This study aims to know the degree of importance and the availability of the enhancing specifications of the educational process, and the way its objectives are achieved. Such a step involves using educational techniques, laying the selection foundations, knowing the methods of their employment and tracking the obstacles that limit this employment in teaching Arabic to non-native speakers. To achieve these objectives, the study followed a descriptive approach, and collected the necessary data through an integrated questionnaire prepared for the purpose of describing the phenomenon or topic. This approach was adopted, as it is characterized by being comprehensive, focuses on collecting data related and necessary to the topic under study. It further suits research papers that deal with educational problems. The study has concluded that modern educational technologies are highly recommended to be used in teaching languages. Such technologies further meet the learners’ needs in terms of achieving special and behavioral goals, supporting the educational content, and activating the teaching methods to achieve the general goals of the educational process if attention was paid to the way they are used and to their governing rules. The study has also concluded that the most important obstacles in teaching using technology are lack of training, ignorance and lack of knowledge of the methods and of employing them in the educational situation. The study has recommended the necessity of having a good preparation for the educational process based on technology, and working to provide, update and follow-up on its maintenance. More so, the interest in teaching Arabic to non-native speakers through employing modern technologies in proportion to its elements and skills should be enhanced.
Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions as a whole.
The topic of attention was drawn to the attention of the speakers, as it made me ponder it carefully, and my goal in that is to know the reason for the interest of the speakers and their care for it, and to clarify from their books the purpose of making this topic one of the advanced investigations with them.
The idea of writing a paper on the subject of consideration was not absent from my thinking, because I saw the attention of speakers on this issue, as they made it one of the first issues that they deal with studying in their work
... Show MoreThe adsorption ability of Iraqi initiated calcined granulated montmorillonite to adsorb Symmetrical Schiff Base Ligand 4,4’-[hydrazine-1, 2-diylidenebis (methan-1-yl-1-ylidene)) bis (2-methoxyphenol)] derived from condensation reaction of hydrazine hydrate and 4-hydroxy-3-methoxybenzaldehyde, from aqueous solutions has been investigated through columnar method.The ligand (H2L) adsorption found to be dependent on adsorbent dosage, initial concentration and contact time.All columnar experiments were carried out at three different pH values (5.5, 7and 8) using buffer solutions at flow rate of (3 drops/ min.),at room temperature (25±2)°C. The experimental isotherm data were analyzed using Langmuir, Freundlich and Temkin equations. The monol
... Show MoreThis work is based on the synthesis of Cobalt(II) and Cadmium(II) mixed-ligands compounds obtained from the reaction of N'-(4-methylsulfanyl-benzoyl)-hydrazine carbodithioic acid methyl ester as a ligand and using ethylendiamine (en), 2,2'-bipyridine (bipy) or 1,10-phenanthroline (phen) as a co-ligand. The synthesis of ligand (HL) was based on multi-steps synthetic procedure. The reaction of 4-methylsulfanyl-benzoyl chloride with hydrazine gave 4-methylsulfanyl-benzoic acid hydrazide. This compound was reacted with carbon disulfide and potassium hydroxide in methanol to yield N'-(4-methylsulfanylbenzoyl)-hydrazine potassium thiocarbamate, which upon reaction with methyl iodide resulted in the formation of the ligand. A range of physico-chem
... Show MoreAbstract* Backgrounds The retention of the maxillary complete denture may be influenced by adequate recording in the patient’s mouth, marking, and carving of the post-dam on the maxillary cast. Failure to do so may lead to loss of retention. Successful denture construction with patient’s comfort could be achieved by effective methods of recording, marking, and carving of the post-dam. The aim of the study was to assess Iraqi dentists in their knowledge and application of the post-dam in maxillary complete dentures. Methods Questionnaires were distributed randomly through online Google Forms and 118 Iraqi dentists with different academic degree participated in the study. A multinomial logistic regression model was also used to ass
... Show MoreThe objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.
A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.
Being unsatisfied with the job was as
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show Moreالأثر V بالنسبة إلى sinshT و خواصه قد تم دراسته في هذا البحث حيث تم دراسة علاقة الأثر المخلص والاثر المنتهى التولد والاثر المنفصل وربطها بالمؤثرات المتباينة حيث تم بهنة العلاقات التالية ان الاثر اذا وفقط اذا مقاس في حالة كون المؤثر هو عديم القوة وكذلك في حالة كون المؤثر شامل فان الاثر هو منتهي التولد اي ان الغضاء هو منتهي التولد وايضا تم برهن ان الاثر مخلص لكل مؤثر مقيد وك\لك قد تم التحقق من انه لاي مؤثر مقي
... Show More