Abstract
We Can Summarize This Research According To the Following Points
A- result
1- We conclude a new method to teach the recitation we call it (listening
method) which consist of four steps (introduction , listening ,continuity,
evaluation )
2- This research get many listening skills that educated need it when
listen to (holy quran) beside to many propositions that help to develop
it.
3- This research briefs some principles that help the teacher when use
listening method.
B- conclusion
1- The best way to teach and learn the recitation of holy quran is by
using listening skill because the prophet (pease be upon him )learn
the holy quran by it from jebrel (pease be upon him ) and then
teach the muslims .
2- Listen to holy quran in (early years in childhood) that help to fix the
correct utterances in educated” mind and be easy to learn it in the
future.
3- Arabic language is the language of holy quran so that the best way
to learn it by listening to holy quran because its origin of arabic
language standards.
C- recommendation
1- Listening skill should take important place in teaching the holy
quran because its important skill which is neglect in the past .
2- Should be attention to learn the children the holy quran and learn
them to listen to it .
Abstract:
Objective: To self-evaluate the effect of SBAR (Situation, Background, Assessment, and Recommendation) educational program on nurse and midwives practices in maternal health report documentation accuracy.
Methods: A quasi- experimental design was carried with the application of pre- post test for nurses and midwives’ knowledge and practices regarding SBAR communication tool. The study was held in Al-Elwia maternity teaching hospital, Al –Karckh maternity hospital and Al-Yarmouk teaching Hospital. purposive sample as it was convenient with inclusion criteria consisted of (84) nurse and midwives. The questionnaire comprised of demographic data, nurses- midwives practices of SBAR using (5) level Likert scale for assessme
An experiment was conducted in pots under field conditions during fall seasons of 2017 and 2018. This study aimed to improve a weak growth of seedlings under salt stress in sorghum. Three factors were studied. 1st factor was three cultivars (Inqath, Rabeh, and Buhoth70). 2nd factor was seed priming (primed and unprimed seed). Seed were primed by soaking for 12 hours in a solution containing 300 + 70 mg L−1 of gibberellic (GA3) and salicylic (SA) acids, respectively. 3rd factor was irrigation with saline water (6, 9 and 12 dS m−1) resulting from dissolving sodium chloride in distilled water in addition to control treatment (distilled water). Randomized complete block design was used with four replications. In both seasons: the results sh
... Show MoreBipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More