The current research aims to investigate the skills of the intended meaning beyond the context when reading poetry among fifth literary students. To achieve the aim of the research, the researcher has followed the descriptive approach and used two tools: an open questionnaire that includes an inquiry about the skills of the intended meaning beyond the poetic context, and a closed questionnaire that were examined by the juries, and modified accordingly. Besides, its validity and stability were examined by applying the study on an exploratory sample of (15) teachers to reach its final version and determine the time required to answer it. Then, the researcher applied it on the research sample of (96) male and female teachers selected from various schools in the center of Babylon Governorate, who teach fifth grade of the literary branch. After processing the responses statistically, the research has concluded the following: three intended meaning skills have been identified to determine the intended meaning beyond the poetic context. Regarding the item (training students to be able to determine the meaning of difficult words in the text) of the first item of the skill, it has the highest score, as its intensity reached (4,41) and its percentage weight reached (%88,3). The item (training students to be able to understand the hidden meaning of the text and the recognition of its aesthetic value) of the second item of the skill has gained the highest score which amounts to (4.33) with a percentage weight of (%86.6). The item (training the students on the use of educational aids related to the text, which may be pictures or phrases) of the third item of the skill has received the highest score, as its intensity reached (4.5) a percentage weight of (%90). According to these results, the researcher has recommended that students should be given enough time to be able to consider and understand the meaning of a text.
The research includes the preparation of several complexes of the internal transition elements lanthanide (Ln = La, Nd, Er, Gd, and Dy) containing the 4f shell, with Schiff bases resulting from condensation reactions between 4-antipyrinecarboxaldehyde and 2-aminobenzothiazoles. Schiff's base was identified using FTIR spectra, UV-vis spectroscopy, elemental microanalysis CHNSO, nuclear magnetic resonance, mass spectrometry, and TGA thermal analysis. The complexes were studied and identified with elemental microanalysis CHNSO, FTIR spectroscopy, UV-vis spectroscopy, TGA thermal analysis, conductivity measurement, and magnetic sensitivity. The result showed that these complexes were classified as homogeneous bidentate complexes with th
... Show Moreהריאליזם הספרותי במשמעו הכללי מצייג אשר כל מה מציינת בה הספרות מציורים מדוייקים לסביבה ולכן
אדם. ויש להתחשב בפרטים המשותפים לחיים היומיומית.
האסכולה הריאליזטית מצטיינת בזיאנרים אין זוכים בם איזו אסכולה ספרותית אחרת . האסכולה הזאת
הופיעה בספרות העברית החדשה כתוצאה להשפעתה של הספרות העברית בספרות העולמית האחרת ,
והמספרים העבריים בתנוטה הספרותית החדשה השתדלו במאמצים גדולים למען להתפתח את התנועה הזאת
تتركز مشكلة البحث في ضعف كثير من المربين معلمين كانوا أو مدرسين في التعامل مع أخطاء المتعلمين في ضوء السنة النبوية مما يؤدي إلى تعلم غير منتظم، ومن أهم أسباب هذه المشكلة قلة الإطلاع على الأساليب العملية التي ينبغي أن يتعامل بها المربي مع أخطاء المتعلمين، ولا سيما الأساليب المستمدة من القرآن الكريم والسنة النبوية، وهذا ما لمسه الباحث واقعاً من خلال ممارسته لعملتي التعليم والتدريس لمدة خمس عشرة سنة، ومن خ
... Show Moreהקדמה
הריאליזם הספרותי במשמעו הכללי מצייג אשר כל מה מציינת בה הספרות מציורים מדוייקים לסביבה ולכן אדם. ויש להתחשב בפרטים המשותפים לחיים היומיומית.
האסכולה הריאליזטית מצטיינת בזיאנרים אין זוכים בם איזו אסכולה ספרותית אחרת. האסכולה הזאת הופיעה בספרות העברית החדשה כתוצאה להשפעתה של הספרות העברית בס
... Show MoreAssyrian merchants established in the second millennium BC Assyrian commercial settlements in Anatolia, and these settlements had a great cultural value
This paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parame
... Show Moreت لا نم ظ او ره لا يأ لاح اهلاح رضاحلا رصعلا يف ةريطخ ه ةوشرلا لثم ةيداصتقا ةميرج ديعصلا ىلع ةيبلس بقاوع اهل يتلاو زازتبلااو لاوملأا لسغو ني ىلا ةجاحلا تءاج انه نم ، يداصتقلااو يعامتجلاا تاسسؤم لبق نم اهينبت يغبني يرادلإاو يلاملا داسفلا نم دحت تامدخو بيلاسأو تاينقت ةيلاملا مئارجلا نم دحلل ةلودلا اع ىلع عقت يتلا تاسسؤملا نمو ةيئاصقتسلاا ةبساحملا وا ةيئاضقلا ةبساحملاب تلثمت ةيداصتقلاا تادحولا يف ينبت اهقت ة
... Show MoreAssyrian merchants established in the second millennium BC Assyrian commercial settlements in Anatolia, and these settlements had a great cultural value
Faintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More