Training and retraining of teachers have become a central issue in Iraq recently especially in-service training of English teachers on the new curricula (Iraq opportunities). English teachers should be objectively evaluated and assessed.
A sample of (40) trained teachers of English is included in the study and a questionnaire is used as the main instrument of the study.
The main findings of the study were the following:
1. The trainees were serious in training on the new course (item 6) the programme helped increase their information (item 4) and motivate them towards better teaching (item 3). The aims of the programme were clear (item1). The programme helped develop their teaching skills (item 2) and was comprehensive (item 5).
2. Most of the trainees benefit from the subject of testing (item12). The programme helped most of them train on teaching methods (item7).
3. Teachers' trainers were vocational and led training sessions perfectly (items 14 and 13). They fairly used lecture formats and discussion in delivering lectures (item 15 and 16).there administration and using other combined methods were not successful (items 18 and 17).
4. Items in the table of training methods showed great shortage. (table3)
5. In the field of using training aids, whiteboard was over used (item29).
6. In table (5) duration of the course was suitable to most of the trainees (item33) but its period interfered with school timetable of the trainees (item 35). Other items showed different degrees of defect in this field.
7. In the field of evaluation. Class oral discussion was used (item 24) and a post-test at the end of the course (item 39). Other procedures of evaluation were neglected.
8. In the field of trainees needs. trainees got advantage in teaching English in the classroom (item 48) and lesson planning of different period (item 47). They were trained how to be adequate with the objective of teaching English in Iraq (item 47). They were also trained on teaching different skills (item46) and established relationship between the objectives and content of the textbooks (item 43). (Items 50, 49, 51 and 44) did not meet trainees needs' in group (A).
9. In group (B) trainees preferred printing the lectures (item 54) and discussing them in the classroom (item 53). In group (C) trainees showed that using the whiteboard was efficient (item 55). Teaching aids were not appropriate (item 56).
A conclusion and some recommendations were mentioned at the end of the research based on the findings of the study in order to improve the quality of in-service training programmes in Iraq.
The aim of the research is to identify an appropriate training method that raises the levels of immune globulins (IgA, IgM, IgG) and white blood cells and the effect of training by (HIT) method using resistance (weights) as a training curriculum that increases immunity and ensures the continuation of the pills after the return of activity from the stone The response to the Covid-19 epidemic among amateur weightlifters, the researchers relied on the method of trace analysis in an experimental way by conducting a pre-, medial and post-test with the same experimental one agroup on a sample of amateur weightlifters in the Fury private hall for weightlifting and body building in Adhamiya, the number of sample members reached (15 players) who int
... Show MoreThe research seeks to highlight the importance of digital finance in banking by providing financial and banking services and its role in improving the access of financial services to customers at the farthest possible point by using modern technology to finance their needs by granting them cash credits through electronic payment tools to facilitate them and shorten time and effort as well as Low cost, and this cannot be achieved without concerted efforts and the provision of basic infrastructure that includes connecting the Internet to all targeted areas, whether cities or rural areas, as well as distributing the largest possible number of ATMs and sending specialized teams to those areas that develop in customers the culture of digital
... Show MoreAny software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show MoreIn this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.
Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreThe current study aimed to reveal the moral values available in the Arabic language textbook (Al-Mu’nes) for grades eleven and twelve for post-basic education in the Sultanate of Oman. The researcher adopted the descriptive approach using the sentence as measuring unit in the analysis process. The five fields of moral values and their subcategories values represented the categories of the analysis. Iterations of values and the percentages of iteration were calculated in those textbooks. Moreover and the analysis and stability of the process were confirmed.
After referring to previous studies, it was possible to de
... Show MoreIn this research work, a simulator with time-domain visualizers and configurable parameters using a continuous time simulation approach with Matlab R2019a is presented for modeling and investigating the performance of optical fiber and free-space quantum channels as a part of a generic quantum key distribution system simulator. The modeled optical fiber quantum channel is characterized with a maximum allowable distance of 150 km with 0.2 dB/km at =1550nm. While, at =900nm and =830nm the attenuation values are 2 dB/km and 3 dB/km respectively. The modeled free space quantum channel is characterized at 0.1 dB/km at =860 nm with maximum allowable distance of 150 km also. The simulator was investigated in terms of the execution of the BB84 p
... Show MoreFraud crimes, which is a form of crimes against the funds in public office, is one of the crimes of traditional and cutting-edge in the same time, but it took a distinct character from other traditional crimes because of what is based upon, behavioral fundamentals and foundations and expressive image of personal qualities, concentrated in the mental work, the inventive sophistication, and skillful abilities of the perpetrators of these crimes, in addition to what is owned by crooks today a behavioral ability represented in underestimating laws and instructions. Fraud is considered one of the organized crime methods It is the most important method of its methods, all crimes practiced by the cro
... Show More