The birth of Multiple Intelligence (MI) theory has revolutionized traditional education since the twentieth century. Howard Gardner, the pioneer of this theory, believed that each learner has a unique way of acquiring information. This paper investigates how the New Headway Plus for Upper-Intermediate-Third Edition, a standard EFL textbook in Iraqi universities, can cater to the diverse MI profiles of Iraqi EFL learners. It evaluates the success or failure of senior undergraduates in actively engaging with different learning styles and activities in the classroom. The study maps the distribution of nine distinct modes of MI theory across all 12 Units_ Logic/Mathematical, Verbal/Linguistic, Musical, Bodily/Kinesthetic, Visual/Spatial, Naturalist, Intrapersonal, Interpersonal, and Existential Intelligences. The results reveal that the New Headway Upper-Intermediate EFL Textbook predominantly emphasizes Verbal/Linguistic Intelligence, followed by Logic/Mathematical, Visual/Spatial, and Intrapersonal, among other intelligences. Existential Intelligence is not addressed in the New Headway Plus for UpperIntermediate EFL Textbook. It underscores the need for teaching approaches that encompass all modes of MI. Educators are urged to bolster their learners' intellectual capabilities through comprehensive educational activities and student evaluation using school material.
The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreThis work includes synthesis of new phenoxazine derivatives containing N-substituted phenoxazine starting from phenoxazine (1).10-nitrosyl phenoxazine was prepared through the reaction of phenoxazine with sodium nitrite to give compound (2), which reacted with zinc in acetic acid to give 10-amino phenoxazine (3). Condensation of compound (3) with benzoyl chloride, isovaleryl chloride and 4-bromophenacyl chloride gave 10-amido phenoxazine derivatives (4-6).
This work comprises the synthesis of new thioxanthone derivatives containing C-substituted thioxanthone. To obtain these derivatives, the o-mercapto benzoic acid was chosen as the starting material, which was reacted with dry benzene in sulfuric acid (98 %) to produce the thioxanthone (1). The 2,7-(disulfonyl phosphine imine) thioxanthone (4-8) were prepared from reaction of compound (1) with chlorosulfonic acid gave 2,7-(disulfonyl chloride) thioxanthone (2). Treatment of (2) with sodium azide to produce 2,7-(disulfonyl azide) thioxanthone (3). Condensation of (3) with phosphorus compounds afforded compounds (4-8). The 2,7-(disulfonamide) thioxanthone (9-21) was obtained when co
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThere are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
In this paper, new transform with fundamental properties are presented. The new transform has many interesting properties and applications which make it rival to other transforms.
Furthermore, we generalize all existing differentiation, integration, and convolution theorems in the existing literature. New results and new shifting theorems are introduced. Finally, comprehensive list of this transforms of functions will be providing.
In this paper, we studied the travelling wave solving for some models of Burger's equations. We used sine-cosine method to solution nonlinear equation and we used direct solution after getting travelling wave equation.