This research is qualitative in nature. It aims to investigate descriptively, analytically, and comparatively the modern AK model represented by the Sudan Open University Series, and the European framework, the common reference for Teaching Foreign Languages, to uncover what was achieved in them in terms of communication and language use. Accordingly, an integrated, multi-media approach has been adopted to enable the production and reception activities, and the spread of Arabic in vast areas of the world. Such a spread helps Arabic language to be in a hegemonic position with the other living languages. The study is based on getting benefit from human experiences and joint work in the field of teaching Arabic to non-Arabic speakers to meet the needs of learners. Such knowledge helps to overcome the pragmatic dimension dilemmas, and the duality between formal and colloquial, leading as a result to have a global recognition of its outputs. The study revealed the importance of building the communication and pragmatic capabilities of language learners since they both represent the life and vitality of language. It further necessitates rebuilding curricula and updating them in a way that makes communication and the use of language a reality. The research recommended eliminating any difficulties that face the Arabic language learner from the non-speakers, by making use of what was provided by the Common European Framework of Reference for Teaching Foreign Languages.
In individuals with type 2 diabetes mellitus (T2DM), the cannabinoid receptor 1 (CNR1) gene polymorphism has been linked to diabetic nephropathy (DN). Different renal disorders, including DN, have been found to alter cannabinoid (CB) receptor expression and activation. This cross-sectional study aimed to investigate the relationship between CNR1 rs1776966256 and rs1243008337 genetic variants and the risk of developing DN in Iraqi patients with T2DM. The study included 100 patients with T2DM, divided into two groups: 50 with DN and 50 without DN. Genotyping of CNR1 rs1776966256 and rs1243008337 polymorphisms was conducted using PCR in DN patients and control samples. The distribution of rs1776966256 and rs1243008337 genotypes and alleles bet
... Show MoreAbstract:
The achievement of economic and social welfare for individual is the main target to all policies that adopted by all countries worldwide either were economic, social, political or others. The obtaining of education by individuals and especially the higher education is one of the most important determinates in achieving the wellbeing and lasted economic development. This is because via the higher education new fields can be opened in front of individuals in order to get adequate jobs associated with their scientific specialization. This is allowing educated individuals gain higher income that can reduce the gap of income inequality.
Thus, this paper aims to analysis the n
... Show MoreObjective: this search aims to test the correlation between job complexity and psychological detachment then stats how the burnout can affect in this relationship and dose the burnout can contribute in development of this relationship. Theoretical framework: the research adopted some questions like how can psychological detachment can make the employee keeping away from work and isolates himself from work environment and how can the job complexity enhance this behavior for employee ,and how can the burnout increase the correlation between job complexity and psychological detachment ?, then trying to extraction some of recommendations may contributes in enhancing practicing and adopting these three variables (job complexity, psych
... Show MoreConflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s
... Show MoreThis study investigates the challenges encountered by first-grade intermediate students in learning the Arabic language. It aims to identify specific obstacles that hinder language acquisition and proficiency among this demographic. Through qualitative and quantitative methods, including surveys and interviews with students, teachers, and parents, the research highlights key issues such as limited vocabulary, difficulties in grammar, lack of engagement with the material, and inadequate teaching resources. The findings reveal a complex interplay between cognitive, social, and educational factors that contribute to these challenges. The study underscores the need for targeted interventions, such as enhanced pedagogical strategies and improved
... Show MoreThis paper deals with numerical study of the flow of stable and fluid Allamstqr Aniotina in an area surrounded by a right-angled triangle has touched particularly valuable secondary flow cross section resulting from the pressure gradient In the first case was analyzed stable flow where he found that the equations of motion that describe the movement of the fluid
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More