Designing Teaching Aids and Their Effects on Learning and Retaining Diving and Cartwheel on Floor Exercises in Women’s’ Artistic Gymnastics
The research aimed at designing teaching aids that develop and help retain diving and cartwheel for third year college of physical education and sport sciences students in women’s artistic gymnastics. In addition to that, the researchers aimed at identifying the effect of these aids on learning and retaining cartwheel and diving in floor exercises. The researchers used the experimental method. The subjects were (20) third year female students from the college of physical education and sport sciences/ university of Baghdad sections K and H. the main experiment lasted for
... Show MoreThis study was conducted in the botanical garden, Department of biology, College of Science/ Mustansiriyah University in from (15 February to 15 March, 2019) under the natural environmental conditions in the greenhouse in order to evaluate the effectiveness of parsley aqueous extract as a promoter for rooting. The study included the use of aqueous extract of a plant Parsley (Petroselinum crispum) extract was used in concentrations (1.25, 2.5 g / l), compare with IBA in concentration (100 mg / L) with dipping time 24 hour for all treatments. The cutting stems were included Rosmarinus officinalis, Nerium oleander, Olea europaea, Plumeria alba, Hibiscus rosa, Pelargonium graveolens, and Myrtus communis. The following measurements were
... Show MoreIron oxide (Fe3O4) nanoparticles were synthesized via an eco-friendly green approach by adding Phoenix dactylifera extract to the aqueous solution of ferric chloride. The effect of annealing temperature (Ta) (100-150) °C on particle size was studied. X-ray diffraction (XRD), UV-visible spectroscopy, atomic force microscopy (AFM), and field emission scanning electron microscopy (FESEM) were used to evaluate the produced nanoparticles. According to XRD spectra, the crystallite size of the samples was determined using the Scherrer formula. AFM and FE-SEM were used to determine surface morphology. A UV-Vis optical spectroscopic examination was carried out to determine the band gap energy of the iron oxide nanoparticles. It was found th
... Show MoreThe problem of research is the need to find out the obstacles and difficulties facing women in accessing leadership positions at the University of Baghdad from their point of view. The importance of research comes from the importance of women in the university and their vital role in the development of society. The research objectives summarized the most important obstacles facing women Access to the leadership positions in the university and the relative weight of these obstacles as well as trying to identify differences in their view of these obstacles according to the variables of specialization (scientific, human) and the scientific title (Professor, Assistant Professor, Teacher, Assistant Lecturer). They were (144) university female
... Show MoreThis study aims to identify the role of satellite channels in imparting behavior to children from the point of view of their parents in Tulkarm city. The researcher used a descriptive technique. A sample of (18000) males and females married couples was used above 20 years old in the city of Tulkarm. The study sample size is (201) married couples. It took place in September 2020. The questionnaire was the main tool for collecting data. The study found that the total degree of satellite channels contribution in imparting negative behaviors to children was high, as it reached (72.20%). The total degree of the role of satellite channels in imparting positive behaviors to children was medium, reaching (69.20%). Moreover, the results also indi
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show More