Many Iraqi students are reluctant to actively participate in the English
language classroom. This reluctance is attributed to a number of factors, above which
is students' lack of thinking skills necessary to express their points of view. This
eventually results in passive learning, a real problem in English language learning in
Iraq.
A need for educational reforms and innovations seems essential. These involve
developing relevant teaching materials, adopting learner-centered approach,
promoting learner autonomy, and enhancing critical thinking.
This study is hoped to assist teachers of English to initiate change and foster
the expansion of thinking, and adopt various new strategies to increase classroom
participation. The paper also aims to enable Iraqi students to be active thinkers rather
than passive attendees.
Microbiological contamination by fungi impacts the quality and safety of wheat grain storage. This study aimed to evaluate the efficacy of cold plasma in restricting the growth of the fungus, Aspergillus niger, which was isolated from wheat grains. A dielectric barrier discharge (DBD) operating at atmospheric pressure generated cold plasma that was used to treat the fungus, and the impact of this treatment was investigated at various periods 1, 2, 4, 6, and 15 minutes. The results revealed a highly significant decrease in the growth and number of spores of Aspergillus niger compared to the controls. This study revealed an efficient technique for enhancing wheat grain storage that could be a foundation for further large-scale studies.
... Show MoreLet G be a graph with p vertices and q edges and be an injective function, where k is a positive integer. If the induced edge labeling defined by for each is a bijection, then the labeling f is called an odd Fibonacci edge irregular labeling of G. A graph which admits an odd Fibonacci edge irregular labeling is called an odd Fibonacci edge irregular graph. The odd Fibonacci edge irregularity strength ofes(G) is the minimum k for which G admits an odd Fibonacci edge irregular labeling. In this paper, the odd Fibonacci edge irregularity strength for some subdivision graphs and graphs obtained from vertex identification is determined.
The aim of the study was to know the factors analysis of scale Bar-On & Parker, post analysis is found fourteen factors for the first degree of the scale. Also we extracted five factors from the second degree.
The scale consists of (60) items , applied on sample of (200) students (Male &Female ) age (15-18) years randomly chosen from preparatory schools . The scale unveiled satis factors validity and reliability. An others aims is to low the emotional Intelligence level and know the difference of statistical in sex , age variable and the specialization variable .The result was no difference of statistical in sex and specialization variable , but the difference appear
... Show MoreTo study the comparative use of some soil minerals (zeolite, bentonite, phosphate rock, and limestone) in the adsorption and release of lead and its removal rates from its aqueous solutions using adsorption equations. Two laboratory experiments were carried out for the adsorption and release of lead. The adsorption experiment took 0.5 g of some of the above soil minerals. Lead was added as Pb (NO3)2 at levels of 3.0, 2.0, 1.5, 1.0, 0.5, and 0.0 mmol L-1 containing a concentration of 0.01M of calcium chloride. The experimental unit’s number was 72, the concentration of dissolved lead in the equilibrium solution was estimated and the amount of lead adsorbed was calculated. As for the lead release experiment, samples fo
... Show MoreThe research involves using phenol – formaldehyde (Novolak) resin as matrix for making composite material, while glass fiber type (E) was used as reinforcing materials. The specimen of the composite material is reinforced with (60%) ratio of glass fiber.
The impregnation method is used in test sample preparation, using molding by pressure presses.
All samples were exposure to (Co60) gamma rays of an average energy (2.5)Mev. The total doses were (208, 312 and 728) KGy.
The mechanical tests (bending, bending strength, shear force, impact strength and surface indentation) were performed on un irradiated and irrad
... Show MoreThe study aims to identify the theoretical literature for all the variables of the study (ICT, GDP) as well as to identify the practical side of the impact of ICT on the per capita GDP in Iraq for the period (2004-2021). The study was based on the hypothesis that ICT impacts per capita GDP in Iraq. The problem of the study was to answer the question: does ICT contribute to per capita GDP? The study concluded that an increase in the rate of internet users per 100 people by one unit would increase. Increasing the landline telephone rate per 100 people by one unit will increase GDP per capita. In addition, increasing the mobile phone rate per 100 people by one unit will increase GDP per capita. The study recommended adopting rational poli
... Show MoreThe study was preformed for investigating of Salmonella from meat, and compared Vidas UP Salmonella (SPT) with the traditional methods of isolation for Salmonella , were examined 42 meat samples (Beef and Chicken) from the Local and Imported From local markets in the city of Baghdad from period December 2013 -February 2014 the samples were cultured on enrichment and differential media and examined samples Vidas, and confirmed of isolates by cultivation chromgenic agar, biochemical tests ,Api20 E systeme , In addition serological tests , and the serotypes determinate in the Central Public Health Laboratory / National Institute of Salmonella The results showed the contamination in imported meat was more than in the local meat 11.9% and 2
... Show MoreThe data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.