Communication represents the essence of language learning. Since the unspecified evolution of conveying information, human beings have been employing the main constituents of language with short pauses. Although the punctuation marks necessitate short expressions among thought group of words in writing, human language demand for understanding how and when to pause orally. This paper presents the pause technique in the classroom. It signifies the relation between pausing and lecturing in the class and determines its sufficient time-management to interact with college learners of different specializations. The conduct study reviewed teaching pause technique in the empirical studies at Special Education and Communication Disorders of Pennsylvania State University; Government Medical College, Amritsar, India; and Financial Accounting class at the University of Bangladesh, India. The chronological period of the studies ranged between 1987 and 2014. The reason behind collecting data is to maintain its power to the teacher in managing the classroom and to the students for academic and professional attainments. The intersection point has lain in the positive effect of pause technique in students' performance and teachers' management. The sample distribution of the experimental groups' means reported with extreme advancement of teachers and students in managing pausing. The study findings support implementing short and long pauses for successful classroom management. Reasonable period intervals are included from the prospect of mental realization. It is difficult to compare the diverse results statistically due to the absence of individual rates of assessments. The study recommended that teachers for effective learning classroom need to implement at least more than three pauses in one-hour lecture.
To track scientific developments and achievements, for example, that (achieved) after the Second World War until this moment, make each of us in absolute amazement. He invented the computer, discovered the genetic factor (DNA), and discovered the drawing of the human genetic map, going up to the moon, penetrating outer space by satellites, getting close to distant planets, producing jet planes, microprocessors, and lasers, in addition to enabling a person to create a layer of The material is extremely thin and extremely imaginative. It has also become possible for a person to "dig lines that do not exceed 20 billion meters of thickness." The human being was also able to collect things an atom and build an efficient and high-precision con
... Show MoreClothes are considered a means of aesthetic and artistic expression that help to hide the flaws of the body and highlight its merits , it has importance in people's lives as it reflects the individual's idea of himself and his personality. Whereas the appreciation in clothing is a reflection of a person's sense of artistic components and the application of this sense to the clothes of his choice. Regarding the differences in clothing tastes by the university students according to the following variables (gender, specialization, stage of study, age, monthly income), the current research is considered quantitative descriptive research that is concerned with studying a phenomenon that exists in reality, measuring it
... Show MoreAbstract
This study aims to identify the empathy of University Students, as well as the significant differences in sympathy in terms of gender and specialization. To achieve the aims of the study, a scale of empathy was administered to a sample of (450) students collected randomly from Baghdad university. The results showed that the study sample has a level of empathy. There is a significant difference between males and females in empathy, in favor of the female students. There is no significant difference in empathy in terms of specialization (scientific, humanities), and the interaction between males and females. The study came out with a number of recommendations and suggestions.
Four samples of the Se55S20Sb15Sn10 alloy were prepared using the melting point method. Samples B, C and D were irradiated with (6.04×1010, 12.08×1010 and 18.12×1010 (n.cm-2s -1 ) of thermal neutron beam from a neutron source (241Am-9Be) respectively, while sample A was left not irradiated. The electrical properties were assessed both before and after the radiation. All irradiated and non-irradiated samples show three conduction mechanisms, at low temperatures, electrical conductivity is achieved by electron hopping between local states near the Fermi level. At intermediate temperatures, conduction occurs by the jumping of electrons between local states at band tails. At high temperatures, electrons transfer between extended stat
... Show MoreBackground: The association between facial types and dental arches forms has considerable implications in orthodontic diagnosis and treatment planning. The aim was to establish the maxillary and mandibular dental arches width and length in skeletal and dental class II division 1 and class III malocclusion groups, find out the most frequent dental arch form and facial type and the association between them and to check the gender differences. Materials and Methods: Frontal and lateral facial photographs and maxillary and mandibular occlussal photographs for 90 iraqi subjects with age 18-25 years old (45 males and 45 females) divided equally into three groups, the 1st group with class II division 1malocclusion (overjet more than 3mm but less t
... Show MoreABSTRACT
Herbs and spices have long been used to support various food products, including dairy products because of their flavoring, taste, texture and general appearance as well as therapeutic properties such as antioxidant activities, infections, microbes, anti-diabetes and hypertension. Therefore, this study aimed to demonstrate the effect of adding ginger, cinnamon, lycopene extract and olive oil on the physiochemical properties, the quality of the soft cheese produced and the extent of its acceptance by the Iraqi consumer, who prefers this product in abundance to other types of cheese. So, this study was prepared
... Show MoreBackground: This review aims to discuss various canine retraction techniques using frictionless mechanics. Methods: Between 1930 and February 2022, searches were conducted about various canine retraction techniques using fixed orthodontic appliances in various databases, including PubMed Central, Science Direct, Wiley Online Library, the Cochrane Library, Textbooks, Google Scholar, Research Gate, and manual searching. Results: After removing the duplicate articles, publications that described how to use archwires to perform canine retraction with the archwires were included. Conclusions: The pros and cons of various canine retraction techniques using archwires were thoroughly discussed. T-loop is the preferred spring of all because of it
... Show MoreBackground: This review aimed at explaining different methods of canine retraction along the archwire. Methods: Searching for different methods of canine retraction using fixed orthodontic appliances was carried out using different databases, including PubMed Central, Science Direct, Wiley Online Library, the Cochrane Library, Textbooks, Google Scholar, Research Gate, and hand searching from 1930 till February 2022. Results: After excluding the duplicate articles, papers describing the methods of canine retraction along the archwires were included. The most commonly used methods are NiTi closed coil spring and elastic chain. Conclusions: Various methods of canine retraction along the archwires were explained in detail regarding their adv
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show More