تتمثل مشكلة الدراسة في الصعوبات التي يواجهها طلاب اللغة الإنجليزية كلغة أجنبية في تعلم وإتقان المتلازمات اللفظية. تهدف هذا الدراسة تهدف إلى تحديد أثر استخدام تقنية المسرد الاملائي على معرفة المتلازمات اللفظية لدى الطلاب. ولتحقيق أهداف هذا البحث والتحقق من فرضياته تم اختيار عينة عشوائية مكونة من (60) طالبة من كلية اللغة الإنجليزية للسنة الثانية باستخدام كتاب الفهم القرائي المقرر للمستوى الثاني في قسم اللغة الإنجليزية. كلية التربية للبنات. تم تقسيم مجموعتين عشوائياً إلى المجموعة الضابطة (أ) والمجموعة التجريبية (ب) والمكونة من ثلاثين طالباً تم تدريبهم باستخدام تقنية المسرد الاملائي، بالإضافة إلى المجموعة التجريبية (ب). وتتكون من ثلاثين طالباً يتم تدريسهم بالطريقة التقليدية. ويتم قياس هذه الدراسة من خلال إجراء الاختبارات القبلية، والاختبارات البعدية. وتمت تعادل بعض المتغيرات لكلا المجموعتين. تم إجراء التحليل الإحصائي على المعلومات التي تم الحصول عليها من نتائج ما بعد الاختبار. وتكشف هذه النتائج عن تفوق المجموعة التجريبية على المجموعة الضابطة في الاختبارات البعدية من حيث معرفة المتلازمات اللفظية. تظهر النتائج كيف تعمل تقنية المسرد الاملائي على تحسين معرفة وفهم الطلاب للمتلازمات اللفظية. وفي ضوء النتائج والاستنتاجات التي توصلت إليها الدراسة فقد تم تقديم المقترحات والتوصيات المناسبة لإجراء مزيد من البحث.
The research aims to identify the academic problems of family counseling diploma students at Saudi Universities. In addition, to identify the differences in these problems according to gender, marital status, place of study, academic specialization, and GPA. The sample consisted of (491) students. The researcher has used one questionnaire for academic problems prepared by the researcher. The research revealed the following results: There were academic problems among family counseling diploma students at Saudi Universities, the most problems were related to the systems and administrations of the university, then the field training, the buildings, classrooms and campus facilities, then the academic courses, after that the exams, then
... Show MoreThe preparatory phase since it corresponds to adolescence are the most important stages of life , where the individual 's personality to take shape at this stage and start asking questions about the same , trying to discover the positive and negative traits hehas in order to form distinctive character and also is being he have Love Poll For everything that goes on around him.
And attention to cognitive motivation is important for students because the student who owns a motive cognitively looking for self - knowledge with conviction, and learning then be meaningful and lasts long. The motive of knowledge are common in which cognitive components does not mean exclusive knowledge on academic books and research in the narrow borders but a
Research is a study conducted by a researcher or a group of researchers to uncover ambiguity, complete a knowledge, or define a relationship, Solve a problem, or answer a question by carefully investigating the comprehensive and in-depth examination of the evidence and evidence related to this knowledge, revealing a relationship, or solving a problem, or answering a question, to be a systematic, In evidence and evidence that reveal facts and general rules, relationships or solutions, in addition to providing knowledge Human rights are verifiable, tested and confirmed. The university research (graduate research, master's thesis, doctoral dissertation) is the most important type of research, and it is supposed to be the best one, since it
... Show MoreWe will also derive practical solutions using predictive analytics. And this would include application making predictions with real world example from University of Faculty of Chariaa of Fez. As soon as student enrolled to the university, they will certainly encounter many difficulties and problems which discourage their motivation towards their courses and which pushes them to leave their university.
The aim of our article is to manage an investigation of the issue of dropping out their studies. This investigation actively integrates the benefits ofmachine learning. Hence, we will concentrate on two fundamental strategies which are KNN, which depends on the idea of likeness among data; and the famous strategy SVM, which can break the
The Local and Global Corporations are suffering of managerial and financial corruption phenomena, which leads them to loss and bankruptcy. So, it is necessary to search for tools which help prevent phenomena like this, and one of these tools is (corporate governance) which represent controlling tool that contribute in reducing corruption. this study aims at modifying (corporate governance system)in order to make it suitable with Iraqi government Corporations. the study depend upon main hypothesis which is (the performance level of the strategic perspective of governance system is depending upon work according to the perspective dimensions itself. From the main conclusions:-It is possible to building a strategic perspective
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreIn this research, a new technique is suggested to reduce the long time required by the encoding process by using modified moment features on domain blocks. The modified moment features were used in accelerating the matching step of the Iterated Function System (IFS). The main disadvantage facing the fractal image compression (FIC) method is the over-long encoding time needed for checking all domain blocks and choosing the least error to get the best matched domain for each block of ranges. In this paper, we develop a method that can reduce the encoding time of FIC by reducing the size of the domain pool based on the moment features of domain blocks, followed by a comparison with threshold (the selected threshold based on experience
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show More