Abstract
We Can Summarize This Research According To the Following Points
A- result
1- We conclude a new method to teach the recitation we call it (listening
method) which consist of four steps (introduction , listening ,continuity,
evaluation )
2- This research get many listening skills that educated need it when
listen to (holy quran) beside to many propositions that help to develop
it.
3- This research briefs some principles that help the teacher when use
listening method.
B- conclusion
1- The best way to teach and learn the recitation of holy quran is by
using listening skill because the prophet (pease be upon him )learn
the holy quran by it from jebrel (pease be upon him ) and then
teach the muslims .
2- Listen to holy quran in (early years in childhood) that help to fix the
correct utterances in educated” mind and be easy to learn it in the
future.
3- Arabic language is the language of holy quran so that the best way
to learn it by listening to holy quran because its origin of arabic
language standards.
C- recommendation
1- Listening skill should take important place in teaching the holy
quran because its important skill which is neglect in the past .
2- Should be attention to learn the children the holy quran and learn
them to listen to it .
Bipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreBackground The appropriate disposal of medication is a well-recognized issue that has convened growing recognition in several contexts. Insufficient awareness relating to appropriate methods for the disposal of unneeded medicine may result in notable consequences. The current research was conducted among the public in Iraq with the aim of examining their knowledge, attitude, and practices regarding the proper disposal of unused and expired medicines. Methods The present study used an observational cross-sectional design that was community-based. The data were obtained from using an online questionnaire. The study sample included people of diverse genders, regardless of their race or occupational status. The study mandated that all pa
... Show MoreWe aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More