Preferred Language
Articles
/
jcolang-669
Some innovative word-formation processes in popular Internet texts in Russian and Arabic: Некоторые Инновационные словообразовательные процессы в популярных интернет-текстах в русском и арабском языках
...Show More Authors

       The present article discusses innovative word-formation processes in Internet texts, the emergence of new derivative words, new affixes, word-formation models, and word-formation methods. Using several neologisms as an example, the article shows both the possibilities of Internet word-making process and the possibilities of studying a newly established work through Internet communication. The words selected for analysis can be attributed to the keywords of the current time. (In particular, the words included in the list of "Words of 2019") there are number of words formed by the suffix method, which is the traditional method of the Russian word formation. A negation of these words is usually made through suffixes, dissonances or consonances with another negative word. Therefore, These words are formed through the addition of the neutral suffixes -ism, -ist, the words rashism (ideology of "Great Russia", from the Russia - Rasha, Rashka) and rashist (one who adheres to the ideology of rashism) have a negative connotation due not only to the negative connotation produced words (a person who, speaking in Russian, calls Russia Rushey, of course, shows his negative  attitude towards the country), but also to the fact that they are associated with the words fascism and fascist. The Internet is considered a worldwide tool of communication used extensively by students, housewives and professionals as well The Internet is a heterogeneous environment consisting of various hardware and software configurations that need to be configured to support the languages used. The development of Internet content and services is essential for expanding Internet usage. Some of these improvements include the ability to support multiple languages and provide tools for creating and using multilingual content. For example:

1-Site Analytics And Seo
2 - Smm And Smo
3- Aso
4 - Email Marketing
5 - Ppc - Marketing
6 - Content Marketing
7 - Influence Marketing
8 - Other Plug ins To Improve Efficiency

Аннотация

 В статье рассматриваются инновационные словообразовательные процессы в интернет-текстах, появление новых производных слов, новых аффиксов, словообразовательных моделей и способов словообразования. На примере нескольких неологизмов в статье показаны как возможности интернет-словотворчества, так и возможности изучения функционирования новообразований в интернет-коммуникации. Выбранные для анализа слова можно отнести к ключевым словам текущего времени. Отрицательная оценка в таких словах может быть задана производящим словом, суффиксом, неблагозвучием или созвучием слова с другим отрицательно оцениваемым словом. Так, образованные с помощью нейтральных суффиксов -изм, -ист слова рашизм (идеология «великорусскости», от пренебрежительного названия России - Раша, Рашка) и рашист (тот, кто придерживается идеологии рашизма) имеют ярко выраженную отрицательную окраску не только за счет отрицательной окраски производящего слова (человек, который, говоря по-русски, называет Россию Рашей, конечно,показывает свое отношение к стране, но и за счет того, что они ассоциируются со словами фашизм и фашист. Интернет, являясь международным средством коммуникации, должен поддерживать разные языки мира. В мире наблюдается рост числа пользователей его инструментов и приложений интернета среди разных людей, включая профессионалов, домохозяек и студентов. Интернет представляет собой гетерогенную среду, состоящую из различных конфигураций аппаратного и программного обеспечения, которые необходимо настраивать для поддержки используемых языков. Развитие интернет-контента и сервисов имеет важное значение для расширения использования интернета. Часть этих улучшений. Например:

1-Аналитика Сайтов И Seo
2- Smm  И  Smo
3- Aso
4- Email Маркетнинг
5- Ppc - Маркетнинг
6- Контент - Маркетнинг
7- Маркетнинг Вляния
8- Другие Плагины Для Повышения Эффекитвности
 включает в себя возможность поддержки нескольких языков и предоставление инструментов для создания и использования многоязычного контента.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Some Methods of Estimating the Parameters and Survival Function of a Log-logistic Distribution with a Practical Application
...Show More Authors

The Log-Logistic distribution is one of the important statistical distributions as it can be applied in many fields and biological experiments and other experiments, and its importance comes from the importance of determining the survival function of those experiments. The research will be summarized in making a comparison between the method of maximum likelihood and the method of least squares and the method of weighted least squares to estimate the parameters and survival function of the log-logistic distribution using the comparison criteria MSE, MAPE, IMSE, and this research was applied to real data for breast cancer patients. The results showed that the method of Maximum likelihood best in the case of estimating the paramete

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 07 2025
Journal Name
Journal Of Administration And Economics
Using the Maximum Likelihood Method with a Suggested Weight to Estimate the Effect of Some Pollutants on the Tigris River- City of Kut
...Show More Authors

The aim of this research is to use robust technique by trimming, as the analysis of maximum likelihood (ML) often fails in the case of outliers in the studied phenomenon. Where the (MLE) will lose its advantages because of the bad influence caused by the Outliers. In order to address this problem, new statistical methods have been developed so as not to be affected by the outliers. These methods have robustness or resistance. Therefore, maximum trimmed likelihood: (MTL) is a good alternative to achieve more results. Acceptability and analogies, but weights can be used to increase the efficiency of the resulting capacities and to increase the strength of the estimate using the maximum weighted trimmed likelihood (MWTL). In order to perform t

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
the role of senior management commitment to total quality in the implementation of knowledge management processes_Asurvey of asample of civil colleges
...Show More Authors

Occupies total quality management applications play a key role in the development of institutions of higher education performance and achieve its strategic objectives through the commitment of senior management and their employees to continuous improvement of the quality of performance in the various areas of work, and can be integrated knowledge management processes, which means identifying information of value and how to take advantage. The data were collected using the style of the questionnaire for the purpose of analyzing their results on a sample composed of 83 member of the administrative leadership in colleges as representing the decision-making centers in those colleges . 

  &nbsp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Zankoy Sulaimani - Part A
A Comparison Study on the Formation of Administrative and Leadership Policies for the Team and Individual Olympic Games in the Iraqi National Olympic Committee
...Show More Authors

The planning for the formation of administrative policies and guidance through leadership are important things for managing administrative processes and sporting activities. As both contribute in the stability of the administrative conditions, and their development in the sport federations, whether they both were attentive about team and individual Olympic Games. The two researchers observe that, there is a variation in the correct way of application. Particularly in the formulation of administrative policies and leadership describing it as, modern management standards for both team and individual Olympic Games in the Iraqi National Olympic Committee. That led to cause a misconception and lack of clarity for some administrators of those uni

... Show More
Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Comparison of Some of Estimation methods of Stress-Strength Model: R = P(Y < X < Z)
...Show More Authors

In this study, the stress-strength model R = P(Y < X < Z)  is discussed as an important parts of reliability system by assuming that the random variables follow Invers Rayleigh Distribution. Some traditional estimation methods are used    to estimate the parameters  namely; Maximum Likelihood, Moment method, and Uniformly Minimum Variance Unbiased estimator and Shrinkage estimator using three types of shrinkage weight factors. As well as, Monte Carlo simulation are used to compare the estimation methods based on mean squared error criteria.  

View Publication Preview PDF
Scopus (10)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sun Oct 12 2014
Journal Name
Advanced Studies In English, Pune
Cohesive Devices in Hemingway&#39;s &#39;For Whom The Bell Tolls&#39; and its Translation into Arabic
...Show More Authors

BN Rashid, AJES, 2014

View Publication
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sun Sep 03 2023
Journal Name
Wireless Personal Communications
Application of Healthcare Management Technologies for COVID-19 Pandemic Using Internet of Things and Machine Learning Algorithms
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref