The present study deals with the effect of teaching speaking Strategies (SS) on
EFL Iraqi College students. The use of speaking strategies not only solves learners’
communication problems, but also enhances the learner’s interaction in target language,
and improves their oral proficiency .The aim of the study is to find out the effect of
teaching SS used by EFL College students .The learner of the first stage is population of
the study at the Department of English, College of Education /Ibn-Rushd .The sample
consists of (60) students distributed on experimental group(A) as well as control
group(B) each group contains (30) students . In order to achieve the aim of the study,
questionnaire has been constructed to be taught on the experimental group and a test.
The questionnaire and the test have covered reduction strategies, achievement strategies,
modified- interaction strategies and social-interaction strategies (table 1).The face validity
of the test is proved by exposing it to a jury of specialists. For reliability, Alpha
Cronbach reliability coefficient has been used. The results indicate that the SS strategies
are useful in improving the students' conversation. Accordingly, recommendation and
suggestions for further studies are put forward.
This work includes preparation of Az, Qz, and Tz derivatives from the reaction of Schiff base (Sb) derivative with anthranilic acid, chloroacetyl chloride, and sodium azide, as well as, the characterization via FT-IR, 1H-NMR, and 13CNMR. The anticorrosion inhibition of these compounds was studied and the measurements of carbon steel (CS) corrosion in sodium chloride solution 3.5% (blank) and inhibitor in solutions were calculated at a temperature range of 293-323 K by the technique of electrochemical polarization. In addition, some thermodynamic and kinetic activation parameters for inhibitor and blank solutions (Ea⋇, ΔH⋇, ΔS⋇, and ΔG⋇) were determined. The results showed high inhibition efficacy for all the prepared compounds,
... Show MoreTungsten inert gas arc welding–based shaped metal deposition is a novel additive manufacturing technology which can be used for fabricating solid dense parts by melting a cold wire on a substrate in a layer-by-layer manner via continuous DC arc heat. The shaped metal deposition method would be an alternative way to traditional manufacturing methods, especially for complex featured and large-scale solid parts manufacturing, and it is particularly used for aerospace structural components, manufacturing, and repairing of die/molds and middle-sized dense parts. This article presents the designing, constructing, and controlling of an additive manufacturing system using tungsten inert gas plus wire–based shaped metal deposition metho
... Show MoreThe electrical resistivity method is one of the geophysical methods for detecting weak subsurface zone. The 2D resistivity data were used to compare three electrode configurations, Wenner, Dipole-dipole, and Schlumberger, to detect weak subsurface zones along a profile south of Baghdad near the Bismayah pumping station. The results show many zones of low resistivity that may be weak zones. A dipole-dipole array is a large number of measurements and is more sensitive than others. The Wenner-Schlumberger array has a depth also higher than other arrays. Wenner array has higher signal strength than other arrays. Because it is more sensitive to horizontal and vertical structures, the dipole-dipole array is the optimum for mapping sub
... Show MoreIn this work, thiadiazole derivatives were prepared by taking advantage of active sites in (2-amino-5-mercapto-1, 3, 4-thiadiazole) as a starting material base. The main heterocyclic compounds (1, 3, 4-thiadiazole, oxazole) etc, 2-amino-5-mercapto-1,3,4-thiadiazole compound (1) was prepared by cyclic closure of thiosemicarbazide compound with anhydrous sodium carbonate and carbon disulfide. Oxidation of (1) via hydrogen peroxide, to have (2) which was treated with chloro acetyl chloride to get (3). Preparation of thiazole ring (4) was from reacting of (3) with thiourea. Synthesis of diazonium salts (5) from compound (4) using sodium nitrite and HCl. Compound (5) reacted with different ester compounds to prepare a new azo compounds (6–8).C
... Show MoreA series of new 4-(((4-(5-(Aryl)-1,3,4-oxadiazol-2-yl)benzyl)oxy)methyl)-2,6-dimethoxy phenol (6a-i) were synthesized from cyclization of 4-(((4-hydroxy-3,5-dimethoxy benzyl)oxy)methyl)benzohydrazide with substituted carboxylic acid in the presences of phosphorusoxy chloride.The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays were used to screen their antioxidant properties. Compounds 6i and 6h exhibited significant antioxidant ability in both assay. Furthermore, type of substituent and their position of the aryl attached 1,3,4-oxadiazole ring at position five are play an important roles in enhancing or declining the antio
... Show MoreThe effects of T-shaped fins on the improvement of phase change materials (PCM) melting are numerically investigated in vertical triple-tube storage containment. The PCM is held in the middle pipe of a triple-pipe heat exchanger while the heat transfer fluid flows through the internal and external pipes. The dimension effects of the T-shaped fins on the melting process of the PCM are investigated to determine the optimum case. Results indicate that while using T-shaped fins improves the melting performance of the PCM, the improvement potential is mainly governed by the fin’s body rather than the head. Hence, the proposed T-shaped fin did not noticeably improve melting at the bottom of the PCM domain; additionally, a flat fin is ad
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreSynthesis and preliminary biological evaluation of imidazo (2, 1-b) Thiazole derivatives is reported. Under Mannich conditions, a series of new imidazo (2, 1-b) Thiazole derivatives were synthesized. Starting from the reaction of 2- amino thiazole with 4- bromo phenyl bromide to produce 5-(4-bromo phenyl) imidazo (2, 1-b) thiazoles, following by introduce the substituted aminomethyl at position 6-by reacting with different aromatic amines under Mannich conditions to afford 6-secondary amine-5-(4-bromo phenyl) imidazo (2,1-b) thiazole in high yields.
FT-IR, 1H NMR, and 13C NMR techniques were used to characterize the synthesized derivatives. In addition, all compounds were tested for their antioxidant activity, and thr
... Show More