Preferred Language
Articles
/
jcolang-473
Evaluating the Proposed Curriculum of TEFL for First Intermediate Class Students in AL-Muthannah Governorate for the Second Semester/2007-2008
...Show More Authors

During the 1970s, communicative view of language teaching began to be incorporated into syllabus design. The central question for the proponents of this view was: what does the learner want/need to do with the target language? This lead to the emergence of a teaching method (or approach) called communicative language teaching (CLT) during the late 1970s and early 1980s focusing on the functions that must be incorporated into a classroom. According to Brown (2001:43) CLT is a unified but broadly based, theoretically well informed set of tenets about the nature of language and of language learning and teaching. Harmer (2001:84) states that the communicative approach is the name which was given to a set of beliefs which included not only a re-examination of what aspects of language to teach, but also a shift in emphasis in how to teach. The "what to teach" aspect of the CLT stressed the significance of language functions rather than
151
focusing solely on grammar and vocabulary. The "how to teach" aspect of the CLT is closely related to the idea that language learning will take care of itself, and that plentiful exposure to language in use and plenty of opportunities to use it are vitally important for a student's development of knowledge and skill.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 16 2019
Journal Name
Route Educational & Social Science Journal
Information awareness of students from Ibn Al-Haytham Education College of pure sciesnces and its influence on their analytical thinking skill
...Show More Authors

this research is to identify the level of information awareness of the chemistry students in their fourth year studying at Ibn Al-Haytham Education College of pure sciences at the University of Baghdad. The research sample consisted of (107) male and female students out of the total number of (153) students studying during the (2017-2018) academic year, The sample therefore represents 71% of the total students. The research methodology used consisted of two parts. The first part is concerned with measuring information awareness using a multiple choice type of test related to (40) issues. The students were required to select the between (5) alternative answers for each issue. The objectives of the test and the issues used are to measure the

... Show More
Publication Date
Mon Jul 01 2013
Journal Name
2013 35th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Protocol for site selection and movement assessment for the myoelectric control of a multi-functional upper-limb prosthesis
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Renzulli Model on Achievement and Holistic Thinking among Fifth Grade Students in the Holy Quran and Islamic Education
...Show More Authors

The present study aims at identifying the effect of Renzulli model on achievement and holistic thinking among the fifth grade students in the Holy Quran and Islamic Education. The experimental method with partial control was used, and the sample was chosen randomly. The sample consisted of (62) students distributed into experimental and control groups. 164 behavioral goals were formulated based on Bloom's first three levels taxonomy (knowledge and comprehension, application, analysis and installation, and evaluation). The researchers designed a post-test to measure the achievement of students in the subject of Holy Quran and Islamic Education which consisted of (40) objective items and a measure of holistic thinking which consisted of (3

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Wed Mar 23 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Image Compression Using Proposed Enhanced Run Length Encoding Algorithm
...Show More Authors

In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.

Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Satellite image classification using proposed singular value decomposition method
...Show More Authors

In this work, satellite images for Razaza Lake and the surrounding area
district in Karbala province are classified for years 1990,1999 and
2014 using two software programming (MATLAB 7.12 and ERDAS
imagine 2014). Proposed unsupervised and supervised method of
classification using MATLAB software have been used; these are
mean value and Singular Value Decomposition respectively. While
unsupervised (K-Means) and supervised (Maximum likelihood
Classifier) method are utilized using ERDAS imagine, in order to get
most accurate results and then compare these results of each method
and calculate the changes that taken place in years 1999 and 2014;
comparing with 1990. The results from classification indicated that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jul 22 2020
Journal Name
International Journal Of Research In Pharmaceutical Sciences
Cloud point extraction method for the sensitive determination of metoclopramide hydrochloride in pharmaceutical dosage forms
...Show More Authors

In this work, a simple and very sensitive cloud point extraction (CPE) process was developed for the determination of trace amount of metoclopramide hydrochloride (MTH) in pharmaceutical dosage forms. The method is based on the extraction of the azo-dye results from the coupling reaction of diazotized MTH with p-coumaric acid (p-CA) using nonionic surfactant (Triton X114). The extracted azo-dye in the surfactant rich phase was dissolved in ethanol and detected spectrophotometrically at λmax 480 nm. The reaction was studied using both batch and CPE methods (with and without extraction) and a simple comparison between the two methods was performed. The conditions that may be affected by the extraction process and the sensitivity of m

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Fatigue Characterization for Composite Materials used in Artificial Socket Prostheses with the Adding of Nanoparticles
...Show More Authors
Abstract<p>The prostheses sockets use normally composite materials which means that their applications may be related with the human body. Therefore, it was very necessary to improve the mechanical properties of these materials. The prosthetic sockets are subjected to varying stresses in gait cycle scenario which may cause a fatigue damage. Therefore, it is necessary or this work to modify the fatigue behavior of the materials used for manufacturing the prostheses sockets. In this work, different Nano particle materials are used to modify the mechanical properties of the composite materials, and increase the fatigue strength. By using an experimental technique, the effect of using different volu</p> ... Show More
View Publication
Scopus (41)
Crossref (37)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
A novel fusion-based approach for the classification of packets in wireless body area networks
...Show More Authors

This abstract focuses on the significance of wireless body area networks (WBANs) as a cutting-edge and self-governing technology, which has garnered substantial attention from researchers. The central challenge faced by WBANs revolves around upholding quality of service (QoS) within rapidly evolving sectors like healthcare. The intricate task of managing diverse traffic types with limited resources further compounds this challenge. Particularly in medical WBANs, the prioritization of vital data is crucial to ensure prompt delivery of critical information. Given the stringent requirements of these systems, any data loss or delays are untenable, necessitating the implementation of intelligent algorithms. These algorithms play a pivota

... Show More
View Publication
Scopus Crossref