It is not often easy to identify a certain group of words as a lexical bundle, since the same set of words can be, in different situations, recognized as idiom, a collocation, a lexical phrase or a lexical bundle. That is, there are many cases where the overlap among the four types is plausible. Thus, it is important to extract the most identifiable and distinguishable characteristics with which a certain group of words, under certain conditions, can be recognized as a lexical bundle, and this is the task of this paper.
The research current ( features tendency cosmic in contemporary Iraqi configuration) attempt to study the dimensions of the conceptual and philosophical foundations upon which the tendency of cosmic within the period that extended its influence beyond the place where I grew up to be circulated concepts in all parts of the world, it is no doubt that the world is now heading to rapprochement after the tremendous developments in the field of communication technology and reflected heavily on identity concepts, privacy, the concept of nation-states ... etc. to become an individual and a large area of access to other cultures, and all that aroused the interest of contemporary Iraqi artist this interest arising from the desire to keep up with d
... Show MoreThe data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.
Background: Morganella morganii is one of the important nosocomial pathogens that may cause urinary tract infection and bacteremia.Methods: The above bacterium was identified from 250 bacterial strains which were isolated from 220 urine samples of patients with urinary tract infection. Antimicrobial susceptibility, by using disk diffusion method, of isolates was tested against some antibiotics.Results: Two M. moganii strains were isolated from female catheterized urinary tract patients, and identified by conventional biochemical tests and API20E system at the first time in Iraq. Both of them produced urease and hemolysin. Antimicrobial susceptibility test showed that these strains are resistant to, amoxicillin-clavulanate, cephalothin, g
... Show MoreAbstract:
The prose poem of the 1990s is considered one of the important
contributions of the Iraqi poetic scene. The poem found a position in the Iraqi
poetry because of the favor of a group of youth poets who lefty clear traces.
Their linguistic techniques often violate the domain o9f language, significance
and image.
The poems of those youth poets moved the verse towards reality to
drink from its abundant springs in order to stand on a rigid ground. Their
linguistic traces are characterized by paradox and astonishment that are used
by the poet to construct his poem.
The paradox was considered an ideal means for constructing a
poem by some of them. The poem moved towards definitions and these
de
Sentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThe paper deals with a study of peculiarities of gluttonic text structures in the Arabic-Russian language pair at the sociolinguistic, system structural, functional-stylistic and lexico-semantic aspects from the standpoint of view at functional approach to the phenomena of language systems and the gluttonic discourse as a special type of ver bal and social discourse. Profound attention is paid to the consideration of lexical and grammatical means of explication of glutton discourse on the examples of identi cal Arabic and Russian literary texts as well as language situations in Arab countries and Russia, features of which are due to the characteristics of gluttonic discourses that reflect the features of the two different ethnolingual cu
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show More