This research was distributed into two sections, the first section was concerned with the concept of value for De Saussair and its methodological impact on his linguistic structural conceptions with respect of the distinction between synchronism and diachronism, the value role of linking function between the sounds and the though, the basing of his theoretical conception on the language being a form and not a material according to this principle and the value impact on the demonstration that the linguistic element acquires its functional importance from the relations inside the language system. It also stopped at the methodological impact of value on defining the analytical linguistic unit and the value role in semantics through the prin
... Show MoreThe study aimed to identify the degree of availability of design Thinking Indicators in The content of the Arabic Language Curricula at the secondary stage in the Syrian Arab Republic; to achieve the goal of the study. The researcher used the Descriptive Approach based on the analysis method according to the Cognitive Theory. The study tools consist of a list of Design Thinking Indicators and a Content Analysis Tool. The researcher completed the Validity and Reliability procedures for the tools. After applying them, the results of the study resulted in the following: Greater Interest than other sub-skills. The results also showed a Divergence of care for the sub-skills and the Difference in their recurrence rate, and the Omission of some
... Show MoreThe scope of the world of translation is an area filled with different types of translations, whether translations of scientific, social, political or economic in addition to the other types are endless, but the translation problematic grammatical that may confront us if we proceed to translate any subject are important issues that must Translator whether translators or interpreters that puts it into consideration and attaches great importance to the translation is very clear and without any ambiguity. One of these forms of grammatical task is to translate the relative pronoun (que) from Spanish into Arabic language, which revolves around the subject of this research.
The relative pron
... Show MoreThe article provides a comparative analysis of comparisons in Russian and Arabic, aimed at identifying their structural, typological, and functional-pragmatic features. The study is based on a systematic approach to the analysis of linguistic means of expressing comparisons in two differ- ent linguistic cultures. The article analyzes the main structural components of comparisons, their classification, and their cognitive and aesthetic functions. The results of the study demonstrate the deep cultural conditioning of comparative constructions and their important role in representing the specific features of the respective linguistic cultures.
The study aims at investigating the effectiveness of the Virtual Library Technology, in developing the achievement of the English Language Skills in the Center of Development and Continuous Education, in comparison with the individual learning via personal computer to investigate the students' attitude towards the use of both approaches. The population of the study includes the participants in the English Language course arranged in the Center. The sample includes 60 students who were randomly chosen from the whole population (participants in English Courses for the year 2009-2010). The sample is randomly chosen and divided into two experimental groups. The first group has learned through classroom technology; while the other group has l
... Show MoreIn the last few years, the literature conferred a great interest in studying the feasibility of using memristive devices for computing. Memristive devices are important in structure, dynamics, as well as functionalities of artificial neural networks (ANNs) because of their resemblance to biological learning in synapses and neurons regarding switching characteristics of their resistance. Memristive architecture consists of a number of metastable switches (MSSs). Although the literature covered a variety of memristive applications for general purpose computations, the effect of low or high conductance of each MSS was unclear. This paper focuses on finding a potential criterion to calculate the conductance of each MMS rather t
... Show MoreBP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.
This research aims to examine the relationship between learning organization and behavior of work teams. The variable of the learning organization took four dimensions depending on the study (sudhartna & Li, 2004): Common cultural values , communication, knowledge transfer and the characteristics of workers. The behavior of teams was identified on the basis of realizing of the respondents of their organization to work as a team where the research relied concepts applied in the study (Hakim , 2005) , and chose to research the case of a service organization for the study and relied on four dimensions of coordination , cooperation , sharing of information , the performance of the team, and was a curriculum approach and des
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More