The current research aims to investigate the effect of a specimen of Daniel in the acquisition of concepts for the Arabic language curricula material to the students of the third phase of the Faculty of Basic Education Department of Arabic Language. The sample consists of (93) applications and a student of (47) students in the Division (A), which represents the experimental group which studied the use of a specimen of Daniel, and (46) students in the Division (B), which represents the control group, which studied the traditional way. The subject of unified two groups, which subjects the Arabic language curricula which includes six chapters.
The duration of the experiment is a full semester. The researchers also prepared a tool for measuring the test is the acquisition of concepts for students (sample), prepared by researchers in the light of the goals of behavioral classification (Bloom) of the domain knowledge. After analyzing the responses and calculate the grades, not serve the educational Administration researchers test (T-Test) for independent samples to determine the significance of differences between the achievement of students in the two groups. The results showed the emergence of a statistically significant difference at the level (0.05) between the average degrees of the two groups and in the interest of the experimental group which studied the use of the model of Daniel. In light of the above researchers to reach a number of recommendations including: First: the use of interest in modern teaching models, in particular a specimen of Daniel. Second: Preparation of a nest containing the mock-teaching modern distributed to teachers.
The Al-Shishtary is considered one of the well-known Andalus poets. His poetry represents a flood of kind emotions, springs from the sincere sources of Divine Love, and this is what we felt in his life and his literary prestige. He was a poet who was familiar withthe art of his timeknowsthe oldand popularintellectual assets ofIslamicSciencesof Sharee'a. This wide culture, which he had, is available to him through his many travels between the coasts of Syria, Egypt and others ... to become Imam of the religion way known as(Al-Shishtariyah)resonatedin the hearts ofthe general publicespecially the poor people. This showshis smoothand influential styleand his humanitarian andsimple words which resonate in the hearts of his followers, therefo
... Show MoreThe childhood of the most important stages throughout the human and which have been more vulnerable to various factors surrounding it and with the scientific and cognitive development in all fields surfaced many psychological phenomena that play a large role in influencing children and their behavior trends is the susceptibility of the lure of psychological phenomena which plays a major role in the social attitudes of individuals it may not be predictable so that individuals vary in between them in terms of vulnerability Balasthoa You do this only _bl that the same individual at different influenced Balasthoa different depending on the positions and this was research to achieve its objectives and that are known:
_ alasthoa The childre
This paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreThe present study was designed to evaluate the immunological status in a sample of Iraqi males with primary infertility and them age range18-55 years, who were attending the Centre of Infertility and in vitro Fertilization (Kamal Al-Samaraie Hospital, Baghdad) during the period December 2008 – April 2009. They were divided into three groups; 40 patients with anti-sperm antibodies (ASA), 20 patients with Asthenozoospermia (AST) and 20 patients with azoospermia (AZO). In adition to20 fertile males was as control group. The parameters of evaluations were standard seminal fluid analysis, anti-sperm antibodies and anti-mitochondrial antibodies in serum, Therefore, two types of samples were collected from each subject; seminal fluid and blood.
... Show More