Writing in English is one of the essential factors for successful EFL learning .Iraqi students at the preparatory schools encounter problems when using their background knowledge in handling subskills of writing(Burhan,2013:164).Therefore, this study aims to investigate the 4thyear preparatory school students’ problems in English composition writing, and find solutions to these problems through a suggested schematic language learning strategy training approach dealing with writing problems .The researcher made a survey at eight preparatory schools of AL-Risafa (1) General Directorate of Education :(316) from the scientific branch (159 males &157 females) and (284) from the literary branch (145 males &139 females), in Baghdad, during the second term of the academic year 2014-2015.In this regard, a suitable questionnaire is designed and exposed to a jury of specialists in ELT. The results indicate that the subjects of the study,i.e.preparatory school students are poor in English composition writing due to poor teaching methods, students’lack interest in vocabulary, grammar knowledge ,cultural knowledge, and schema .Then, the study advocates that writing problems can be reduced to a minimum if students are taught by using schema .With this orientation, this study suggests a schematic language learning strategy training that enables students to overcome their writing problems by developing their linguistic schema, formal schema and content schema .Conclusions, recommendations ,and suggestions are made.
Objective(s): The study aims at evaluating pregnancy-related health behaviors for pregnant women, and to identify the association between pregnancy-related health behaviors and their demographic characteristics of pregnant woman’s age, education, employment, residential area and monthly income.
Methodology: A descriptive study is carried out for the period from December 14th, 2020 to June 20th, 2021. This study was conducted through a non-probability (convenience) sample of 150 pregnant women attending, Abo Ghareeb primary health care sector in Abo Ghareeb spend. The sample has been collected by using the instrument to gather data and accomplish the study's objectives. A questionnaire is composed of (29) items and it is divided into
The weakness of the central rule at the reign of Shah Sultan Hussain who is regarded as the last Shah who governed the Safawi state near to its falling at the hold of Afghan in 1722 which is the main and the real factor for the economic collapse. The tribes of trade have faced stealing and robbery actions which have been compressed to a very big extent. This action was not the responsibility of Shah alone,
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreIn this work we present a technique to extract the heart contours from noisy echocardiograph images. Our technique is based on improving the image before applying contours detection to reduce heavy noise and get better image quality. To perform that, we combine many pre-processing techniques (filtering, morphological operations, and contrast adjustment) to avoid unclear edges and enhance low contrast of echocardiograph images, after implementing these techniques we can get legible detection for heart boundaries and valves movement by traditional edge detection methods.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show Moreنتيجة للتطورات الأخيرة في أبحاث الطرق السريعة بالإضافة إلى زيادة استخدام المركبات، كان هناك اهتمام كبير بنظام النقل الذكي الأكثر حداثة وفعالية ودقة (ITS) في مجال رؤية الكمبيوتر أو معالجة الصور الرقمية، يلعب تحديد كائنات معينة في صورة دورًا مهمًا في إنشاء صورة شاملة. هناك تحدٍ مرتبط بالتعرف على لوحة ترخيص السيارة (VLPR) بسبب الاختلاف في وجهة النظر، والتنسيقات المتعددة، وظروف الإضاءة غير الموحدة في وقت الحصول
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More