BN Rashid, AKF Jameel, Al- Ustath: Quarterly Scientific Journal, 2017 - Cited by 15
The birth of Multiple Intelligence (MI) theory has revolutionized traditional education since the twentieth century. Howard Gardner, the pioneer of this theory, believed that each learner has a unique way of acquiring information. This paper investigates how the New Headway Plus for Upper-Intermediate-Third Edition, a standard EFL textbook in Iraqi universities, can cater to the diverse MI profiles of Iraqi EFL learners. It evaluates the success or failure of senior undergraduates in actively engaging with different learning styles and activities in the classroom. The study maps the distribution of nine distinct modes of MI theory across all 12 Units_ Logic/Mathematical, Verbal/Linguistic, Musical, Bodily/Kinesthetic, Visual/Spatial, Natura
... Show MoreNew trends in teaching and learning theory are considered a theoretical axis
from which came the background that depends on any source, or practice sample or
teaching plane, accuracy and simplicity prevent the development of the teaching
process. Many attempts have come to scene to illuminate the teaching background,
but they have not exceed those remarkable patterns and methods. Thus, the
appearance of the teaching theory have been hindered.
This led to the need for research and development in the field of teaching to
find out a specific teaching theory according to the modern trends and concepts.
Teaching is regarded a humanitarian process which aims at helping those who
want to acquire knowledge, since teach
The topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and a
... Show MoreIn this study, the fission track registration technique with the CR-39 detector are using to determination the uranium concentrations for seventeen samples of teeth distributed in four districts in Baghdad City .Five samples taken from both Al-Durra District and Al-Jadiriyia District, Four samples taken from Al-Karrda (Alaatar street) Taken four samples and three samples taken from Al-Zuafrania and by 0.5gm in weight and 1.5 mm in thickness. The uranium concentrations in teeth samples measured by using fission tracks registration in (CR-39) track detector that caused by the bombardment of (U) with thermal neutrons from (241 Am-Be) neutron source that has flux of (5 ×103 n cm-2 s-1). The concen
... Show MoreThe current study aimed at (identifying the impact of a proposed strategy based on the realistic mathematics theory in the mathematical interrelation among the third intermediate grade students), two samples from the third intermediate grade were tested in a school affiliated to Rusafa I General education Directorate in Baghdad for the academic year (2022-2021)the experimental group will study according to the proposed strategy and it consisted of (30) female students , the control group will study through the traditional method and the number of its students is (30), thus the study sample consisted of (60) female students, the two groups were equalized in the variables (age in months, intelligence, prior knowledge) and to achieve the study
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThe research discusses the issue of attribution to the verb, because the Arab scholars are unanimous in preventing attribution of the verb, because it is always informed of it, and does not inform about it, but this consensus violates the linguistic use. The research discusses this matter.
Groundwater modelling is particularly challenging in arid regions where limited water recharge is available. A fault zone will add a significant challenge to the modelling process. The Western Desert in Iraq has been chosen to implement the modelling concept and calculate the model sensitivity to the changes in aquifer hydraulic properties and calibration by researching 102 observations and irrigation wells. MODFLOW-NWT, which is a Newtonian formulation for MODFLOW-2005 approaches, have been used in this study. Further, the simulation run has been implemented using the Upstream-Weighting package (UPW) to treat the dry cells. The results show sensitivity to the change of the Kx value for the major groundwater discharge flow. Only abo
... Show MoreDBNRAAK Mohammed, International Journal of Research in Social Sciences and Humanities, 2020