حم س امصمشث ةلال ع ي امتع يس ه امك يه امت صحيه ام أتحشه إ وههم ص هض امصه حصمت امته يحايىهم امط صه ه ت كيهعوت لآ ا ئىهت ام سهتق حت سيةىم حص حصمت إصعا الأشكمت شحل ام حضحعمت حام شكلات امته ) يحايىحهىهههههم
The moral aspect is an important one in the structure of personality , and the lack of moral aspect is responsible for what we suffering today from problems . there is no exaggeration to say that many of our current problems are moral problems , and reflects the lack of moral growth.
The goal of research is to build scale in order to detect the level of moral reasoning among junior high school students in Baghdad , The researcher followed the procedures in the construction of scientific standards in order to measur
... Show MoreAbstract
The aim of this research is to determine how well the Cubing Technique affects the Iraqi EFL students' composition writing, vocabulary, and meta-cognitive awareness of writing strategies. The sample of (64) secondary-school female students in the fifth grade is drawn from two classrooms and split into two equal groups: the experimental group and the control group, each of which consists of (32) students. A quasi-experimental design is applied. The performance test and Meta-cognitive Writing Strategies questionnaire are given as a pre-test for equalizing the two groups after ensuring their validity and reliability. Then, they are administrated as a posttest in both groups. According to the results, the si
... Show MoreNowadays, university education stands in front of both students who feel they are weak and teachers who are addicted to using traditional and dependent teaching. This has led to have negative repercussions on the learner from different aspects, including the mental aspect and the academic achievement process. Therefore, the present research is concerned with finding a new teaching method that adopts the motivation by the fear of failure technique. Thus, the study aims to examine the effect of adopting this method on students’ academic achievement. To achieve this aim, an experimental method was used, and an achievement test was built for the curriculum material of level two students. The pretest test was applied on 17 male and female s
... Show MoreAbstract
This study aims at investigating the relationship between mindfulness and academic self-efficacy among Northern Border University students. To achieve this objective, the researcher adopted the correlative survey method for (97) students. For data collection, the researcher developed a mindfulness scale consisting of (42) items divided into seven topics, each one consisting of six items. The researcher developed an academic self-efficacy scale consisting of (20) items, adopting a five-point Likert scale. The results showed that there is a high level of mindfulness among students at the level of the seven units which formed the mindfulness scale; the conscious thinking unit showed the highest mean value o
... Show Moreكان لسياسات االحتالل دور بارز في فشل مشروع إعادة بناء الدولة في افغانستان، وفي الوقت نفسه تتحمل دول االحتالل المسؤ و لية الكاملة عن بعض هذه ً كبي ارً السياسات مثل عدم التخطيط الجيد لمرحلة االحتالل وإعادة بناء الدول ة، ثم إن جزءا من فشل هذه السياسات يرجع الى البيئتين المحلية واإلقليمية ، كذلك كان للخبرة السياسية والدستورية وللواقع االجتماعي الثقافي األفغاني تأثيرهما المهم في قدرة المجتمع األفغاني ً على قبول
... Show MoreThe words in the Holy Qur’an are distinguished by the
accuracy of expression, their elegance, the lightness of their
performance, the harmony of their timbre, as well as the ease of
their pronunciation. We find the coarse words in which the
movement of sounds and the hesitation of the soul are mixed, as
it was distinguished by the abundance of its words indicating the
same meaning without a phenomenon that the reader or the
listener notices
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreMany studies have been made and still concerning the field of translation. Since the mid-90's a considerable amount of researches has tackled the problem of gender and its effect on the process and the product of translation. Simon (1996, p 508) points out that when comparing women and men as translators and writers through history, women seem to be the weaker side. This paves the way to feminist movements which produce prominent studies concerning gender as a concept and translator's gender as practice on the quality and the accuracy of the translation.
Flotow (in Meschia, 2012, p 1-4) outlines several issues that can be
... Show MoreThis study analyzes how to make use of the resources in the marshlands of Iraq and how to utilize them, especially after the water returns to these areas and they are revitalized. We take an example of AL- Saheen Marsh and plan an ideal tourist resort there. This example can further expand to include other parts of the marshlands. The resort will utilize the local environment and tourist characteristics as it will have a feel and architectural resemblance to the houses and buildings that are currently built there. In addition the transportation methods will be the same as those used by the locals. Yet the resort will still posses all the facilities required by a modern tourist resort that includes all the services that will make
... Show More