إن النجاح في أداء المتطلبات الفنية والخططية في أي من الألعاب ألرياضيه يستوجب امتلاك العناصر الاساسيه المتعلقة بطبيعة الاداء ونوع الفعالية الرياضية الممارسة , لذا فان اغلب الألعاب الرياضية تعتمد على مكونات ألقدره التوافقيه والادراكيه الحسيه بوصفها احد العناصر الاساسيه في المستويات العليا لما توفره من قاعدة اقتران للصفات البدنيه والحر كيه وقدرات أجهزة الجسم الوظيفية , وفقا للأسس المعتمدة في بناء مهاراته, وعليه فان الارتقاء في درجات الأداء لتلك المتطلبات لايتم بلوغه ,ما لم تتفاعل الخبرات السمعية والبصرية والحس حركية لتشكيل الإدراك الشامل والصحيح الذي يهيئ للاعبه السيطرة التامة على الإيقاع الحركي سواء كان ذلك في ديناميكية الحركات والمهارات لتؤدى بما يناسب متطلبات الأداء .لذا وجدت الباحثتان ضعف الاعتماد على المؤشرات للقدرة التوافقية والقدرات الإدراكية الحسية الحركية والاستناد إلى مستويات الاستعداد مؤشرا منذ بداية التعلم الحركي ومدى التقدم في المستوى مقارنة بباقي المؤشرات الأخرى التي يبنى عليها تعلم الطالبة وتطورها في مادة جمناستك الأجهزة, وهدفت الدراسة الى التعرف على العلاقة بين بعض قدرات الإدراك الحسي – حركي المكاني ومستوى تعلم بعض مهارات جمناستك الأجهزة . واستعمل المنهج الوصفي على طالبات المرحلة الثالثة بكلية التربية الرياضية للبنات- جامعة بغداد.والبالغ عددهن (87)طالبة. للفترة من 2-3 ولغاية 13-3-2008م , في قاعة الجمناستك بالكلية التربية الرياضية للبنات- جامعة بغداد. وبعد جمع النتائج وتحليلها وفق الحقيبة الاحصائية استنتجت الباحثتان ماياتي : - وجود علاقة ارتباط معنوية بين بعض قدرات الادراك الحس حركي ومستوى تعلم بعض مهارات جمناستك الاجهزة .
Hepatitis B infection is a prominent infectious disease caused by hepatitis B virus (HBV), which infect liver and is considered as the main cause of liver cirrhosis, fibrosis and liver cancer worldwide. A pro-inflammatory cytokine Interleukin32 is believed to have a role in chronic HBV infections. Since its role in CHB infections is remain unclear, this study was done to detect IL-32 gene expression in CHB patients in order to identify its exact role. A total number of 110 blood samples were collected from Gastroenterology and Hepatology Teaching Hospital in Baghdad Medical City from CHB patients for both males and females with different age groups according to the research ethics form then sent to Central Public Health Laboratory (CPHL),
... Show MoreThe important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show MoreBackground: It was stated in scientific literatures that the entire craniofacial complex is influenced by the growth of the cranial base structures. Nevertheless, many times this is not the case, and this point is subject to great controversy so the aim of this study is to evaluate the possible differences in cranial base shape and flexure between different skeletal classes for both genders and to investigate any possible correlation between cranial base variables and other skeletal base variables. Materials and Methods: The sample include 75 lateral cephalometric radiographs of Iraqi adults aged between 18-25 years (39 males, 36 females), collected from patients and undergraduate students in the orthodontic department of College of Dentist
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreAn experimental and theoretical analysis was conducted for simulation of open circuit cross flow heat
exchanger dynamics during flow reduction transient in their secondary loops. Finite difference
mathematical model was prepared to cover the heat transfer mechanism between the hot water in the
primary circuit and the cold water in the secondary circuit during transient course. This model takes under
consideration the effect of water heat up in the secondary circuit due to step reduction of its flow on the
physical and thermal properties linked to the parameters that are used for calculation of heat transfer
coefficients on both sides of their tubes. Computer program was prepared for calculation purposes which
cover a
Taken the word the word God itself the task when the Muslim calligraphers because of its holiness and majesty and altitude, so take Calligraphers innovate in their design, which represents the images and forms experiencing them prolific artistic output to highlight the aesthetic value through the use of Kufic script which is one of the most prominent lines his susceptibility diversity decorative Add the possibility of extending the letters in different directions because of the vision calligrapher aesthetic and an investigation is required for the word of the design, so the researcher examined by dividing into four chapters,Was the first research problem and the importance and goals and identify the term, while the second chapter was div
... Show MoreThe rapid changes in the field of transferring and exchanging information via cloud platforms have revolutionized the field of modern visual media, as cloud computing technology has greatly influenced the media institutions, providing effort, money and high-quality materials. The research included five chapters, the first came under the methodological framework for the research and the second Theoretical framework, the first two included the concept of cloud computing and the second platforms for cloud computing in the visual media and the third chapter Research procedures and the fourth chapter The sample analysis and the fifth chapter The research results were the most prominent
1. The cloud service made the benefit beyond the typic