Each sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volleyball players. This weakness may be attributed to the weakness or variation in the physical abilities of volleyball players Therefore, the two researchers decided to develop physical exercises according to the phosphogenic energy system, considering the volleyball game within the ATP-CP system)) Adenosine Triphosphate and Creatine Phosphate to prepare for physical performance within the game and to know the effect of these exercises on the performance of the skill of sending with volleyball
The present work aimed to make a comparative investigation between three different ionospheric models: IRI-2020, ASAPS and VOACAP. The purpose of the comparative study is to investigate the compatibility of predicting the Maximum Usable Frequency parameter (MUF) over mid-latitude region during the severe geomagnetic storm on 17 March 2015. Three stations distributed in the mid-latitudes were selected for study; these are (Athens (23.50o E, 38.00o N), Jeju (124.53o E, 33.6o N) and Pt. Arguello (239.50o W, 34.80o N). The daily MUF outcomes were calculated using the tested models for the three adopted sites, for a span of five-day (the day of the event and two days preceding and following the event day). The calculated datasets were co
... Show MoreThe energy aimed at examining the mode of energy drinks consumption among athletes in
Baghdad and assessing their drinks were spread greatly among the athletes and students. This
study impression toward such drinks. The study sample comprised of 102 mal athletes aged
between 19-27 years and selected randomly .The obtained results showed that football was
most practiced among the test samples at 40.54% based on twice daily .The athletes
consumed one can each day at 41.18% .As the data on energy drinks was supplied from
friends .The prefared period for drinking was before or during exercise .The athletes thought
that there products can provide energy ,vitamins ,tell ale materials ,does not affect
appetite.The most f
An approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
A twisted-fin array as an innovative structure for intensifying the charging response of a phase-change material (PCM) within a shell-and-tube storage system is introduced in this work. A three-dimensional model describing the thermal management with charging phase change process in PCM was developed and numerically analyzed by the enthalpy-porosity method using commercial CFD software. Efficacy of the proposed structure of fins for performing better heat communication between the active heating surface and the adjacent layers of PCM was verified via comparing with conventional longitudinal fins within the same design limitations of fin material and volume usage. Optimization of the fin geometric parameters including the pitch, numb
... Show MoreGross domestic product (GDP) is an important measure of the size of the economy's production. Economists use this term to determine the extent of decline and growth in the economies of countries. It is also used to determine the order of countries and compare them to each other. The research aims at describing and analyzing the GDP during the period from 1980 to 2015 and for the public and private sectors and then forecasting GDP in subsequent years until 2025. To achieve this goal, two methods were used: linear and nonlinear regression. The second method in the time series analysis of the Box-Jenkins models and the using of statistical package (Minitab17), (GRETLW32)) to extract the results, and then comparing the two methods, T
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More