The birth of Multiple Intelligence (MI) theory has revolutionized traditional education since the twentieth century. Howard Gardner, the pioneer of this theory, believed that each learner has a unique way of acquiring information. This paper investigates how the New Headway Plus for Upper-Intermediate-Third Edition, a standard EFL textbook in Iraqi universities, can cater to the diverse MI profiles of Iraqi EFL learners. It evaluates the success or failure of senior undergraduates in actively engaging with different learning styles and activities in the classroom. The study maps the distribution of nine distinct modes of MI theory across all 12 Units_ Logic/Mathematical, Verbal/Linguistic, Musical, Bodily/Kinesthetic, Visual/Spatial, Naturalist, Intrapersonal, Interpersonal, and Existential Intelligences. The results reveal that the New Headway Upper-Intermediate EFL Textbook predominantly emphasizes Verbal/Linguistic Intelligence, followed by Logic/Mathematical, Visual/Spatial, and Intrapersonal, among other intelligences. Existential Intelligence is not addressed in the New Headway Plus for UpperIntermediate EFL Textbook. It underscores the need for teaching approaches that encompass all modes of MI. Educators are urged to bolster their learners' intellectual capabilities through comprehensive educational activities and student evaluation using school material.
The current research aims at extracting the standard characteristics of the emotional balance of the university students according to the response theory. This was accomplished by following accredited scientific steps, to achieve this goal, the researcher followed scientific steps in the procedures of the analysis of the scale. She translated the scale from English to Arabic and then made a reverse translation. it was presented to a committee of experts in English to ensure and verify the validity of the paragraphs logically and prove the face validity of the scale, which consists of (30) paragraphs, it was presented to (6) experts who are specialists in the educational and psychological sciences and in the light of their observations ha
... Show MoreIn order to improve the effectiveness, increase the life cycle, and avoid the blade structural failure of wind turbines, the blades need to be perfectly designed. Knowing the flow angle and the geometric characteristics of the blade is necessary to calculate the values of the induction factors (axial and tangential), which are the basis of the Blade Element Momentum theory (BEM). The aforementioned equations form an implicit and nonlinear system. Consequently, a straightforward iterative solution process can be used to solve this problem. A theoretical study of the aerodynamic performance of a horizontal-axis wind turbine blade was introduced using the BEM. The main objective of the current work is to examine the wind turbine blade’s perf
... Show MoreThis study deals with the subject of art criticism by using Erwin Panofsky's theory to analyze a few Saudi artists' works. The study aims to identify Panofsky's theory and provide criticism of some Saudi artworks using it. The importance of the study is that it enriches the field of art criticism in the Kingdom of Saudi Arabia and helps critics and artists in using Panofsky’s theory to analyze artworks.
The study sample consists of six artworks produced in 2021 by six contemporary Saudi artists. In the theoretical section, the study dealt with several topics; first, is art criticism, the second part presents Panofsky’s theory with its three stages, the final part deals with the beginning of Saudi art until present time and its
Objective: The aim of the present study is to assess the practices of nurses towards standard precautions at Azady
Teaching Hospital in the City of Kirkuk.
Methodology: A descriptive study, which uses the assessment approach and it was conducted on nurses from January
18th, 2009 to September 30th, 2009, using non-probability sampling a purposive sample of (37) subject (male and
female nurses) who worked at surgical wards in Azady Teaching Hospital in Kirkuk city was selected. Two study
instruments were utilized for proper data collection [questionnaire and observational checklist]; a questionnaire was
developed for the purpose of the study. It was comprised of two parts which included the nurses' demographic
characte
Background: Menstrual problems with all manifestations ranging from life-threatening bleeding to amen- orrhea are considered patterns of abnormal uterine bleeding (AUB), which is until now a popular reason for referral to the gynaecologic clinic and requires a special diagnostic tool. Objective: To assess the accuracy of hysteroscopy in diagnosing endometrial pathologies and to compare it with sonographic and histopathologic reports. Patients and Methods: A prospective study conducted in the Baghdad Teaching Hospital on 60 Iraqi females having varying complaints from abnormal uterine bleeding in pre- and post-menopausal women, infertility, and chronic pelvic pain with normal or abnormal ultrasound findings. Office hysteroscopy was done and
... Show MoreBackground; paraphilias were studied in the sex
clinic, at Al-Rashad teaching mental hospital, in the
years 2009-2010, a subject never touched before in the
field of psychiatry in Iraq.
Aims of the study :
1-to identify the prevalence of types and number of
paraphilias in those patients.
2-to study the relationship of paraphilias with
sociodemographic factors of the patients.
Patients and methods; using the diagnostic criteria of
DSM IV TR, 52 patients from the outpatient sex clinic
at Al-Rashad mental hospital, collected and studied (41
males and 11 females).
Results; the ratio of men to women was 3.7 : 1, the
majority of our sample was in the age range of 21-30
years (36.35%), with a limited
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the