Preferred Language
Articles
/
jcolang-294
Technical methods in foreign language teaching as a new method in foreign language learning
...Show More Authors

Unter dem Titel " Technische Methoden im Fremdsprachunterricht als eine neueste Methode im Fremdsprachlernen, die Spiele als Muster"

versteht man, dass die Forschung  sich mit einer neuen Methoden im Fremdsprachunterricht beschäftigt. Von den neuen Methoden im Unterricht sind die Spiele. So man sieht  in den letzten Jahren viele Artikel zum Thema Spiele im Fremdsprschunterricht. Davon gehen wir aus, dass die Spiele im Unterricht eine groβe Rolle spielt, denn diese Methode macht Lust, Spaβ im Lernenprozeβ. Die Spiele im Unterricht bezeichnen als ein Mittel, um Unterricht etwas Schönes , Nützliches und Lebendigs zu sein. Die Spiele sind vielfälltig und unterscheidet sich nach den Themen und Materialien. In dieser Forschung wird sich mit den Spielen im Grammatikunterricht beschäftigt. Vielleicht denkt man warum Grammatik! Die Antwort ist:

  • Im Fremdspracherwerb ist die Grammatik so wichtig.
  • Ohne richtige Grammatik kann man nicht gut und verständlich sprechen.
  • Die Regeln in einer Fremdsprache sind schwierig zu verstehen und zu verwenden
  • Am meisten erscheint der Grammatikunterricht als etwas Langweiligs
  • Abstract

        This research deals with one of  the new methods that are used in foreign language teaching which is "games". In the previous years, many articales and books concerning the use of games in the lectures were published that’s why ''games'' is chosen to be the research topic. The use of games in the lectures plays a crucial role in the teaching process as it mackes the lecture appear to be more enjoyable and beneficial. There are a large number of games that vary according to the lesson involved. This research deals with the use of games in grammer lectures specially when teaching the German language. One may ask, why grammer? It is chosen for the following reasons:

    1. Grammer is very important in foreign language learning.
    2. Without a proper grammer, one cannot speak in a good and understandable way.
    3. It is difficult to understand  and use the rules of grammer of any foreign language.
    4. Grammer lecture always appears to be very boring.

    Using games in the lectures makes the learning process easier because the students will be set into groups to talk, discuss and correct their mistaks by themselves in a comfortable way. In this method, the teaching process is not a teacher- center but the teacher'srole is only to guide and control what's going on in the classroom.

    This research is divided into three sections: section one presents an explanation of the foreign language lecture, learning a foreign language, grammer lecture and the use of games in teaching grammer.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The ISLAMIC Banks and its ability to exceed The world Finanical Crisis 2008 (Islamic Dubi Bank)
...Show More Authors

The Recent days witness an in creasing importanc of Islamic Banks which stems from the wide spread in Islamic and non-Islamic countries,Especially in USA and European countries.the consideration in Islamic Banks came after the financial crisis in 2008.Islamic Banks work with conventional banks in most countries,that is,the formers may face the same risks which face the latters,that represent the larger percent of the International Banking system.the problms that may affect Islamic Banks related to many causes,some related to the working in common economic environment.others related to the possibility of simulation to the method of investment and financing in conventional Banks,this mean,the work with principles not compling with

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
“The Strategic Partnership to Strategic Leadership of Upgrade Higher Education Quality (Global Perspective)”
...Show More Authors

The higher education has become an enterprise integrate system that described as knowledge society, the essential part in its electronic and virtual format in the shadow of globalization challenges with its various dimensions . Until the logical ryles aboat a strategic partnership between the Iraqi higher education establishments and their international equivalent ones Strategic windows should be invested for the purpose of enhancing the quality of higher education in a sustainable way. This forms a challenge before the international education leaders on the social, operational and establishment's level to determinte knowledge gap, observing, diagnosing and processing in the present and future, e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 11 2022
Journal Name
مجلة معارف للعلوم القانونية والاقتصادية
التصرفات القانونية الواردة على الجزء المفرز( الشقة ) في نظام الاسكان العمودي
...Show More Authors

