The study aims to demonstrate the importance of instructional methods in teaching Arabic language as a second language or teaching the Arabic language to non-native speakers. The study is in line with the tremendous development in the field of knowledge, especially in the field of technology and communication, and the emergence of many electronic media in education in general and language teaching in particular. It employs an image in teaching vocabulary and presenting the experience of the Arabic Language Institute for Non-Speakers-King Abdul-Aziz University. The study follows the descriptive approach to solve the problem represented by the lack of interest in the educational methods when teaching Arabic as a second language. Accordingly, the study is to answer the following questions: What is the importance of using teaching aids when teaching Arabic to non-Arabic speakers?What are the methods of employing (an image) as an instructional tool in teaching vocabulary? The study has reached that teaching aids are of great importance in studying the Arabic language for the non-native, the image of the audio and visual aids plays a great role in teaching vocabulary to the beginners. In its modern version, it helps directly in teaching the language from a distance and thus fulfills the hopes of many in teaching Arabic language and covers the acute shortage of a language teacher.
Takbiratul Ehram "The First Takbeer to Start Prayer" means: the words that the worshiper says to start his prayers, and refrain from anything invalidates it. the findings revealed that the four school jurists agreed that the prayer is not valid without Takbiratul Ehram "The First Takbeer to Start Prayer", and they disagreed on its description, so the majority of jurists said that it is a pillar, and some of them called it an obligatory, but Hanafi made it a condition. Likewise, the four jurists agreed that the one who articulates Takbiratul Ehram "The First Takbeer to Start Prayer" with the word: “Allahu Akbar,”; his Takbeer is correct, and they disagreed about the one who adds a word, or replaced it with another, where the m
... Show MoreThe present article is devoted to the analysis of Arabic phraseological units with a component hand, selected by continuous sampling from the “Training Russian-Arabic phraseological dictionary: about 900 phraseological units” by G. L. Permyakov. Arabic phraseological units with a component hand are modeled as invariant situations (by logical-semiotic models) and figurative statements are expressed by phraseological variants (according to the figurative characteristic of the hand component). The artical focuses on the fact that somatism in Arabic phraseology has a symbolic and symbolic nature, marking various situations of Arabs' behavior, their actions, deeds, rituals, emotional and psychological states, etiquette, in
... Show MoreResearch was: 1- known as self-efficacy when students perceived the university. 2- know the significance of statistical differences in perceived self-efficacy according to gender and specialty. Formed the research sample of (300) students were chosen from the original research community by way of random (150) male specialization and scientific and humanitarian (150) females specialized scientific and humanitarian. The search tool to prepare the yard tool to measure perceived self-efficacy based on measurements and previous literature on the subject of perceived self-efficacy. The researcher using a number of means, statistical, including test Altaúa and analysis of variance of bilateral and results showed the enjoyment of the research s
... Show MoreThis research aims at identifying the level of quality of University environment according to the viewpoint of female students taking the College of Sciences for Woman an example, as represented in the college units as registration unit and the unit of students' affairs, the curricula, instructors, study halls, the college library, scientific labs, computer access, stationary and photocopying services, health care center, the unit of artistic, cultural and sportive activity, the canteen, the college gardens, college buildings and equipment and bathrooms. To achieve the objectives of the research, the researcher prepared a questionnaire to identify the viewpoints of female students concerning the extent of the availability of the standards o
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreIntroduction/Aim. Rhabdomyosarcoma (RMS) is the most common soft tissue sarcoma in pediatric population and adolescents. Limited data is available on the characteristics of RMS in Iraqi pediatric patients. The aim of the study was to examine the clinical and histological aspects of RMS in Iraqi children, with a focus on their response to treatment, prognosis, and survival. Methods. A retrospective cohort study was conducted at the Oncology Unit of Children's Welfare Teaching Hospital, Medical City, Baghdad, Iraq and included patients who were newly diagnosed with RMS and received treatment during the period between January 1, 2015, and December 31, 2019. The patients were followed up from the time of diagnosis until October 1, 2020.
... Show More
|
Abstract This research deals with the definition of the concept of nodal purposes, And what is related to it, from its aim and importance, And for the purposes of the importance of Streptococcus In trying to understand the nodal truths For different minds, Especially with those who object to the introduction of belief in purposes studies, This research has two requirements: The first requirement: the concept and the aim of contractual purposes,It consists of two branches, The first is in the concept of nodal purposes, And it dealt with the definitions in terms of language and terminology And what we see is proportional to what aim |
Abstract:
This research aims to compare Bayesian Method and Full Maximum Likelihood to estimate hierarchical Poisson regression model.
The comparison was done by simulation using different sample sizes (n = 30, 60, 120) and different Frequencies (r = 1000, 5000) for the experiments as was the adoption of the Mean Square Error to compare the preference estimation methods and then choose the best way to appreciate model and concluded that hierarchical Poisson regression model that has been appreciated Full Maximum Likelihood Full Maximum Likelihood with sample size (n = 30) is the best to represent the maternal mortality data after it has been reliance value param
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show More