إن النجاح في أداء المتطلبات الفنية والخططية في أي من الألعاب ألرياضيه يستوجب امتلاك العناصر الاساسيه المتعلقة بطبيعة الاداء ونوع الفعالية الرياضية الممارسة , لذا فان اغلب الألعاب الرياضية تعتمد على مكونات ألقدره التوافقيه والادراكيه الحسيه بوصفها احد العناصر الاساسيه في المستويات العليا لما توفره من قاعدة اقتران للصفات البدنيه والحر كيه وقدرات أجهزة الجسم الوظيفية , وفقا للأسس المعتمدة في بناء مهاراته, وعليه فان الارتقاء في درجات الأداء لتلك المتطلبات لايتم بلوغه ,ما لم تتفاعل الخبرات السمعية والبصرية والحس حركية لتشكيل الإدراك الشامل والصحيح الذي يهيئ للاعبه السيطرة التامة على الإيقاع الحركي سواء كان ذلك في ديناميكية الحركات والمهارات لتؤدى بما يناسب متطلبات الأداء .لذا وجدت الباحثتان ضعف الاعتماد على المؤشرات للقدرة التوافقية والقدرات الإدراكية الحسية الحركية والاستناد إلى مستويات الاستعداد مؤشرا منذ بداية التعلم الحركي ومدى التقدم في المستوى مقارنة بباقي المؤشرات الأخرى التي يبنى عليها تعلم الطالبة وتطورها في مادة جمناستك الأجهزة, وهدفت الدراسة الى التعرف على العلاقة بين بعض قدرات الإدراك الحسي – حركي المكاني ومستوى تعلم بعض مهارات جمناستك الأجهزة . واستعمل المنهج الوصفي على طالبات المرحلة الثالثة بكلية التربية الرياضية للبنات- جامعة بغداد.والبالغ عددهن (87)طالبة. للفترة من 2-3 ولغاية 13-3-2008م , في قاعة الجمناستك بالكلية التربية الرياضية للبنات- جامعة بغداد. وبعد جمع النتائج وتحليلها وفق الحقيبة الاحصائية استنتجت الباحثتان ماياتي : - وجود علاقة ارتباط معنوية بين بعض قدرات الادراك الحس حركي ومستوى تعلم بعض مهارات جمناستك الاجهزة .
Any software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
Estimations of average crash density as a function of traffic elements and characteristics can be used for making good decisions relating to planning, designing, operating, and maintaining roadway networks. This study describes the relationships between total, collision, turnover, and runover accident densities with factors such as hourly traffic flow and average spot speed on multilane rural highways in Iraq. The study is based on data collected from two sources: police stations and traffic surveys. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. The se
... Show MoreFar infrared photoconductive detectors based on multi-wall carbon nanotubes (MWCNTs) were fabricated and their characteristics were tested. MWCNTs films deposited on porous silicon (PSi) nanosurface by dip and drop coating techniques. Two types of deposited methods were used; dip coating sand drop –by-drop methods. As well as two types of detector were fabricated one with aluminum mask and the other without, and their figures of merits were studied. The detectors were illuminated by 2.2 and 2.5 Watt from CO2 of 10.6 m and tested. The surface morphology for the films is studied using AFM and SEM micrographs. The films show homogeneous distributed for CNTs on the PSi layer. The root mean square (r.m.s.) of the films surface roughness in
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.