The study aims to identify the reality of the use of educational technology in the teaching of mathematics from the point of view of mathematics teachers in Amman, where the researcher used the descriptive survey method. The sample included (67) female teachers working in public schools in Amman. In order to achieve the objectives of the study, the researcher used the questionnaire as a tool to collect data. The study concluded that many educational techniques are not available from the point of view of the study sample. Mathematics teachers also found that there are many obstacles that prevent the use of educational techniques in schools, most notably the lack of courses offered to teachers on the use of teaching techniques in teaching mathematics, the lack of the necessary techniques to teach mathematics, classrooms are not commensurate with the use of techniques. The results indicated that the significance level is greater than (0.05) in the two dimensions of the research tool, indicating that there are no statistically significant differences in the extent of employing teaching techniques in teaching mathematics. The study recommended the need to provide equipment and tools to activate the techniques of education in schools.
The current problem is summarized in what is called the development failing experience
in comprehencing the studying materials , so the students will feel worry of repeating failure
in he future , so he would seek blind keeping on heart for the studying material bond this isbad due to the forgetting in the future , one side of thesis research problem is that there is
many contradictory researches result in relation to the learning styles which impose the
nessicity to find results lessen this contradiction . the importance of the research is
summarized in the importance of the subject under the study , in that the researcher ( as in
her knowledge ) did not find a thesrs tackling the subject of the distinguished students
Abstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un
... Show MorePraise be to Allah, Lord of the Worlds and prayers to our master and our beloved Muhammad and to his God and companions.
The Sunnah of the prophet completed the prayer and delivery agreed to accept them as evidence of legislation, and the fundamentalists differed in accepting the news of Sundays in the pieces, and most likely if the hadeeth is proven, and completed the correct conditions there is no objection to accept it in branches and pieces. As for the work of the people of the city is one of the evidence adopted when the imam Malik, who is the Imam of the House of the Prophet's blessed immigration, and scientists differ greatly. If you offer a ruling and the ruling of the Hadith of the individual, and the rule of the work of the
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreEnvironmentally friendly copper oxide nanoparticles (CuO NPs) were prepared with a green synthesis route via Anchusa strigosa L. Flowers extract. These nanoparticles were further characterized by FTIR, XRD and SEM techniques. Removing of Gongo red from water was applied successfully by using synthesized CuO NPs which used as an adsorbent material. It was validated that the CuO NPs eliminate Congo red by means of adsorption, and the best efficiency of adsorption was gained at pH (3). The maximum adsorption capacity of CuO NPs for Congo red was observed at (35) mg/g. The equilibrium information for adsorption have been outfitted to the Langmuir, Freundlich, Temkin and Halsey adsorption isot
... Show MoreBackground: Adipose derived-mesenchymal stem cells have been used as an alternative to bone marrow cells in this study. Objective: We investigated the in vitro isolation, identification, and differentiation of stem cells into neuron cells, in order to produce neuron cells via cell culture, which would be useful in nerve injury treatment. Method: Mouse adipose mesenchymal stem cells were dissected from the abdominal subcutaneous region. Neural differentiation was induced using β-mercaptoethanol. This study included two different neural stage markers, i.e. nestin and neurofilament light-chain, to detect immature and mature neurons, respectively. Results: The immunocytochemistry results showed that the use of β-mercaptoethanol resulted in
... Show MoreThe research discusses the most important goals and means of IGAD in making peace in Sudan and then regional peace.
BACKGROUND: Acute coronary syndrome (ACS) is the clinical manifestation of acutely diminished coronary arterial blood supply. The rate of increase of intraventricular pressure during isovolumetric contraction (left ventricular dP/dt) represents the rate of change of pressure during ejection. OBJECTIVE: The aim of this study is to evaluate the usefulness of the rate of increase of intraventricular pressure during isovolumetric contraction (dP/dt) in assessment of left ventricular function in patients with acute coronary syndrome and its relation to certain clinical and echocardiographic features. PATIENTS AND METHODS: The study is a cross sectional study including 50 patients with an established diagnosis of acute coronary syndrome. The
... Show More