Preferred Language
Articles
/
jcolang-637
Linguistic Errors in second language learning through Error Analysis theory: هه‌ڵه‌ زمانییه‌كان له‌ فێربوونی زمانی دووه‌مدا (له‌ ڕوانگه‌ی تیۆری شیكاری هه‌ڵه‌ییه‌وه‌)
...Show More Authors

Second language learner may commit many mistakes in the process of second language learning. Throughout the Error Analysis Theory, the present study discusses the problems faced by second language learners whose Kurdish is their native language. At the very stages of language learning, second language learners will recognize the errors committed, yet they would not identify the type, the stage and error type shift in the process of language learning. Depending on their educational background of English as basic module, English department students at the university stage would make phonological, morphological, syntactic, semantic and lexical as well as speech errors. The main cause behind such errors goes back to the cultural differences of the language learners. Other errors go back either to the spoken form of the second language itself or to the teacher teaching the second language.       

لە فێربوونی زمانی دووەمدا  فێرخوازی زمانی دووەم دووچاری هەڵەی جۆراوجۆر دەبنەوە، بۆ ئەم مەبەستە (لە ڕوانگەی  تیۆری شكاری هەڵەییەوە) لە هەڵەكانی فێرخوازی زمانی دووەم( ئینگلیزی) دەدوێین، كە زمانی یەكەمیان زمانی كوردییە. فێرخوازان لە سەرەتای فێربوونی زمانی دووەمدا درك بە هەڵەی فێربوونی زمانەكەیان دەكەن، بەڵام  درك بە جۆر و قۆناغ و  گۆڕانی جۆری هەڵەكان ناكەن. لە پڕۆسەی فێربوونی زمانی دووەمدا  فێرخوازان لە قۆناغەكانی خوێندنی زانكۆدا بەتایبەتی لەبەشی زمانی ئینگلیزیدا بە پشتبەستن بە پاشخانی چەند ساڵی ڕابردوویان، كە زمانی ئینگلیزیان وەكو بابەتێكی سەرەكی خوێندووە، ئەوا شێوازی هەڵەی تریان تیدا بەدیدەكرێت، بەتایبەتی لە هەڵەی فۆنەتیكی و مۆرفۆلۆژی و سینتاكسی و واتا سازی و فەرهەنگی، هەروەها لە دركاندنیشدا هەڵەیان هەیە. سەرچاوەی ئەم هەڵەكردنانەش  بۆ كاریگەری زمانی یەكەم، بۆ هه‌ڵه‌ پێشكه‌وتووه‌كان، كه‌  له‌ خودی زمانی دووه‌م به‌رهه‌م دێت، ئه‌و هه‌ڵانه‌ی سه‌رچاوه‌كه‌ی بۆ سروشتی زمانی زاره‌كی، ئه‌و هه‌ڵانه‌ی له‌ فێركاره‌وه‌ ڕووده‌ده‌ن ده‌گه‌ڕێته‌وه.‌       

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 21 2021
Journal Name
Jmerd
stress and strain analysis for the prosthetic hand design actuated by links
...Show More Authors

Prosthetic hands are compensatory devices for the hand amputees as a result of injury, various accidents or birth deformities, types of prosthetic hand vary depending on the mechanism they operate and how they perform. There are common types in use that are characterized by their complex mechanisms, which are difficult for the amputee to use or exclude use because of their high cost, therefore the aim of this research is to design an artificial hand that is suitable in terms of simplicity of use and low cost and similar to a natural hand with regard to dimensions and shape that operated in the mechanism of links. This research involves Stress and strain analysis of the prosthetic hand and its fingers that modelled from (Petg CR)

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 19 2022
Journal Name
Journal Of The College Of Languages (jcl)
Evaluation of proverb translation in Nahj al-Balagheh based on the theory of Peter Newmark (Dashti, Shahidi and Foladvand): ارزیابی ترجمه ضرب‌المثل‌ در نهج البلاغه بر اساس نظریه پیتر نیومارک. مطالعۀ موردی: (دشتی، شهیدی و فولادوند)
...Show More Authors

In addition to being a religious book with high human and moral themes, Nahj al-Balagha is considered a mirror of Arab culture and a literary masterpiece at the height of eloquence and eloquence, and because proverbs in the form of short, concrete and understandable phrases for everyone, experiences, thoughts and convey ideas, Imam Ali (AS) used it to facilitate the understanding of various political, social and moral concepts. In this article, we intend to criticize the way Dashti, Shahidi and Foladvand translated it by using Newmark's model due to the importance and cultural reflections of proverbs in understanding the cultural atmosphere governing Nahj al-Balagheh. In his evaluation model, Newmark divides cult

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 21 2022
Journal Name
Environmental Science And Pollution Research
Development of new computational machine learning models for longitudinal dispersion coefficient determination: case study of natural streams, United States
...Show More Authors

View Publication
Crossref (27)
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (19)
Crossref (12)
Scopus Crossref
Publication Date
Wed Oct 21 2015
Journal Name
Integrated Journal Of Engineering Research And Technology
A HYBRID CUCKOO SEARCH AND BACK-PROPAGATION ALGORITHMS WITH DYNAMIC LEARNING RATE TO SPEED UP THE CONVERGENCE (SUBPL) ALGORITHM
...Show More Authors

BP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.

Publication Date
Mon Oct 20 2025
Journal Name
Journal Of Studies And Researches Of Sport Education
The effect of using the educational bag on the level of learning some offensive skills with the epee weapon
...Show More Authors

View Publication
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (10)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Artificial Neural Network and Latent Semantic Analysis for Adverse Drug Reaction Detection
...Show More Authors

Adverse drug reactions (ADR) are important information for verifying the view of the patient on a particular drug. Regular user comments and reviews have been considered during the data collection process to extract ADR mentions, when the user reported a side effect after taking a specific medication. In the literature, most researchers focused on machine learning techniques to detect ADR. These methods train the classification model using annotated medical review data. Yet, there are still many challenging issues that face ADR extraction, especially the accuracy of detection. The main aim of this study is to propose LSA with ANN classifiers for ADR detection. The findings show the effectiveness of utilizing LSA with ANN in extracting AD

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (9)
Scopus Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Sports Culture
Analysis of the kinetic path of some physical measurements and kinetic abilities in terms of the direct attack in the foil
...Show More Authors

Through the researchers' acquaintance with the previous studies, the problem was identified as that the preparation of training curricula in all its units must be based on accurate scientific foundations. Positively affect the type of attack and its implication in the presence of correlational relations, whether direct or indirect, i.e., precedence in training and in preparing units Therefore, the researcher decided to build a causal model to know the relationships to show the best model of the direct straight attack. The study aimed to build a causal model for the most important physical measurements and kinetic capabilities of the direct straight attack in the research sample. The two researchers used the descriptive approach in t

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Clinical And Experimental Dentistry
Prevalence of periapical lesions in non-endodontically and endodontically treated teeth in an urban Iraqi adult subpopulation: A retrospective CBCT analysis
...Show More Authors

View Publication Preview PDF
Scopus (11)
Crossref (10)
Scopus Crossref