The research aims to identify the most important variables affecting shooting from jumping high and compare them for the two foot the weak and strong, where the researchers adopted the descriptive method, and the sample was chosen by the intentional method, which consists of (4) players from the Iraqi Sports Army Club, where these variables were studied and their impact on The accuracy of aiming at the two men, and the researchers concluded that most of the players have more accuracy in aiming at the strong leg than at the weak leg, which leads to the loss of many real opportunities during the match because of the players changing the situation or wasting the available opportunity when the position of correction is an opportunity for the w
... Show MoreThe compound [K1] was synthesized from the reaction of dichloromethane with linear alkyl benzene (Lab9) using ethanol as a solvent, and from(chloro methyl)-4-nonylbenzene) [K1] it was possible to synthesize the compound Z(4-(nonan-3-yl)phenyl) methane amine) [K2] containing the amine group by synthesized from [K2] reaction with appropriate phenolic aldehydes and using Ethanol as a solvent in the preparation of vinyl chloride4-(((4-nonylbenzyl)imino)methyl)phenol-4-(((4-nonylbenzyl)imino methyl)benzene-1,3diol) [K3-K4] bases has been used. Preparation of a number of Phenolic polymers4-(2- hydroxy-3.5-dimethylbenzyl)-2-methyl-6-(((4-4-(2hyroxy-3, 5-dimethylbenzyl)-2-methyl-6(((4 nonylbenzyl) imino) methyl) benzene-phenolnonylbenzyl) imino) me
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreFaintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
This paper presents a study for the influence of magnetohydrodynamic (MHD) on the oscillating flows of fractional Burgers’ fluid. The fractional calculus approach in the constitutive relationship model is introduced and a fractional Burgers’ model is built. The exact solution of the oscillating motions of a fractional Burgers’ fluid due to cosine and sine oscillations of an infinite flat plate are established with the help of integral transforms (Fourier sine and Laplace transforms). The expressions for the velocity field and the resulting shear stress that have been obtained, presented under integral and series form in terms of the generalized Mittag-Leffler function, satisfy all imposed initial and boundary conditions. Finall
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show More(Social values) are of great importance in the lives of nations and peoples as they are the frame of reference that governs the relations of members of society to each other and regulates their life affairs.
And the Prophet of Islam (may God’s prayers and peace be upon him) has told about a group of (social values) such as: spreading peace, feeding food, being fair in dealing with others, and clarifying what a Muslim should have towards his Muslim brother from the safety of the chest and refraining from harming him with the tongue and hand, and so on. Ethics and behaviors that are directly and closely related to (social values).
The best book that abounds with these (social valu
... Show More