YouTube is not just a platform that individuals share, upload, comment on videos; teachers and educators can utilize it to the best maximum so that students can have benefits. This study aims at investigating how active and influential YouTube can be in the educational process and how it is beneficial for language teachers to enhance the skills of students. The study demonstrates different theoretical frameworks that tackle the employment of technology to enhance the learning/teaching process. It relies on the strategies of Berk (2009) for using multimedia media, video clips in particular to develop the abilities of teachers for using technology in classrooms. To achieve the objective of the study, the researchers develop a questionnaire and apply it to fourth-year college students, University of Baghdad, to give evidence and to prove the effectiveness of technology in the academic field. The paper examines classes where computers can be employed, and also shows the challenges that face teachers and educators concerning this application. The researchers conclude that YouTube is an essential tool in classrooms as it attracts the attention of students and develops their mentality and creativity. It also helps cover the materials comprehensively, especially language. YouTube brings the fun element into classes, which thereby meet the interests of students. Such findings have a significant impact on the learning process as the students will find the educational environment more encouraging and exciting. Besides, they find the material presented worth studying, and this way, they would appreciate the efforts exerted in explaining the information. The research intends to be of value to teachers for the use of technology and for students to have a better comprehension of the materials presented.
The current paper aims at knowing the effect of Exemplar of Wettli On Acquiring Grammatical Concepts Among Basic 7th Class Female Students in Kurdish Language Grammar.
The current paper is confined to a sample of Basic 7th Class Female Students- Khaniqin –belonged Morning schools for the academic year 2014-2015 . The sample amounted 50 female students distributed on two sections ( A,B) . Section A represented experimental group ( 24) female students studied according to the exemplar of ( Wettli) and (B) represented control group (26) female students who have studied with traditional method. The researcher has qualified between these two groups b
... Show MoreThe objective of this research was to study the effect of physical exertion training on bio-kinetic abilities in weightlifting among students of Physical Education and Sports Sciences. The present study had a pre-posttest experimental design in which participants were recruited in two groups: experimental group and control group. A total of 30 students of Physical Education and Sports Sciences constituted the sample of the study. The sample selection was done by a comprehensive inventory method. Participants were equally allocated into two groups with n=15 in each group. Participants of experimental group were made to perform special physical exercises with three training units per week during eight weeks. The statisti
... Show Moreإنّ التّأمّل في الدّراسات الأدبيّة النّقديّة الحديثة الّتي تنظر إلى النّصّ أنّه لوحة تتشكّل من مجموعة تداخلات نصّيّة سابقة للنصّ المُنتج أو مُعاصرة له، تدفع القارئ إلى الغوص في أعماق النّصوص وتحليلها والكشف عن الآليّات والإجراءات الّتي اعتمدت في إنتاجه، وإظهار الجماليّات الفنّيّة التي شكلت في مُجملها كائنا حيّا يُعبّر عن حالات إنسانيّة مُستمرة الحدوث رغم تقادم الأزمان.
فالبحث هذا يعمد
... Show MoreBobbin friction stir welding (BFSW) is a variant of the conventional friction stir welding (CFSW); it can weld the upper and lower surface of the work-piece in the same pass. This technique involves the bonding of materials without melting. In this work, the influence of tool design on the mechanical properties of welding joints of 6061-T6 aluminum alloy with 6.25 mm thickness produced by FSW bobbin tools was investigated and the best bobbin tool design was determined. Five different probe shapes (threaded straight cylindrical, straight cylindrical with 3 flat surfaces, straight cylindrical with 4 flat surfaces, threaded straight cylindrical with 3 flat surface and threaded straight cylindrical with 4 flat surfaces) with various dimensio
... Show MoreThe article characterizes metaphors and comparisons as a means of rethinking the phenomena of the surrounding world; two directions are named within which metaphors and comparisons are studied: 1) the linguo-classification direction combines several classifications of metaphors and comparisons, which are basically focused on comparing two denotations through the meanings of word forms that are part of the trope; 2) the theoretical and conceptual direction is associated with the concept of conceptual displacement and is the basis of the theoretical and methodological study of metaphor and comparison, i.e. the modern theory of metaphor is being formed; The main attention is focused on the comparative concept of Aristotle, which postul
... Show MoreRenewable energy resources have become a promissory alternative to overcome the problems related to atmospheric pollution and limited sources of fossil fuel energy. The technologies in the field of renewable energy are used also to improve the ventilation and cooling in buildings by using the solar chimney and heat exchanger. This study addresses the design, construction and testing of a cooling system by using the above two techniques. The aim was to study the effects of weather conditions on the efficiency of this system which was installed in Baghdad for April and May 2020. The common weather in these months is hot in Baghdad. The test room of the design which has a size of 1 m3 was situated to face the geographical south. The te
... Show MoreBackground: To evaluate the bony supports of the teeth adjacent to the area of cleft in patient with unilateral cleft lip and palate and to compare these measurements with the measurements of the same teeth in non-cleft side by using CBCT. Materials and methods: The CBCT scans of 30 patients having cleft lip( unilateral) and palate(unilateral), were analyzed and the measurements of the alveolar bony support for teeth that are adjacent to the cleft area were measured with those teeth located on opposite side (non- clef) side. For each tooth, the measurements will taken for the distance between the( cementoenamel junction) (CEJ) and the bony crest (AC) at the( buccal area) was measured and the thickness of the buccal plate At zero, one, tw
... Show MoreSchizophrenic patients who are at great risk of relapse are characterized by non-compliance,
denial of illness and need for treatment and no contact with family. So, the prevention of relapse
and readmission to hospital are crucial in mental health practice.
The present study is a descriptive-analytical study that was carried out from November 2nd
2006 through the end of 20 of April 2008.
Objectives: To assess the associated factors with the risk of relapse in schizophrenic patients at
psychiatric hospitals in Baghdad city.
Methodology: A purposive "non-probability" sample of (50) schizophrenic patient who hasd
relapsed was involved in the present study. Data were collected through the use of the constructed
qu
Objectives: The study aims to evaluate the effectiveness of the educational program on nurses’ knowledge towards nursing management for patients undergoing percutaneous coronary intervention (PCI), as well as to find out the relationship between nurses' knowledge and some of their demographic characteristics (age, gender, level of education, and years of experience in cardiac units).
Methodology: A Quasi-experimental as one group (pre and post test) study was conducted at the Heart Center in Al-Diwaniyah city for the period from December 7, 2019 to February 23, 2020. A sample of (40) nurses working in the heart center was chosen from different nursing addresses. The sample covered one gro
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More