The aim of the present research is to measure the degree of strategic effectiveness (fahs) in the development of grammar skills of high school students in the Kingdom of Saudi Arabia and to achieve the goal of the researcher the researcher used the semi-experimental approach; On ten arbitrators specializing in grammar, morphology, curricula and methods of teaching the Arabic language. After confirming the validity of the guideline, the researcher prepared an achievement test consisting of (22) paragraphs of the type of short answer and multiple choice. The researcher trained a teacher to apply the strategy to the experimental research sample using the (screening) component of (30) students, and the same parameter taught the control sample of (30) students using the units method prescribed in the textbook. The results showed that there were statistically significant differences at (0α0.05) level between the mean scores of the experimental and control group in the post application of the achievement test in favor of the experimental group. The effect size of the reading skill was (0.398) and (0.264) for the analysis skill. Therefore, the researcher recommends the training of Arabic language teachers in using the strategy (fahs) when teaching grammar rules and experimenting with them in teaching the rules of rhetoric and spelling as well as experimenting with teaching the laws of mathematics and physics courses in all stages of education.
This abstract focuses on the significance of wireless body area networks (WBANs) as a cutting-edge and self-governing technology, which has garnered substantial attention from researchers. The central challenge faced by WBANs revolves around upholding quality of service (QoS) within rapidly evolving sectors like healthcare. The intricate task of managing diverse traffic types with limited resources further compounds this challenge. Particularly in medical WBANs, the prioritization of vital data is crucial to ensure prompt delivery of critical information. Given the stringent requirements of these systems, any data loss or delays are untenable, necessitating the implementation of intelligent algorithms. These algorithms play a pivota
... Show MoreBACKGROUND: Polycystic ovary syndrome(PCOS) is one of the most common endocrine disorder affecting women in reproductive age. No single etiologic factor fully accounts for the spectrum of abnormalities in the polycystic ovary syndrome. Different changes in hormonal, metabolism and the inflammatory markers as squealy of PCOS with adverse effect on the women life. OBJECTIVE: To study the relationship between polycystic ovary syndrome and levels of C-reactive protein, human interleukin and hormonal and metabolic alteration in women with PCOS PATIENTS AND METHODS: Thirty women with Polycystic Ovary syndrome (PCOS) and other thirty women without PCOS were included. Venous blood samples were taken in early follicular phase of menstrual cycle [day
... Show MoreThis paper deals with the ideological positioning of the English poet John Donne in a selected poems of his i.e Holy Sonnet X, as regards the theme of death found therein. The researchers adopt an emerging branch of stylistics, called Critical Stylistics, as proposed by Jeffries (2010) in order to uncover the ideologies of the author regarding the topic concerned and how linguistic choices are used to slant ideas. The model is comprised of ten tools of analysis which, upon being applied to the selected data, have shown how the poet exploits language resources in order to pass his ideology and influence his readers. In this paper, the workings of only one tool are presented as applied to a certain portion of the data.
Various theories have been proposed since in last century to predict the first sighting of a new crescent moon. None of them uses the concept of machine and deep learning to process, interpret and simulate patterns hidden in databases. Many of these theories use interpolation and extrapolation techniques to identify sighting regions through such data. In this study, a pattern recognizer artificial neural network was trained to distinguish between visibility regions. Essential parameters of crescent moon sighting were collected from moon sight datasets and used to build an intelligent system of pattern recognition to predict the crescent sight conditions. The proposed ANN learned the datasets with an accuracy of more than 72% in comp
... Show MoreThe standard formulation of Wave Intensity Analysis (WIA) assumes that the flow velocity (U) in the conduit is <;<; the velocity of propagation of waves (c) in the system, and Mach number, M=U/c, is negligible. However, in the large conduit arteries, U is relatively high due to ventricular contraction and c is relatively low due to the large compliance; thus M is > 0, and may not be ignored. Therefore, the aim of this study is to identify experimentally the relationship between M and the reflection coefficient in vitro. Combinations of flexible tubes, of 2 m in length with isotropic and uniform circular cross sectional area along their longitudinal axes, were used to present mother and daughter tubes to produce a range of reflection coeffic
... Show MoreI've led an end to the Palestinian presence in the Jordan to the occurrence of a major fault line in relations between Jordan and the Palestinian on the levels of all , and as a result sought King Hussein and the initiative of the U.S. to heal the rift that solution between Jordanians , Palestinians, and the regulation of relations between the two parties announced in March 1972 for the project and unitary featuring Jordan and Palestine in the Arab kingdom united with the two countries , but that the Palestine Liberation Organization and the Palestinian resistance factions rejected by asserting that it is has the right of self-determination of the Palestinian people and no one else , and rejected by the Arab states and ( Israel ) , and l
... Show MoreThis paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).
In this paper, a new form of 2D-plane curves is produced and graphically studied. The name of my daughter "Noor" has been given to this curve; therefore, Noor term describes this curve whenever it is used in this paper. This curve is a form of these opened curves as it extends in the infinity along both sides from the origin point. The curve is designed by a circle/ ellipse which are drawing curvatures that tangent at the origin point, where its circumference is passed through the (0,2a). By sharing two vertical lined points of both the circle diameter and the major axis of the ellipse, the parametric equation is derived. In this paper, a set of various cases of Noor curve are graphically studied by two curvature cases;
... Show More