Preferred Language
Articles
/
jcoeduw-1590
The Reality of Teachers’ Use of Modern Technologies in Teaching Arabic as a Second Language in Terms of Objectives and Selection Foundations at the Institute of Arabic Language in Umm Al-qura University Mamoun Eltigani Hassan Eldali
...Show More Authors

This study aims to know the degree of importance and the availability of the enhancing specifications of the educational process, and the way its objectives are achieved. Such a step involves using educational techniques, laying the selection foundations, knowing the methods of their employment and tracking the obstacles that limit this employment in teaching Arabic to non-native speakers. To achieve these objectives, the study followed a descriptive approach, and collected the necessary data through an integrated questionnaire prepared for the purpose of describing the phenomenon or topic. This approach was adopted, as it is characterized by being comprehensive, focuses on collecting data related and necessary to the topic under study. It further suits research papers that deal with educational problems. The study has concluded that modern educational technologies are highly recommended to be used in teaching languages. Such technologies further meet the learners’ needs in terms of achieving special and behavioral goals, supporting the educational content, and activating the teaching methods to achieve the general goals of the educational process if attention was paid to the way they are used and to their governing rules. The study has also concluded that the most important obstacles in teaching using technology are lack of training, ignorance and lack of knowledge of the methods and of employing them in the educational situation. The study has recommended the necessity of having a good preparation for the educational process based on technology, and working to provide, update and follow-up on its maintenance. More so, the interest in teaching Arabic to non-native speakers through employing modern technologies in proportion to its elements and skills should be enhanced.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Computer Literacy with Skills of Seeking for Information Electronically among University Students
...Show More Authors

Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Computer Literacy with Skills of Seeking for Information Electronically among University Students
...Show More Authors

Computer literacy is an urgent necessity for university students, given the rapid development in the means of communication in which we live in this era, and the flow of abundant information. Mainly on the computer in all administrative and academic transactions, where first of all the registration for the semester is done through the computer. Computer culture has many characteristics and advantages that distinguish it from other sciences, including the concept of computer culture that cannot be defined absolutely, and it is difficult to define its levels, because the specifications of the computer-educated individual differ from one individual to another, and from time to time also, you find it a luxury in a country What, and you

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Comparison Of Oral Health Status And Behavior between First And Fifth Years Of Al-Mustansiriyah Dental Students
...Show More Authors

Background:Periodontal diseases and dental caries are the most common oral diseases, but they can be adequately prevented by adopting a specific health behavior and plaque control.The study was carried out to determine and compare oral health status; it included both caries experience, gingival health and oral hygiene behavior betweenfirst and fifth yearsof Al-Mustansiriyahdental students. Materials and methods: Total sample of the study consisted of 50 students at first year (25 males, 25 females)and 60 students at fifth year (30 males, 30 females). Plaque andgingival indices,dental caries indices (DMFS and DMFT) wererecorded to evaluateoral health status for each student. Further questionnaires were given to evaluate different oral hyg

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 14 2017
Journal Name
Human And Ecological Risk Assessment: An International Journal
Biochemical and hematological parameters and histological alterations in fish <i>Cyprinus carpio</i> L. as biomarkers for water pollution with chlorpyrifos
...Show More Authors

View Publication
Scopus (19)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Measurement of radionuclides in imported Coffee Consumed in Basra southern of Iraq and estimation of its annual effective dose
...Show More Authors

Radioactive elements were identified in samples of imported coffee consumed in the province of Basra using gamma spectrometry SAM940TM. It is a scintillation detector of NaI(Tl) crystal and the dimensions of 2×2 inch. We have identified specific concentration As(Bq/kg) and annual effective dose D(Sv/y) for radioactive elements (_^40)K, (_^131)I, (_^134)Cs and (_^137)Cs. The estimated average effective dose for adults from coffee samples were found to be 0.037mSv/y, 88.434nSv/y, 46.909nSv/y, 27.212nSv/y for ((_^40)K,(_^131)I,(_^134)Cs,(_^137)Cs) respectively. The present results of the study revealed that the radioactivity was relatively low in the coffee and within the permissiblelimit.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Modeling The Power Grid Network Of Iraq
...Show More Authors

Recently, the theory of Complex Networks gives a modern insight into a variety of applications in our life. Complex Networks are used to form complex phenomena into graph-based models that include nodes and edges connecting them. This representation can be analyzed by using network metrics such as node degree, clustering coefficient, path length, closeness, betweenness, density, and diameter, to mention a few. The topology of the complex interconnections of power grids is considered one of the challenges that can be faced in terms of understanding and analyzing them. Therefore, some countries use Complex Networks concepts to model their power grid networks. In this work, the Iraqi Power Grid network (IPG) has been modeled, visua

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Palarch's Journal Of Archaeology Of Egypt / Egyptology
&quot;Guarantees of Disciplinary Punishment on University Service Employee and Mechanisms for their Cancellation&quot; Comparative study
...Show More Authors

The university Service employee is considered one of the categories of public employees, However, The academic and administrative tasks duties that undertakes have made him a special importance and a distinguished legal status, Therefore, we find That the Iraqi legislatures assigned this category a special Law, it is the university Service law No (23) of 2008 as amended who dealt with some aspects related to serving this category, such as duties, right, condition for appointment and award of academic titles, and financial allocation, such as university service allocation, academic title allocations, and some other Provisions leaving other matters to the general service laws and employee discipline, among the matters that the legislator negl

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Resmilitaris
The right to property is a constitutional restriction on the work of the tax legislator
...Show More Authors

The study aims to reach a common point that achieves a balance between two interests, which are generally in conflict with the public interest and the interest of the individual owner of private property, by extrapolating the provisions of the constitutional judiciary that include the protection of private property, and this protection extends to every right of financial value and is not limited to a specific type, but It included everything that can be estimated with money, as ownership is no longer an advantage for the owner, but rather has become a right for him and a social function. The tax is imposed on what is derived from it, but if there is a need to prejudice it, the conditions, limits and restrictions expressly stipulated in the

... Show More
Scopus
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
King Khalid University towards Strategies Compatible with Brain-Based Learning (BBL)
...Show More Authors

The study aimed to reveal the level of knowledge and tendencies of high- study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with brain-based learning (BBL). And Then, putting a proposed concept to develop knowledge and tendencies of high-study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with Brain-based learning (BBL). For achieving this goal, a cognitive test and a scale of tendency were prepared to apply harmonious strategies with brain-based learning. The descriptive approach was used because it suits the goals of the study. The study sample consisted of (70) male and female students of postgraduate

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF