The exchanges in various fields,like economics, science, culture, etc., have been enhanced unceasingly among different countries around the world in the twenty-first century, thus, the university graduate who masters one foreign language does not meet the need of the labor market in most countries.So, many universities began to develop new programs to cultivate students who can use more foreign languages to serve the intercultural communication. At the same time, there is more scientific research emerged which is related to the relationship between the second and third languages. This humble research seeks to explain the relevant concepts and analyze the real data collected from Shanghai International Studies University in China, to explore this relationship transparently in front of readers and provide recommendations for non-native speakers,especially Chinese learners. Additionally, as a sample study, it aims to serve other researchers and future studies as well.The research results will be produced according to the quantitative and qualitative analyses at the same timeto guarantee the objectivity and validity of the data. As for the part of the qualitative analysis, the paper will explain some related concepts generated in the western world, including their characteristics, benefits, and differences. As for the part of the quantitative analysis, it will refer to the statistics program SPSS. Then, it will produce relevant data with drawings and tables. Lastly, it will clarify the meanings of those data and the relationships among them.
The aim of the research is to identify the reality of administrative motivation for the deans of the faculties of physical education and sports sciences at the universities of Baghdad and Al-Mustansiriya from the point of download of the faculty members. The number of the exploratory sample was (7) faculty members, they were taken in a random way, while the rest of the sample number was (150) faculty members who considered the application sample for the scale, and the two researchers also adopted a questionnaire for the scale and it is applied to the Iraqi environment. phrase, which are phrases that are interrelated with the administrative leadership motivation in the faculties of physical education and sports sciences. The researchers did
... Show MoreThe monetary policy is a vital method used in implementing monetary stability through: the management of income and adjustment of the price (monetary targets) in order to promote stability and growth of real output (non-cash goals); the tool of interest rate and direct investment guides or movement towards the desired destination; and supervisory instruments of monetary policy in both quantitative and qualitative. The latter is very important as a standard compass to investigate the purposes of the movement monetary policy in the economy. The public and businesses were given monetary policy signals by those tools. In fiscal policy, there are specific techniques to follow to do the spending and collection of revenue. This is done in order to
... Show MoreThis experiment was conducted in the season 2001-2000 in station Ishaqi the company's general industrial crops to plant livestock Vigna radala deleted (Khadrawi) carried out the experiment design panels splinter and order in RCBD with three balls two factors are levels nitrogen fertilizer (120 and, 100.0 kg urea / ha)nitrogen ratio of 46%, which put in the main panels mAIN PLOT and Alkiavat three levels that were placed in secondary panels .....
Ruthenium-Ruthenium and Ruthenium–ligand interactions in the triruthenium "[Ru3(μ-H)(μ3-κ2-Hamphox-N,N)(CO)9]" cluster are studied at DFT level of theory. The topological indices are evaluated in term of QTAIM (quantum theory of atoms in molecule). The computed topological parameters are in agreement with related transition metal complexes documented in the research papers. The QTAIM analysis of the bridged core part, i.e., Ru3H, analysis shows that there is no bond path and bond critical point (chemical bonding) between Ru(2) and Ru(3). Nevertheless, a non-negligible delocalization index for this non-bonding interaction is calculated
... Show MoreInfertility represents a growing health problem in Mosul city and worldwide. Infertility defined as a failure to induce pregnancy after unprotected sexual intercourse for more than 12 months. Infertility in male is a multifactorial complex pathology that leads to different types of problems. This work try to explore the correlation between glycosylation gap and seminal fructosamine and another parameter in the young male patient in Mosul city. The study included 50 subjects with age range 19-29 year with BMI 18-26. The infertility group include 25 patients newly diagnosed with infertility before starting any treatment; have no infection and no structural abnormality. The control group included 25 healthy subjects. HbA1c, fructosamine, Se
... Show MoreBackground: The study aim was to evaluate thermocycling effect on microleakage of occlusal and cervical margins of MOD cavity filled with bulk filled composites in comparison to incrementally placed nanohybrid composite and to evaluate the difference in microleakage between enamel and dentin margins for the three materials groups. Materials and method: Forty eight maxillary first premolars were prepared with MOD cavities. Samples were divided into three groups of sixteen teeth according to material used: Grandio: Grandio. SDR: SDR +Grandio. X-tra: X-tra base + Grandio. Each group was subdivided into two according to be thermocycled or not. After 24 hrs immersion in 2% methylene blue, samples weresectioned and microleakage was estimated. Res
... Show MoreThe current work aims to evaluate the association between genetic mutations in thymidylate synthetase (
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More