The weak and strong forms are so called because it is not their lexical content that primary matter, but the role they have in the sentence. The problematic confusion, our students encounter, in recognizing and producing the correct pronunciation of weak and strong forms of the English function words is the main incentive behind conducting this study. In order to gather the data, this paper used two types of tests: a recognition test and a production test. The general results reached through the analysis of the students' answers seem to conform to the researcher's assumption: students face a critical problem in recognizing and producing correct pronunciation of the weak and strong forms of the English function words.
The study aimed to evaluate educational programs efficiency in applying the best educational practices to educate students from the dangers of indecent behaviors, in line with higher education policy and the appropriateness of educational program dimensions to spread awareness among students to not fall into the indecent behaviors clutches. The study adopted the inductive exploratory approach through structural equation modeling and the descriptive analysis of the collected data from randomly selected sample (n=385) from educational academics at Northern Border University in the Saudi Arabia using a specially designed survey tool to meet study purposes to evaluate dimensions of teaching methods, evaluation tools, training courses, course
... Show Moreتهدف هذه الدراسة إلى معرفة الفرق في التحصيل الدراسي في الكيمياء والاتجاه نحو العلوم بين طلاب التخصص العلمي وطلاب التخصص الصناعي الصف الأول كلية التربية ابن الهيثم، كذلك تهدف الدراسة إلى معرفة العلاقة بين التحصيل الدراسي في الكيمياء ودرجات اختبار نهاية الفصل في الكيمياء، والمعدل التراكمي بعد أخذ المقرر الدراسي والاتجاه نحو العلوم بالنسبة لطلاب التخصص العلمي وطلاب التخصص الصناعي.
لقد است
... Show MoreThis research includes an analytical and critique study for the version of the University Service Law No.23 for the year 2008, containing all its aspects and failure whether in its legislation or its applications.
This study aimed at identifying how children express the emerging coronavirus in general and according to their age groups (4-13 years) by analyzing 91 of their drawings published online, using the descriptive content analytical approach. The results showed that children's artistic expression of the virus came according to the concepts and ideas they carried about the virus for the age groups of (4-7 years) and (7-9 years), while it came according to visual perception for age groups (9-11 years), and from (11-13) years. Also, most children were aware about the presence of the virus and its widespread around the world, but (99%) of them do not realize the seriousness of the virus. It was confirmed that between (25-34%) of children were su
... Show MoreThe facilities layout are among the most important of the most influential factors in the efficiency of the production system, and represents the systematic layout of the various work centers, tools, persons, and other auxiliary services within the factory. Careful selection of the technique that would be used in Re-layout, represents an important step in reaching to the optimum layout that keeps on reducing handling costs and reduce unnecessary movement of materials, as well as the regularity and functioning of the flow of materials through the facilities. The research aims to propose a new layout of (Al-M'ammon Factory / The General Company for Vegetable Oils Industry), and then re-layout according to the new propose layout by using of te
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show More