English teachers in Iraq and other countries around the world up to this time use traditional methods to help students memorize new vocabularies. The sense of words or structure is not to be given in either the native tongue or the target language by definition, but is induced by the way the form is used in the situation. Situational Language Teaching (SLT) has recently become the needed method for improving speaking skills. It indicates the application of learning the language in actual and social exchange expressions so as to let learners do as required in classroom and non-classroom circumstances. This pilot study seeks to answer the following questions: Can SLT improve English speaking skills of target learners? How SLT contribute to the learning process at the Iraqi private schools? Based on Tompkin’s questionnaire and the characteristics and notions of SLT, random selection of 38 teachers, currently teaching English at the Second Al-Karkh district-Baghdad were recruited in this experiment. In order to make the study feasible, size sample should be in small scale up to 12 per school. Because of the economic situation, private schools has been forced to hire only 2 teachers to teach English at Elementary, Intermediate, and Secondary levels in times of the outbreak of COVID-19 Pandemic. Sample size calculations have reported in qualitative and quantitative research. The study suggests that teachers should bear in mind the significant role of role playing and conversation in the situational and environmental contexts.
Local food samples investigated for the presence of pathogenic bacteria. Hash meat sample was used to isolate Escherichia coli and chicken meat (poultry) was used to isolate Salmonella typhi. Biochemical tests and API20E system used in order to identify these isolates. Two natural vinegar samples (dates & apple cider) were used in order to study its antibacterial activity against the two tested bacteria. Disc diffusion method was used, the results showed that two vinegar samples have antibacterial activity against the two tested bacteria. Date vinegar showed inhibition zone 19mm against E. coli & 9mm against S. typhi, while Apple cider vinegar showed diameter of inhibi
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreEntrepreneurial events are understood to be imperious in accelerating the economic development of nations owing to a large number of jobs it creates. Thus, both developed and developing countries understand the importance of entrepreneurship education to instil student interest in entrepreneurial action. This study investigates the moderating effect of entrepreneurship education (EEP) on the relationship between attitude (ATT), subjective norms (SNMS), and perceived behavioural control (PBC) towards entrepreneurship intention (EINT) of university undergraduate students. The study population covered 794 students from all the four faculties of Northwest University Kano, that were taught a compulsory entrepreneurship education course in their
... Show MoreThe combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.
In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.
&n
... Show MoreThis paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of AC
... Show MoreResearch aimed to explore the Application Effect of the Conflict Management Strategies by the managements to solve conflict between and inside the conflicted parties within (IGEC) to increase the productivity of the workers. To collect data, 110 questioners had been distributed among managers and heads of departments of all managerial levels, 102 answered questioners regained, 5 of them were disqualify for statistical analytic, only 97 were taking in consideration for statistical analysis presenting 93% of the retained number.
SPSS Program supported with a group of statistical tools, had been used for analysis purposes such as Kronbach Alpha test to assure the validity & stability of the t
... Show MoreThe Wheat husk is one of the common wastes abundantly available in the Middle East countries especially in Iraq. The present study aimed to evaluate the Wheat husk as low cost material, eco-friendly adsorbents for the removal of the carcinogenic dye (Congo red dye) from wastewater by investigate the effect of, at different conditions such as, pH(3-10), amount of adsorbents (1-2.3gm/L),and particle size (125-1000) μm, initial Congo red dye concentration(10, 25 , 50 and 75mg/l) by batch experiments. The results showed that the removal percentage of dye increased with increasing adsorbent dosage, and decreasing particle size. The maximum removal and uptake reached (91%) , 21.5mg/g, respectively for 25 initial concent
... Show MoreAzo-Schiff base compounds (L1 and L2) have been synthesized from the reaction of m-hydroxy benzoic acid with 1,5-dimethyl-3-[2-(5-methyl-1H-indol-3-yl)-ethylimino]-2-phenyl-2,3- dihydro-1H-pyrazol-4-ylamine and with 3-[2-(1H-indol-3-yl)-ethylimino]-1,5-dimethyl-2-phenyl- 2,3-dihydro-1H-pyrazol-4-ylamine. The free ligands and their complexes were characterized based on elemental analysis, determination of metal, molar conductivity, (1H, 13C) NMR, UV–vis, FT-IR, mass spectra and thermal analysis (TGA). The molar conductance data revealed that all the complexes are non-electrolytes. The study of complex formation via molar ratio in DMF solution has been investigated and results were consistent to those found in the solid complexes with a rat
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.
: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show More