Preferred Language
Articles
/
6BaUd4sBVTCNdQwCm8s5
Exercises based on the phosphogenic energy system to develop the ability to perform with precision and accuracy
...Show More Authors

Each sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volleyball players. This weakness may be attributed to the weakness or variation in the physical abilities of volleyball players Therefore, the two researchers decided to develop physical exercises according to the phosphogenic energy system, considering the volleyball game within the ATP-CP system)) Adenosine Triphosphate and Creatine Phosphate to prepare for physical performance within the game and to know the effect of these exercises on the performance of the skill of sending with volleyball

Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Multimedia Tools And Applications
Shot boundary detection based on orthogonal polynomial
...Show More Authors

View Publication
Scopus (41)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Sun Jan 25 2026
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The role of organizational change to achieve strategic success A field research in the Petroleum Research & Development Center-Ministry of Oil
...Show More Authors

  This current research deals with the "The role of organizational change in the achievement of strategic success" Who are getting increased attention to being one of the important topics and relatively new, And which have a significant impact on the future of the organization So there is a need for this research, which aims to identify the role of organizational change across dimensions (technology, organizational structure, human resources, organizational culture) in the strategic success through its components (a specific strategy, effective implementation, innovation, customer satisfaction)، And that by two main hypotheses, branched about eight hypothes

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Nov 15 2023
Journal Name
Dirasat: Human And Social Sciences
Media Usage for Pope Francesco's Visit to Iraq March 5, 2021 (A Semiotic Study of the Photograph Welcoming Of the Pope)
...Show More Authors

Objectives: The research aims to highlight the semiotic approach and apply it to a photograph of the Pope's reception at Baghdad International Airport, published on the page of the Media Office of Iraqi Prime Minister Mustafa Al-Kazemi in the Twitter application, in order to study its components, analyze its contents and clarify its implications, as well as approach the image as a political and media act. Methods: The stages of research were accomplished by "investigation, observation, and analysis", and the dismantling of the composition of the photograph, thus revealing the hidden and hidden aspects, relying on the semiotic approach to analysis. Results: The study showed that the ideas and meanings included in the image in form

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect of The Mental image Building Dimensions for The Company to Aattract Attention of Iraqi Consumers for local Products: Exploratory Study
...Show More Authors

The survey showed sample opinions of officials in the general company for vegetable oils industry, and the statement of the order of the effect of these dimensions depending on the degree of importance, the questionnaire was used as a key tool in collecting data and information of the sample consisted of 30 officials, arithmetic mean, standard deviation, percentages, Spearman correlation coefficient and the global statistical analysis as a statistical methods that based on statistical program (SPSS), The researcher came to several conclusions, most important that there is high agreement by the respondents of the importance of the dimensions of building a mental picture of the company and to attract the consumer's attention, Also research

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 18 2022
Journal Name
International Journal Of Early Childhood Special Education
The effectiveness of a proposed teaching strategy according to The Common Knowledge Construction Model in Mathematical Proficiency for middle school student
...Show More Authors

This research aims to know the effectiveness of teaching with a proposed strategy according to the common Knowledge construction modelin mathematical proficiency among students of the second middle class. The researchers adopted the method of the experimental approach, as the experimental design was used for two independent and equal groups with a post-test. The experiment was applied to a sample consisting of (83) students divided into two groups: an experimental comprising (42) students and a control group, the second comprising (41) students., from Badr Shaker Al-Sayyab Intermediate School for Boys, for the first semester of the academic year (2021-2022), the two groups were rewarded in four variables: (chronological age calculated in mo

... Show More
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
The role of the plasmid content in multiple resistance to antibiotics Life in isolated Rthomh of cases of diarrhea in children
...Show More Authors

Was conducted neutralize content Albulamedi for local isolates using Alacardan dye orange selection experience showed loss of local isolates resistant life antibiotic ampicillin, chloramphenicol

View Publication Preview PDF