This study aims to know the degree of importance and the availability of the enhancing specifications of the educational process, and the way its objectives are achieved. Such a step involves using educational techniques, laying the selection foundations, knowing the methods of their employment and tracking the obstacles that limit this employment in teaching Arabic to non-native speakers. To achieve these objectives, the study followed a descriptive approach, and collected the necessary data through an integrated questionnaire prepared for the purpose of describing the phenomenon or topic. This approach was adopted, as it is characterized by being comprehensive, focuses on collecting data related and necessary to the topic under study. It further suits research papers that deal with educational problems. The study has concluded that modern educational technologies are highly recommended to be used in teaching languages. Such technologies further meet the learners’ needs in terms of achieving special and behavioral goals, supporting the educational content, and activating the teaching methods to achieve the general goals of the educational process if attention was paid to the way they are used and to their governing rules. The study has also concluded that the most important obstacles in teaching using technology are lack of training, ignorance and lack of knowledge of the methods and of employing them in the educational situation. The study has recommended the necessity of having a good preparation for the educational process based on technology, and working to provide, update and follow-up on its maintenance. More so, the interest in teaching Arabic to non-native speakers through employing modern technologies in proportion to its elements and skills should be enhanced.
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreAbstract: The aim of the current research is to identify (the relationship between deep understanding skills and mathematical modeling among fifth grade students) the research sample consisted of (411) male and female students of the fifth grade of biology distributed over the General Directorates of Education in Baghdad / Al-Rusafa / 2 / and Al-Karkh / 1 /, and two research tools were built: 1- A test of deep understanding skills, consisting of (20) test items and a scale for two skills. 2- The second test consists of (24) test items distributed among (18) essay items and (6) objective items. The psychometric properties of validity, stability, discriminatory strength, and effectiveness of alternatives were verified for the two tests fo
... Show MoreThis paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show More<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreThe main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators
This study includes Estimating scale parameter, location parameter and reliability function for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).
Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)
... Show MoreDie Forschung geht um das wichtigste Thema für die literarischen Studien, die um die literarische Übersetzung und die Deutlichkeit dem Leser gekreist sind. Die literarische Übersetzung ist ein schwieriger Prozess, der auf vielseitigen Faktoren beruht ist, damit es erfolgreich gelungen ist. Dies ist auch ein gemeinsamer Prozess durch das Kunstwerk zwischen dem Autor und Übersetzer, so dass der erste Schritt in der vorliegenden Forschung wie folgendes lautet: muss es der Autor genau bestimmt wird, wie er die methodischen Grundprinzipien des Wekes im Dienst der zentralen Idee formuliert, und wie er die literarische Gestalt durch die voll erfassende Vorstellung des Wekes dichtet. Denn die literarische Arbeit besteht aus zwei Teilen
... Show MoreThis research concerns study the crack growth in the wall of pipes made of low carbon steel under the impact load and using the effect of hygrothermal (rate of moisture 50% and 50℃ temperature). The environmental conditions were controlled using high accuracy digital control with sensors. The pipe have a crack already. The test was performed and on two type of specimens, one have length of 100cm and other have length 50cm. The results were, when the humidity was applied to the pipe, the crack would enhance to growth (i.e. the number of cycles needed to growth the crack will reduce). In addition, when the temperature was increase the number of cycles needed to growth the crack are reduced because the effect of heat on the mechanical pro
... Show More