Listening comprehension of Iraqi EFL college students are not given time for practice, and incorporate in the programme of the Department of English, therefore, students are not well-prepared to comprehend the spoken language also the Iraqi EFL College students are deficient in comprehending the spoken English. So, listening strategies require a larger amount of consistent practice. The present study aims at finding out the effect of teaching the proposed listening strategies programme on EFL university students' listening comprehension. The sample consists of 104 of 1st year college students at the Department of English Language, College of Education Ibn-Rushed for Humanities. The programme deals with the following strategies: summrazing-note taking, selective attention, elaboration-grouping-combining, analyzing-reasoning, imagery, inferencing-guessing, rehearsal-repetition, and translating-transferring. Results reveal that there are statistically significant differences between the experimental group and the control group in six listening strategies, they are: analyzing/reasoning, imagery, inferencing/guessing, rehearsal/repetition, selective attention, and transfer/translate.
ناقش البحث في طياته عدداً من القضايا الرئيسة المتعلقة بالتقييم الاستراتيجي والإطار العام للخطة الاستراتيجية المقترحة لشركة نفط ميسان للسنوات الخمس المقبلة (2020_2024)، وهدف هذا البحث يتمحور في تقييم عملية صياغة استراتيجية شركة نفط ميسان لتحديد نقاط القوة وتعضيدها ومواطن الضعف ومحاولة معالجتها لتجنب الوقوع بها عند وضع استراتيجية للسنوات القادمة، وعلى هذا الاساس فان مشكلة البحث تكمن في مدى نجاح الاستراتي
... Show MoreIn this research we have tackled the role of Talent management (as a private variable) within (the Talent attraction, the Talent management performance, Talent development and Talent retention) on strategic performance reinforcement ( accredited variable) within its dimensions ( financial perspective, costumer perspective, internal operations perspective and learning and development perspective). The research conducted on sample of some college teachers from two of Sumer's colleges. The research problem represented by the broad organization's competition as well as universities; which led these colleges to investigate it's skillful human staff to meet it's strategic performance.
To meet the aims of
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreThe objective of this research was to study the effect of physical exertion training on bio-kinetic abilities in weightlifting among students of Physical Education and Sports Sciences. The present study had a pre-posttest experimental design in which participants were recruited in two groups: experimental group and control group. A total of 30 students of Physical Education and Sports Sciences constituted the sample of the study. The sample selection was done by a comprehensive inventory method. Participants were equally allocated into two groups with n=15 in each group. Participants of experimental group were made to perform special physical exercises with three training units per week during eight weeks. The statisti
... Show MoreThe current paper aims at knowing the effect of Exemplar of Wettli On Acquiring Grammatical Concepts Among Basic 7th Class Female Students in Kurdish Language Grammar.
The current paper is confined to a sample of Basic 7th Class Female Students- Khaniqin –belonged Morning schools for the academic year 2014-2015 . The sample amounted 50 female students distributed on two sections ( A,B) . Section A represented experimental group ( 24) female students studied according to the exemplar of ( Wettli) and (B) represented control group (26) female students who have studied with traditional method. The researcher has qualified between these two groups b
... Show MoreBackground: Fifteen percent of small for gestational age are small as a result of fetal growth restriction, which could be due to maternal, placental or fetal factors. It is an important clinical problem associated with increase perinatal mortality and morbidity. Leptin is a protein that produced by many tissues including the placenta (syncytiotropholoast). Dysregulation of leptin metabolism may be implicated in preeclampsia and IUGR pathogenesis.
Aim of the study: To study the trend of leptin level alteration in maternal serum and cord blood in pregnancies complicated by fetal growth restriction and its relation with fetal outcome.
Methods: An Analytic, cross- sectional study conducted in Al-Elwyia Maternity Teaching Hospital and
A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More