Using Scenarios to Assess Student Learning
...Show More Authors
This study aims to find out the effect of the mediator on scaffolding fourth yearstudent- teachers' teaching competencies and their self-efficacy. The present study combines scaffolding and self-efficacy by using a mediator on scaffolding students affects teaching competencies and selfefficacy and from the results of which the existence of student-teachers’ selfawareness was ensured as an effect of the same independent variable. The model affects their teaching competencies and led them to be aware of the needs of their pupils and themselves.
The researcher used the experimental approach due to its suitability and the nature of the research problem. The research community was represented by the eighth-grade students in the Rozak Elementary Mixed School affiliated with the General Directorate of Education in Erbil / the center, for the academic year (2021-2022), the number is (96) students, and the research sample consisted of (63) male and female students, with (31) in the experimental group, and (32) in the control group, and (11) students were excluded by (5) students from the experimental group, and (6) students from the control group, as the excluded, are students who failed and were absent from the lessons, and accordingly, the research sample became composed of (52) mal
... Show MoreIraqi EFL college instructors, who supervise the teaching practice of EFL student teachers, commonly experience the inefficient teaching performance of prospective teachers. This inefficiency is usually due to their inability to make connections between the practical experience and the theoretical knowledge of TEFL. One of the reasons behind this inability may be the employment of traditional ways of training and instructing student teachers. Moreover, it is usually noticed that many Iraqi EFL student teachers have a negative attitude toward the teaching profession. They explicitly state that they would join the teaching force only if they fail to work in any other field.
... Show MoreAmputation of the upper limb significantly hinders the ability of patients to perform activities of daily living. To address this challenge, this paper introduces a novel approach that combines non-invasive methods, specifically Electroencephalography (EEG) and Electromyography (EMG) signals, with advanced machine learning techniques to recognize upper limb movements. The objective is to improve the control and functionality of prosthetic upper limbs through effective pattern recognition. The proposed methodology involves the fusion of EMG and EEG signals, which are processed using time-frequency domain feature extraction techniques. This enables the classification of seven distinct hand and wrist movements. The experiments conducte
... Show MoreThe aim of the research was to identify On the effect of the learning-by-play strategy on learning some handball skills among second-stage female students,Comparing the results of students' performance before and after implementing the learning by playing strategy,Providing development proposals for teaching handball skills in light of the research results.,I dependresearcherCurriculumexperimentalIn research procedures as an appropriate approach to achieving research objectives,For two groups, one experimental and the other control,Community of female studentsSecondFor the academic year 2024-2025, consisting of (4Female people (numbering)151) StudentChosen.Research sample30 female students from Section (B) were selected and (4) fe
... Show MoreIn this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreFraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.
The work in this paper involves the planning, design and implementation of a mobile learning system called Nahrain Mobile Learning System (NMLS). This system provides complete teaching resources, which can be accessed by the students, instructors and administrators through the mobile phones. It presents a viable alternative to Electronic learning. It focuses on the mobility and flexibility of the learning practice, and emphasizes the interaction between the learner and learning content. System users are categorized into three categories: administrators, instructors and students. Different learning activities can be carried out throughout the system, offering necessary communication tools to allow the users to communicate with each other
... Show More