الملخص ان حق الملكية هو الحق الاوسع نطاقا يمنح صاحبه صلاحية ممارسة السلطات كافة ويكون محل هذه السلطات كل ما يملك الشخص سواء كان شقه او طبقة اسوة بالعقارات الاخرى كدار للسكن او ارض ، ومن اهم هذه السلطات واوسعها نطاقا ( هو سلطة التصرف ). تعد هذه السلطة جوهر حق الملكية وأخطر السلطات الممنوحة للمالك كونه بواسطتها يمكنه الاستغناء عن ملكه بأي تصرف ناقل له كالبيع أو الهبة او الوصية مثلا ، ولأهمية هذه السلط

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Realizing the personality traits of Bisha University Employees during the Covid-19 pandemic
...Show More Authors

The post-Corona Covid-19 world is not the world before it, the problem of perception of personality traits with two axes: the characteristics of psychological and social compatibility, and the second aspect the mental disorder during the pandemic, and the accompanying precautions and prohibitions during the academic year 2020 AD. The aim of the research is to reveal the perception of the personal characteristics of Bisha University employees (students and faculty) during the Corona Covid-19 pandemic, and to reveal statistically significant differences in the perception of the personality traits of Bisha’s members during the Covid 19 according to the scientific qualification variables (female students -faculty members),  marital st

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 04 2017
Journal Name
Al-qadisiyah Journal For Administrative And Economic Sciences
Survival Function Estimating of Single age Groups for Generalized Gamma Distribution with Simulation.
...Show More Authors

The analysis of survival and reliability considered of topics and methods of vital statistics at the present time because of their importance in the various demographical, medical, industrial and engineering fields. This research focused generate random data for samples from the probability distribution Generalized Gamma: GG, known as: "Inverse Transformation" Method: ITM, which includes the distribution cycle integration function incomplete Gamma integration making it more difficult classical estimation so will be the need to illustration to the method of numerical approximation and then appreciation of the function of survival function. It was estimated survival function by simulation the way "Monte Carlo". The Entropy method used for the

... Show More
Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Comparison between Linear and Non-linear ANN Models for Predicting Water Quality Parameters at Tigris River
...Show More Authors

In this research, Artificial Neural Networks (ANNs) technique was applied in an attempt to predict the water levels and some of the water quality parameters at Tigris River in Wasit Government for five different sites. These predictions are useful in the planning, management, evaluation of the water resources in the area. Spatial data along a river system or area at different locations in a catchment area usually have missing measurements, hence an accurate prediction. model to fill these missing values is essential.
The selected sites for water quality data prediction were Sewera, Numania , Kut u/s, Kut d/s, Garaf observation sites. In these five sites models were built for prediction of the water level and water quality parameters.

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Study the Relationship between Beta Decay Stability of Nuclide and its Shape for Some even-even Isobars
...Show More Authors

The aim of this work is to learn the relationship of the stability of (β) emitter isobars with their shape for some isobaric elements with even mass number (A=152 - 162). To reach this goal firstly the most stable isobar have been determined by plotting mass parabola (plotting the binding energy (B.E) as a function of the atomic number (Z)) for each isobaric family. Then three-dimensional representation graphics for each nucleus in these isobaric families have been plotted to illustrate the deformation in the shape of a nucleus. These three-dimensional representation graphics prepared by calculating the values of semi-axis minor (a), major (b) and (c) ellipsoid axis’s. Our results show that the shape of nuclides which is represented the

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
المحددات الاقتصادية والاجتماعية للبطالة في السودان -دراسة قياسية باستخدام انحدار المركبات الرئيسة للمدة (1981-2015م)
...Show More Authors

Considering the magnitude of its economic, social and political impact, unemployment represents a crucial challenge confronting the majority of the countries of the world. The problem of the study was the high rates of unemployment in Sudan and the inability of economic growth rates to keep pace with the steady increases in unemployment rates during the study period. This study aimed to identify the economic and social variables influencing unemployment rate in Sudan, in addition to measuring the impact of these variables over the period (1981-2015). Data were collected from databases of the World Bank and Atlas of the World's data .The study hypothesized the presence of statistically significant and direct relationship between u

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref