Preferred Language
Articles
/
jcoeduw-1325
Data-Driven Approach for Teaching Arabic as a Foreign Language: Eygpt
...Show More Authors

Corpus linguistics is a methodology in studying language through corpus-based research. It differs from a traditional approach in studying a language (prescriptive approach) in its insistence on the systematic study of authentic examples of language in use (descriptive approach).A “corpus” is a large body of machine-readable structurally collected naturally occurring linguistic data, either written texts or a transcription of recorded speech, which can be used as a starting-point of linguistic description or as a means of verifying hypotheses about a language.  In the past decade, interest has grown tremendously in the use of language corpora for language education. The ways in which corpora have been employed in language pedagogy can be divided into two main categories: indirect and direct application. In the former corpora are used in designing and developing the syllabuses, dictionaries, tests, and teaching materials, while later, corpus data are used for data-driven learning and what is known as grammar safari. So this research aims at employing corpus data in teaching Arabic grammar. Functional syntactic analysis of corpus is a must for this purpose, so Quranic corpus is the most appropriate one. In this paper,I examined the specification phenomenon (التمييز) in Quranic corpus and compared the descriptive and prescriptive approaches in teaching causative object as a grammatical phenomenon in Arabic.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Reflection of the application TD-ABC approach on profits persistence Applied study in the General State of Hydraulic Industries Factory of Plastic*
...Show More Authors

The interest of many companies has become dealing with the tools and methods that reduce the costs as one of the most important factors of successful companies, and became the subject of the attention of many economic units because of the impact on the profits of company, and since the nineties of the last century the researchers and writers gave great attention to this subject, especially in light of the large competition and rapid developments in cost management techniques, as well as the wide and significant change in production methods that have been directed towards achieving customer satisfaction, all this and more driven by economic units in all sectors whether it is service or productivity to find methods that would reduc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 13 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Educational Program on Nurses’ Knowledge Concerning the Infection Control Guideline in Baghdad Teaching Hospital
...Show More Authors

Objectives: the study aims to findout the effectiveness of educational program concerning infection control guideline on nurses, and to find out the relationship between effectiveness of program and types of hospital unit, age, level of education, and years of experience of nurses. Methodology: A quasi-experimental design study was carried out in Baghdad teaching hospital in the wards, for the period of December, 20th 2013 to September, 30th of July 2014, The study samples is composed of (60) nurses who have been actually working in the medical ward, blood disease, psychiatric ward, and neurological war

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
مجلة دراسات افريقية
التنمية في جمهورية تنزانيا المتحدة دراسة في آثارها الاجتماعية والاقتصادية وتحدياتها الداخلية والخارجية
...Show More Authors

ركزت الدراسة على بيان مؤشرات التنمية الحديثة في جمهورية تنزانيا المتحدة مع بيان التحديات الداخلية والخارجية التي تواجهها والتي تعرقل استدامة هذه المؤشرات وتطورها بالشكل الذي يسمح لهذا البلد المحافظة على استقراره ،ومن ثم استمرار برامجه التنموية الشاملة المستدامة، وهذا الامر لا شك يتطلب مواجهة مستمرة وفاعلة للمعرقلات الاقتصادية والسياسية ومنظومة الفساد في اجهزة الدولة . وتوصلت الدراسة في مجمل نتائجها بان

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 01 2008
Journal Name
Al-academy
واقع تعليم الموسيقى وتعلمها في كلية الفنون الجميلة/ جامعة بغداد
...Show More Authors

كَشفت التنقيبات في مدن العراق القديم كالوركاء وماري عـن بقايا أبنية المدارس الموسيقية ( ) . وفي العصر السومري الحديث ( 2000 – 1950 ق. م. ) حُفِظ ما يؤيد وجود مواد المنهج الموسيقي النظري والعملي لعملية التعليم في مدرسة المعبد أو القصر الملكي ، إضافة لبعض اللقى الآثارية كآلات فخارية خاصة بالطفل ، والتي بوساطتها كان يتم تعليم الطفل في البيت ( ) . واحتلت الموسيقى مكانة هامة في حضارات الشرق المختلفة المُتزامنة مع حضارات و

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 19 2017
Journal Name
Al-academy
Peer Education Strategy and its Impact on the Development of Skill of Perspective Drawing
...Show More Authors

       After the twenty – first century become  necessary for us motorcade era in educational a chevements by searching  for the best  strategies and teaching methods and  techniques  artotalbagesh  resorting to the strategy

Did not use in use in the teaching of the foreseeable  material  general by voice and teaching  perspective  for the student of the class fourth science

In particular ,so the researcher asking the question follows:

Can the peer education strategy to have an impact in perspective drawing skill development ?

   From here it demonstrated the importance of current research know the impact of  p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 29 2022
Journal Name
Computers
Intelligent Robotic Welding Based on a Computer Vision Technology Approach
...Show More Authors

Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel

... Show More
View Publication
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri Dec 12 2003
Journal Name
Iraqi Journal Of Laser
Carbon Dioxide Laser Treatment of Viral Warts: A New Approach
...Show More Authors

Verrucae vulgares are commonly encountered. The present work is designed in an attempt to build a systematic procedure for treating warts by carbon dioxide laser regarding dose parameters, application parameters and laser safety.
Patients and Methods: The study done in the department of dermatology in Al-Najaf Teaching Hospital in Najaf, Iraq. Forty-two patients completed the study and follow up period for 3 months. Recalcitrant and extensive warts were selected to enter the study. Carbon dioxide laser in a continuous mode, in non-contact application, with 1 mm spot size was used. The patients were divided into two groups. The first group of patients consisted of 60 lesions divided to 6 equal groups, in whom we use different outputs a

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 24 2022
Journal Name
Arab World English Journal
Conflict in Atwood’s The Handmaid’s Tale: A Critical Discourse Approach
...Show More Authors

Conflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Serum CXCL 9 as a Potential Biomarker for Patients with Ulcerative Colitis
...Show More Authors

Background: Ulcerative colitis (UC) is an inflammatory bowel disease restricted to the large intestine, characterized by superficial ulceration. It is a progressive and chronic disease requiring long-term treatment. Although its etiology remains unknown, it is suggested that environmental factors influence genetically susceptible individuals, leading to the onset of the disease. (C-X-C) ligand 9 is a chemokine that belongs to the CXC chemokine family, it plays a role in the differentiation of immune cells such as cytotoxic lymphocytes, natural killer T cells, and macrophages. Its interaction with its corresponding receptor CXCR3 which is expressed by a variety of cells such as effector T cells, CD8+ cytotoxic T cells, and macrophage

... Show More
View Publication
Crossref