticized this conception within the light of the value concept .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 18 2024
Journal Name
Karbala International Journal Of Modern Science
Synthesis of ZnO: ZrO2 Nanocomposites Using Green Method for Medical Applications
...Show More Authors

View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Natural Volatiles And Essential Oils
Zerumbone induces growth inhibition of Burkitt’s lymphoma cell line via apoptosis
...Show More Authors

Zerumbone (ZER), a natural compound has been extracted from Zingiber zerumbet with known pharmacological activities. The aim was to determine the anti-human Burkitt’s lymphoma (Raji) cell effect of ZER. The 3-(4,5-dimethylthiazol-2-yl)-2,5,-diphenyltetrazolium bromide (MTT) assay was used to determine cytotoxic effect while the Annexin-V-fluorescein isothiocyanate/propidium iodide-PI flow cytometric assays was used to determine apoptotic effect of ZER on the human Burkitt’s lymphoma (Raji) cell (ATCC CCL-86) cell line. The expressions of Bax, Bcl-2, and c-Myc genes were determined via real-time PCR. ZER suppressed the proliferation of Raji cells with a 48 h IC50 value of 5.1 μg/mL. Treated Raji cells also underwen

... Show More
View Publication
Scopus (18)
Crossref (6)
Scopus Crossref
Publication Date
Mon Dec 02 2024
Journal Name
Engineering, Technology & Applied Science Research
An Artificial Neural Network Prediction Model of GFRP Residual Tensile Strength
...Show More Authors

This study uses an Artificial Neural Network (ANN) to examine the constitutive relationships of the Glass Fiber Reinforced Polymer (GFRP) residual tensile strength at elevated temperatures. The objective is to develop an effective model and establish fire performance criteria for concrete structures in fire scenarios. Multilayer networks that employ reactive error distribution approaches can determine the residual tensile strength of GFRP using six input parameters, in contrast to previous mathematical models that utilized one or two inputs while disregarding the others. Multilayered networks employing reactive error distribution technology assign weights to each variable influencing the residual tensile strength of GFRP. Temperatur

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Apr 30 2017
Journal Name
Journal Of Engineering
Implementation of a Proposed Load-Shedding System Using Altera DE2 FPGA
...Show More Authors

A load-shedding controller suitable for small to medium size loads is designed and implemented based on preprogrammed priorities and power consumption for individual loads. The main controller decides if a particular load can be switched ON or not according to the amount of available power generation, load consumption and loads priorities. When themaximum allowed power consumption is reached and the user want to deliver power to additional load, the controller will decide if this particular load should be denied receiving power if its priority is low. Otherwise, it can be granted to receive power if its priority is high and in this case lower priority loads are automatically switched OFF in order not to overload the power generation. The

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Performance of STBC Based MIMO-OFDM Using Pilot-aided Channel Estimation
...Show More Authors

Many studies have been published to address the growing issues in wireless communication systems. Space-Time Block Coding (STBC) is an effective and practical MIMO-OFDM application that can address such issues. It is a powerful tool for increasing wireless performance by coding data symbols and transmitting diversity using several antennas. The most significant challenge is to recover the transmitted signal through a time-varying multipath fading channel and obtain a precise channel estimation to recover the transmitted information symbols. This work considers different pilot patterns for channel estimation and equalization in MIMO-OFDM systems. The pilot patterns fall under two general types: comb and block types, with

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Removal of Cadmium Ions from Simulated Wastewater Using Rice Husk Biosorbent
...Show More Authors

Biosorption of cadmium ions from simulated wastewater using rice husk was studied with initial concentration of 25 mg/l. Equilibrium isotherm was studied using Langmuir, Freundlich, BET and Timken models. The results show that the Freundlich isotherm is the best fit model to describe this process with high determination coefficient equals to 0.983. There was a good compliance between the experimental and theoretical results. Highest removal efficiency 97% was obtained at 2.5g of adsorbent, pH 6 and contact time 100 min.

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Iron Permeable Reactive Barrier for Removal of Lead from Contaminated Groundwater
...Show More Authors

The possibility of using zero-valent iron as permeable reactive barrier in removing lead from a contaminated groundwater was investigated. In the batch tests, the effects of many parameters such as contact time between adsorbate and adsorbent (0-240 min), initial pH of the solution (4-8), sorbent dosage (1-12 g/100 mL), initial metal concentration (50-250 mg/L), and agitation speed
(0-250 rpm) were studied. The results proved that the best values of these parameters achieve the maximum removal efficiency of Pb+2 (=97%) were 2 hr, 5, 5 g/100 mL, 50 mg/L and 200 rpm respectively. The sorption data of Pb+2 ions on the zero-valent iron have been performed well by Langmuir isotherm model in compared with Freundlich model under the studied

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Construction of Graduation Certificate Issuing System Based on Digital Signature Technique
...Show More Authors

With the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and s

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 17 2020
Journal Name
International Journal Of Applied Mechanics And Engineering
Analysis of Structural Concrete Bar Members Based on Secant Stiffness Methods
...Show More Authors
Abstract<p>In this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A compari</p> ... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (7)
Crossref