Writing in English is one of the essential factors for successful EFL learning .Iraqi students at the preparatory schools encounter problems when using their background knowledge in handling subskills of writing(Burhan,2013:164).Therefore, this study aims to investigate the 4thyear preparatory school students’ problems in English composition writing, and find solutions to these problems through a suggested schematic language learning strategy training approach dealing with writing problems .The researcher made a survey at eight preparatory schools of AL-Risafa (1) General Directorate of Education :(316) from the scientific branch (159 males &157 females) and (284) from the literary branch (145 males &139 females), in Baghdad, during the second term of the academic year 2014-2015.In this regard, a suitable questionnaire is designed and exposed to a jury of specialists in ELT. The results indicate that the subjects of the study,i.e.preparatory school students are poor in English composition writing due to poor teaching methods, students’lack interest in vocabulary, grammar knowledge ,cultural knowledge, and schema .Then, the study advocates that writing problems can be reduced to a minimum if students are taught by using schema .With this orientation, this study suggests a schematic language learning strategy training that enables students to overcome their writing problems by developing their linguistic schema, formal schema and content schema .Conclusions, recommendations ,and suggestions are made.
In this paper, a method based on modified adomian decomposition method for solving Seventh order integro-differential equations (MADM). The distinctive feature of the method is that it can be used to find the analytic solution without transformation of boundary value problems. To test the efficiency of the method presented two examples are solved by proposed method.
In this paper we shall generalize fifth explicit Runge-Kutta Feldberg(ERKF(5)) and Continuous explicit Runge-Kutta (CERK) method using shooting method to solve second order boundary value problem which can be reduced to order one.These methods we shall call them as shooting Continuous Explicit Runge-Kutta method, the results are computed using matlab program.
In this paper, we have been used the Hermite interpolation method to solve second order regular boundary value problems for singular ordinary differential equations. The suggest method applied after divided the domain into many subdomains then used Hermite interpolation on each subdomain, the solution of the equation is equal to summation of the solution in each subdomain. Finally, we gave many examples to illustrate the suggested method and its efficiency.
In this work, we calculate and analyze the photon emission from quark and anti-quark interaction during annihilation process using simple model depending on phenomenology of quantum chromodynamic theory (QCD). The parameters, which include the running strength coupling, temperature of the system and the critical temperature, carry information regarding photon emission and have a significant impact on the photons yield. The emission of photon from strange interaction with anti-strange is large sensitive to decreases or increases there running strength coupling. The photons emission increases with decreases running strength coupling and vice versa. We introduce the influence of critical temperature on the photon emission rate in o
... Show MoreA theoretical calculations of the rate constant of electron transfer (ET) in a dye – semiconductor system with variety solvent are applied on system contains safranineT dye with TiO2 in many solvents like water, 1-propanol, Formamide, Acetonitrile and Ethanol.
A matlap program has been written to evaluate many parameters such that, the solvent reorganization energy, effective free energy, activation free energy, coupling matrix element and the rate constant of electron transfer.
The results of the rate constant of electron transfer calculated theoretically are in a good agreement with experimental and theoretical value
... Show MoreIt is widely accepted that early diagnosis of Alzheimer's disease (AD) makes it possible for patients to gain access to appropriate health care services and would facilitate the development of new therapies. AD starts many years before its clinical manifestations and a biomarker that provides a measure of changes in the brain in this period would be useful for early diagnosis of AD. Given the rapid increase in the number of older people suffering from AD, there is a need for an accurate, low-cost and easy to use biomarkers that could be used to detect AD in its early stages. Potentially, the electroencephalogram (EEG) can play a vital role in this but at present, no reliable EEG biomarker exists for early diagnosis of AD. The gradual s
... Show MoreThis research is based on the idea of showing the extent to which the public relies on satellite channels as sources for news of the demonstrations in Iraq .This was the essence of the problem for which the researcher set several goals, including knowing the public’s confidence in the news of these satellite channels and comparing them with others. The researcher chose an available intended sample of (117) respondents in Baghdad - Karkh and Rusafa by adopting the survey method and applying a questionnaire form and the theory of media dependence for the period from 15/11/2019 to 1/1/2021 . By using statistical methods, the researcher reached many results, the most important of which are: Satellite channels are a source for 79% of the pu
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreIn this research a theoretical study has been carried out on the behavior and strength of simply supported composite beams strengthened by steel cover plate taking into consideration partial interaction of shear connectors and nonlinear behavior of the materials and shear connectors. Following the procedure that already has been adopted by Johnson (1975), the basic differential equations of equilibrium and compatibility were reduced to single differential equation in terms of interface slip between concrete slab and steel beam. Furthermore, in order to consider the nonlinear behavior of steel, concrete and shear connectors, the basic equation was rearranged so that all terms related to materials are isol
... Show More