The study aimed to identify the degree of availability of design Thinking Indicators in The content of the Arabic Language Curricula at the secondary stage in the Syrian Arab Republic; to achieve the goal of the study. The researcher used the Descriptive Approach based on the analysis method according to the Cognitive Theory. The study tools consist of a list of Design Thinking Indicators and a Content Analysis Tool. The researcher completed the Validity and Reliability procedures for the tools. After applying them, the results of the study resulted in the following: Greater Interest than other sub-skills. The results also showed a Divergence of care for the sub-skills and the Difference in their recurrence rate, and the Omission of some sub-skills that did not have any opportunity to be trained on, sub-indicators of Design Thinking.
The importance of studying the political trends of caricature in Al-Sharq Al-Awsat Newspaper comes from the importance of this magical and satirical journalistic art, as it addresses various trends with satirical criticism that exposes the negative sides and affects the reader’s consciousness in a way or another by contributing to the public opinion about these issues and topics that affect people's lives and their future. Therefore, this art is no less important than the other arts, on the contrary, it complements the other arts and also contributes to the importance of Journalism. Also, the choice of Al-Sharq Al-Awsat Newspaper as being one of the most widely circulated and prominent Arab newspapers, t
... Show MoreDirectional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show MoreThe current study aims to
1) identify the prevalent Enneagram personality types and the academic self among the sixth-grade students of the distinguished secondary schools; 2) the differences of relationship between the Enneagram personality types and the academic self-concept based on gender; 3) identify the correlation between the Enneagram personality types and the academic self-concept; and 4) identify the contribution of each type of personality types to the academic self-concept. To this end, two instrument were used to collect the data: Riso-Hudson’s scale,1995 was administered to measure enneagram types which had translated to the Arabic language by ( al-yassery,2004), the other instrument was
... Show Moremajor goal of the next-generation wireless communication systems is the development of a reliable high-speed wireless communication system that supports high user mobility. They must focus on increasing the link throughput and the network capacity. In this paper a novel, spectral efficient system is proposed for generating and transmitting twodimensional (2-D) orthogonal frequency division multiplexing (OFDM) symbols through 2- D inter-symbol interference (ISI) channel. Instead of conventional data mapping techniques, discrete finite Radon transform (FRAT) is used as a data mapping technique due to the increased orthogonality offered. As a result, the proposed structure gives a significant improvement in bit error rate (BER) performance. Th
... Show MoreIn this paper, a discussion of the principles of stereoscopy is presented, and the phases
of 3D image production of which is based on the Waterfall model. Also, the results are based
on one of the 3D technology which is Anaglyph and it's known to be of two colors (red and
cyan).
A 3D anaglyph image and visualization technologies will appear as a threedimensional
by using a classes (red/cyan) as considered part of other technologies used and
implemented for production of 3D videos (movies). And by using model to produce a
software to process anaglyph video, comes very important; for that, our proposed work is
implemented an anaglyph in Waterfall model to produced a 3D image which extracted from a
video.
The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time. Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle to involve four types of binary code books (i.e. Pour when , Flat when , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s
... Show MoreThe spectrum of clinical efficacy of Methotrexate (MTX) is broad in that MTX is used in the treatment of certain cancers, severe psoriasis and rheumatoid arthritis.Various mechanisms by which cancer cells grown in tissue culture become resistant to anticancer drugs. The use of multiple drugs with different mechanisms of entry into cells and different cellular targets allows for effective chemotherapy and high cure rates. In an efforts to develop effective strategies that increase the therapeutic potential of anticancer drugs with less systemic toxicity ,are being directed towards the investigation of dietary supplements and other phytotherapeutic agents for their synergistic efficacy in combination with anticancer drugs. A promi
... Show More