Nowadays, the ideas of integrating the concepts of the environment and saving it are being famous. These ideas are widely seen in many fields of study, and language education is one of them. Thus, the identity of English Language teachers (ELT) is a step toward transferring this concept in EFL materials in ELT departments. The EFL teacher's identity takes different meanings. Sometimes, it only means the teacher who teaches the English language, and other times, it means, the cultural and social aspects that the teacher and students interact during the study course. These cultural and social aspects represent the environment in teacher’s identity. This study aims to explore the environmental identity within EFL teacher identity. The sample of 100 student-teachers has been selected randomly from the fourth-grade students in the department of English language in the University of Baghdad. The study tool is adapted from the Environmental Identity Survey (Clayton et al., 2021) and Xun’s et al. (2014) EFL teacher identity questionnaire. After ascertaining the face validity and reliability of the tool, the study has been applied to the study sample. The results have shown that 16 items of the scale are high, 31 items are moderate, and three of them are low. However, the final results have indicated that student-teachers’ perception of their environmental identity is moderate.
This paper investigates the effect of magnetohydrodynamic (MHD) of an incompressible generalized burgers’ fluid including a gradient constant pressure and an exponentially accelerate plate where no slip hypothesis between the burgers’ fluid and an exponential plate is no longer valid. The constitutive relationship can establish of the fluid model process by fractional calculus, by using Laplace and Finite Fourier sine transforms. We obtain a solution for shear stress and velocity distribution. Furthermore, 3D figures are drawn to exhibit the effect of magneto hydrodynamic and different parameters for the velocity distribution.
Ethanolic crude extracts of leaves from Laurus nobilis and Alhagi maurorumfor were screened for alkaloids, saponins, tannins, anthraquinones, steroids, flavonoids, glycosides, and glucosides contents. Biochemical activities, including antibacterial activity, antioxidant, and antihemolytic activity, were investigated. Antibacterial activity against Three types of pathogenic bacteria was detected by disc diffusion analysis and characterized by zone of inhibition (ZOI). Antioxidant properties were determined by a diphenyl-1- picrylhydrazyl (DPPH) method. Results revealed that the inhibitory activity of the plants against G+ve and G-ve bacteria were different, where the greatest ZOI of Alhagi maurorum a
... Show MoreThe present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil
... Show MoreNeuro-ophthalmology, bridging neurology and ophthalmology, highlights the nervous system’s crucial role in vision, encompassing afferent and efferent pathways. The evolution of this field has emphasized the importance of neuroanatomy for precise surgical interventions, presenting educational challenges in blending complex anatomical knowledge with surgical skills. This review examines the interplay between neuroanatomy and surgical practices in neuro-ophthalmology, aiming to identify educational gaps and suggest improvements.
A literature search across databases such as PubMed, Scopus, and W
An extensive program of laboratory testing was conducted on ring footing rested on gypseous soil brought from the north of Iraq (Salah El-Deen governorate) with a gypsum content of 59%. There are limited researches available, and even fewer have been done experimentally to understand how to ring footings behave; almost all the previous works only concern the behavior of ring footing under vertical loads, Moreover, relatively few studies have examined the impact of eccentric load and inclined load on such footing. In this study, a series of tests, including dry and wet tests, were carried out using a steel container (600×600×600) mm, metal ring footing (100 mm outer diameter and 40 mm inner diameter) was placed in the m
... Show MoreOne of the most important problems that would continuously face the Higher education organizations is how to improve the service level presented by them, and how this can lead to increase demand for services of this organizations.As this issue has exhausted many organizations pushed some of them to withdraw from the market Because of weaknesses in their services. Here lies the importance of this matter to be given more attention in order to maintain the organization competitive position. According to that, The selection of the research title (The Impact of Quality on the Level of the University Service Request) which seeks to measure the impact of service quality on the level of demand, At a time when world&
... Show MoreTechnique was used to retail for analyzing atom beryllium ion cathode of an atom lithium to six pairs of functions wave which two ?????? and the rest of the casing moderation and to analyze atom lithium ion Mob atom beryllium to three pairs of functions wave pair of casing and the rest of the casing moderation using function wave Hartree Fock and each casing email wascalculate expected values ??....
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.