Preferred Language
Articles
/
jcolang-291
Moderne Lehrmethodenzum Hörverstehen im Deutschunterricht Schlüsselwort: Lehrmethode-Hörverstehen-Deutschunterricht Modern methods for teaching listening comprehension in German language
...Show More Authors

Diese Forschungsarbeit versteht sich als ein Versuch zur Bestimmung einer der neuen Unterrichtsmethoden, die den Lernenden im Fach Deutsch besonders interessant vorkommen.Der Unterricht soll in einer Atmosphäre, die frei von Zeitdruck, Angst und Zensurdruck ablaufen lassen, damit werden die Studenten ermutigt, die Nutzung von Spiel zu ihrer eigenen Sache machen, um die Spielziele Spaß, Empathie, Zusammenarbeit und Kommunikation zu realisieren. Das Hauptlernziel des Fremdsprachenunterrichts ist es, Lernenden zu ermöglichen, in der Zielsprache zu kommunizieren.

Wir konzentrieren uns in diesem Beitrag auf eine wichtige sprachliche Fertigkeit, die den rezeptiven Fertigkeiten gehört, die ist das Hörverstehen.

Das Hörverstehen spielt eine zentrale Rolle bei der Erwerbung der Sprachkenntnisse für den Lernenden einer Fremdsprache.

Der Lernende kann die einzelnen Informationen aus den täglichen Kommunikationskontexten (Kurzgeschichte, Radioberichte, Dialoge) hörend verstehen, wenn diese Informationen langsam, deutlich gesprochen und in einfacher Sprache explizit präsentiert werden. Durch das Hören als rezeptive Fertigkeit werden das Verstehen,Interpretieren und Reflektieren von sprachlichen Feststellungen integriert.

Abstract:

    This research work is an attempt to determine one of the new teaching methods, which is particularly interesting for learners of German. Teaching should be conducted in an atmosphere free from time pressure, anxiety and stress of the test, thus encouraging the students to make use of games to their own cause to achieve communication. The main goal of foreign language teaching is to enable learners to communicate in the target language.

There are four main skills in the acquisition of the foreign language: reading, writing, listening and speaking. These skills are not isolated in communication, they are interrelated. According to communicative principles, the four skills are classified as receptive (information collection) and productive (information transfer). Listening and reading belong to the receptive skills, which means the learner is receives information when he listens and reading, while speaking and writing are structured as productive skills, that is, the learner becomes productive when he talks and writes.

There are three levels of comprehension in learning foreign language: selective, detailed and comprehensive comprehension.

One of the important results drawn in this study is that applying different language games in German language teaching is attractive to students. Excitement motivates students to develop their language skills. Games are also useful for foreign language teachers in the pursuit of their career in the field of education through active use of language.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 29 2024
Journal Name
Current Drug Therapy
Current Nanotechnological Strategies for Delivery of Anti-Retroviral Drugs: Overview and Future Prospects
...Show More Authors
Abstract:

Globally, over forty million people are living with Human Immunodeficiency Viral (HIV) infections. Highly Active Antiretroviral Therapy (HAART) consists of two or three Antiretroviral (ARV) drugs and has been used for more than a decade to prolong the life of AIDS-diagnosed patients. The persistent use of HAART is essential for effectively suppressing HIV replication. Frequent use of multiple medications at relatively high dosages is a major reason for patient noncompliance and an obstacle to achieving efficient pharmacological treatment. Despite strict compliance with the HAART regimen, the eradication of HIV from the host remains unattainable. Anatomical and Intracellular viral reservo

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Sep 04 2017
Journal Name
International Journal Of Environmental Science And Technology
A review of permeable reactive barrier as passive sustainable technology for groundwater remediation
...Show More Authors

Scopus (151)
Crossref (142)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Controlled Release
Surface engineering tumor cells with adjuvant-loaded particles for use as cancer vaccines
...Show More Authors

View Publication
Scopus (33)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Sat Oct 18 2025
Journal Name
Pattern Recognition And Artificial Intelligence
Utilizing Energy-Efficient Deep Learning Technique for Age Estimation Through a Hybrid Methodology
...Show More Authors

This study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduce

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Developing an Automated Vision System for Maintaing Social Distancing to Cure the Pandemic
...Show More Authors

The world is currently facing a medical crisis. The epidemic has affected millions of people around the world since its appearance. This situation needs an urgent solution. Most countries have used different solutions to stop the spread of the epidemic. The World Health Organization has imposed some rules that people should adhere. The rules are such, wearing masks, quarantining infected people and social distancing. Social distancing is one of the most important solutions that have given good results to confront the emerging virus. Several systems have been developed that use artificial intelligence and deep learning to track social distancing. In this study, a system based on deep learning has been proposed. The system includes monitor

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
An efficient of Sansevieriatrifasciataplantas biosorbent for the treatment of metal contaminated industrial effluents
...Show More Authors

Sansevieriatrifasciata was studied as a potential biosorbent for chromium, copper and nickel removal in batch process from electroplating and tannery effluents. Different parameters influencing the biosorption process such as pH, contact time, and amount of biosorbent were optimized while using the 80 mm sized particles of the biosorbent. As high as 91.3 % Ni and 92.7 % Cu were removed at pH of 6 and 4.5 respectively, while optimum Cr removal of 91.34 % from electroplating and 94.6 % from tannery effluents was found at pH 6.0 and 4.0 respectively. Pseudo second order model was found to best fit the kinetic data for all the metals as evidenced by their greater R2 values. FTIR characterization of biosorbent revealed the presence of carboxyl a

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Accurate Four-Step Hybrid Block Method for Solving Higher-Order Initial Value Problems
...Show More Authors

This paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Aug 01 2008
Journal Name
2008 International Symposium On Information Technology
Algebraic strategy to generate pairwise test set for prime number parameters and variables
...Show More Authors

View Publication
Scopus (21)
Crossref (17)
Scopus Crossref
Publication Date
Tue Aug 06 2013
Journal Name
Robotica
Function approximation technique-based adaptive virtual decomposition control for a serial-chain manipulator
...Show More Authors
SUMMARY<p>The virtual decomposition control (VDC) is an efficient tool suitable to deal with the full-dynamics-based control problem of complex robots. However, the regressor-based adaptive control used by VDC to control every subsystem and to estimate the unknown parameters demands specific knowledge about the system physics. Therefore, in this paper, we focus on reorganizing the equation of the VDC for a serial chain manipulator using the adaptive function approximation technique (FAT) without needing specific system physics. The dynamic matrices of the dynamic equation of every subsystem (e.g. link and joint) are approximated by orthogonal functions due to the minimum approximation errors produced. The contr</p> ... Show More
View Publication
Scopus (27)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref