The aims of the lecture should be clearly defmed. These will help to define the teaching methods and the structure. If, for example, the purpose of the lecture is to introduce new knowledge and concepts, then a classic lecture structure might be most appropriate. On the other hand, if the purpose is to make the students aware of different approaches to a particular clinical problem, a problem oriented design in which alternative approaches are presented and discussed might be a more appropriate fonnat.
Lectures are still a common teaching methOd in both undergraduate and postgraduak medical education. Properly done, the lectwe is a creative and personal work by the teachll:l modeled upon his intellectual scaffolding. Few other fonns o
The research topics important topic of jurisprudence worship, a ruling Zakat ornaments
prepared for use, and touched the odds scholars in it. Stroll scholars say that there is no Zakat
on ornaments prepared for use have reported their evidence they and the owners say the other
of those who say should be directed to pay zakaat, and discuss those views and statement
Dafeeha of Sahihaa, and came up with a summary then, showed where the prevailing view
that I see in agreement of the transferee and reasonable. Ask Him to show us the right, and
thank God.
Learning is the process of gaining knowledge and implementing this knowledge on behavior. The concept of learning is not strict to just human being, it expanded to include machine also. Now the machines can behave based on the gained knowledge learned from the environment. The learning process is evolving in both human and machine, to keep up with the technology in the world, the human learning evolved into micro-learning and the machine learning evolved to deep learning. In this paper, the evolution of learning is discussed as a formal survey accomplished with the foundation of machine learning and its evolved version of learning which is deep learning and micro-learning as a new learning technology can be imple
... Show MoreMany letters and theses written on the subject of consensus, as well as in measurement,
But we tried to address a topic of consensus
Building a blind measuring guide.
We have tried to explain the meaning of convening, then the statement of consensus in language and terminology and then the statement of measurement
Also, we have shown the types of consensus mentioned by the jurists, and this is how much was in the first topic, either
The second section included the statement of the doctrines of the blind in the matter, and then the evidence of each doctrine and discussed.
We followed it with the most correct opinion statement and concluded the research with some of the conclusions we reached through
search.
The study aims at evaluating the penalty of semi- intentional killing felony in the Egyptian and Algerian criminal law following the Islamic Law (Shari'a). The study used the descriptive, evalutive and analytical methodology to reach the topic in question. To meet the theoretical significance of the study, much data has been collected to give a comprehensive picture about the topic under examination. As for the practical significance of the study, it helps the juridical power to reconsider and phrase the legal materials of the semi-intentional killing penalty based on the Islamic law. The study has come to the conclusions that the Islamic Law (Shari'a) imposes a compensation (blood-money) to be g
... Show MoreThe peculiarity of the theater does not lie in its dramatic content because many literary genres and other artistic styles share with it in this content. The peculiarity of the theater lies in contemplating the drama through what is architectural, and this architectural axis is what distinguishes its character. It is a spatial poetry which is composed by the laws of physics and chemistry, (Weight, height, distance, rhythm, gravity, impulses and chemical excretions). i.e., what cannot be expressed in words. This is a game of space to exchange and organize energy and communicate in space by the living body, which contains the possibilities of the living drawing in space: in the time and place. This research deals with the importance of the
... Show MoreFlexible molecular docking is a computational method of structure-based drug design to evaluate binding interactions between receptor and ligand and identify the ligand conformation within the receptor pocket. Currently, various molecular docking programs are extensively applied; therefore, realizing accuracy and performance of the various docking programs could have a significant value. In this comparative study, the performance and accuracy of three widely used non-commercial docking software (AutoDock Vina, 1-Click Docking, and UCSF DOCK) was evaluated through investigations of the predicted binding affinity and binding conformation of the same set of small molecules (HIV-1 protease inhibitors) and a protein target HIV-1 protease enzy
... Show MoreDensity Functional Theory (DFT) at the B3LYP/6-311G basis set level was performed on six new substituted Schiff base derivatives of PINH [(phenylallylidene) isonicotinohydrazide], The calculated quantum chemical parameters correlated to the inhibition efficiency are EHOMO (highest occupied molecular orbital energy), ELUMO (lowest unoccupied molecular orbital energy), the energy gap [ΔE(HOMO-LUMO)], hardness (η), softness (S), dipole moment (μ), electron affinity (EA), ionization potential (IE), the absolute electronegativity (χ), Global electrophilicity index ( ) and the fraction of electron transferred (ΔN), all have discussed at their equilibrium geometry and their correct symmetry (Cs). Comparisons of the order of inhibition effi
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More