Teaching techniques are the vehicles, which are used by teachers to help pupils learn and gain experiences and create positive classroom activities, as much as these techniques are varied, they lead to successful and fruitful learning in the foreign language. They help teachers achieve their objectives (Asowrth, 1985: 124).
The English language teacher's work is an active and purposeful one when he can plan carefully and frequently make the necessary changes in the contents and methods of teaching programme to fit the interest and needs of pupils. It seems that the majority of primary English teachers' interests does not go far in planning their work, and do not understand which o
... Show MoreThe invasion and spread of cancer cells are two of the most notable characteristics of malignant tumors. Recent studies suggest that the epithelial-mesenchymal transition (EMT) has been linked to this significant occurrence. It is linked to the absence of the epithelial brow and the presence of mesenchymal facial hair. The aims of the present study were to explore the immunohistochemical staining of vimentin and E-cadherin ex vivo as EMT markers and assess their potential as predictive biomarkers for transitional cell cancer (TCC). In this study, 55 paraffin-embedded biopsies from TCC patients and 10 autopsies that appeared to be normal were included. Immunohistochemistry was used to produce patterns of vimentin and E-cadherin expression. W
... Show MoreThe primary goal of root canal treatment (RCT) is to expel the presence of any necrotic or vital tissue, microbes and their byproducts from the canal space before press forward with the following steps of the RCT procedures. Although this is difficult to attain, various strives had been practiced by employing chemical and mechanical methods to eliminate as much microorganisms as possible and make the canal space valid for the obturation materials to be received. The aim of this review is to demonstrate some of what new remedies that could be used as root canal disinfectant by summarizing the recent studies regarding the efficacy of different natural products against the most persistence microbiota that could be responsible for most
... Show MoreThe two parameters of Exponential-Rayleigh distribution were estimated using the maximum likelihood estimation method (MLE) for progressively censoring data. To find estimated values for these two scale parameters using real data for COVID-19 which was taken from the Iraqi Ministry of Health and Environment, AL-Karkh General Hospital. Then the Chi-square test was utilized to determine if the sample (data) corresponded with the Exponential-Rayleigh distribution (ER). Employing the nonlinear membership function (s-function) to find fuzzy numbers for these parameters estimators. Then utilizing the ranking function transforms the fuzzy numbers into crisp numbers. Finally, using mean square error (MSE) to compare the outcomes of the survival
... Show MoreIn this article, the casting method was used to prepare poly(methyl methacrylate)/hydroxyapatite (PMMA/HA) nanocomposite films incorporated with different contents (0.5, 1, and 1.5 wt%) of graphene nanoplatelets (Gnp). The chemical properties and surface morphology of the PMMA/HA blend and PMMA/HA/Gnp nanocomposite were characterized using FTIR, and SEM analysis. Besides, the thermal conductivity, dielectric and electrical properties at (1–107 Hz) of the PMMA/HA blend and PMMA/HA/Gnp composites were investigated. The structural analysis showed that the synthesized composites had a low agglomerated state, with multiple wrinkles of graphene flakes in the PMMA/HA blend. The thermal conductivity was improved by more than 35-fold its value for
... Show MoreAbstract: Fluoroquinolones drugs are an important class of wide
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More