The study aims to identify the effectiveness of a structural theory-based training program in enhancing the teaching practices of Arabic language teachers teaching grade ten in South Al Batinah in Sultanate of Oman. The study used the quasi-experimental design, and the sample consisted of 40 male and female teachers. To achieve the objectives of the study, a training program, an observation form and a measurement tool of teachers’ tendencies towards a structural teaching were made. The program was implemented with an experimental group of 20 female and male teachers in the first semester of the academic year 2018/2019. The study has found that there is a statistically significant difference between the average grades before and after implementing the program, with higher grades achieved after implementation. There has also been no statistically significant difference between the average grades in the post implementation phase due to the social variable. The researcher recommended organizing training courses for Arabic language teachers to expand their knowledge of educational theories and their applications in classroom teaching practices, and benefiting from the structural teaching observation form in educational supervision.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe present study deals with the effect of teaching speaking Strategies (SS) on
EFL Iraqi College students. The use of speaking strategies not only solves learners’
communication problems, but also enhances the learner’s interaction in target language,
and improves their oral proficiency .The aim of the study is to find out the effect of
teaching SS used by EFL College students .The learner of the first stage is population of
the study at the Department of English, College of Education /Ibn-Rushd .The sample
consists of (60) students distributed on experimental group(A) as well as control
group(B) each group contains (30) students . In order to achieve the aim of the study,
questionnaire has been constructed t
Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. M
... Show MoreThe importance of the research lies in knowing the effect of the exercises of the reciprocal method in developing some physical abilities in learning the performance of the players for the effectiveness of the long jump in an economical manner in terms of time and effort and knowing their positive impact and the extent of their impact in creating the required learning for students, and the research aims to prepare reciprocal style exercises in developing some abilities The researchers used the experimental method in the pre and post test for the experimental and control groups to suit the nature of the research, and the research community was identified for the long jump players, the Specialized School for Talent Care in the 2022 sports sea
... Show MoreThe internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat
... Show MoreThe internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat
... Show MoreThe study aimed to explore the relationship between future anxiety and life orientation of male and female nurses, working in government hospitals of Gaza Strip governorates. The study sample consisted of 228 nurses (131 male nurses and97 female nurses. To achieve the study objectives , the researcher used the future anxiety scale, prepared by the researcher, and life orientation scale prepared by Scheier and Craver (1985 ) and translated into Arabic by Bader Al-Ansari . The results indicated that the level of future anxiety among nurses working at government hospitals was (64.85%), a high percentage, whereas life orientation was (65.96%), a low percentage. Additionally , the results showed that the Pearson correlation coefficient betwee
... Show More