Each sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volleyball players. This weakness may be attributed to the weakness or variation in the physical abilities of volleyball players Therefore, the two researchers decided to develop physical exercises according to the phosphogenic energy system, considering the volleyball game within the ATP-CP system)) Adenosine Triphosphate and Creatine Phosphate to prepare for physical performance within the game and to know the effect of these exercises on the performance of the skill of sending with volleyball
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreThis current research deals with the "The role of organizational change in the achievement of strategic success" Who are getting increased attention to being one of the important topics and relatively new, And which have a significant impact on the future of the organization So there is a need for this research, which aims to identify the role of organizational change across dimensions (technology, organizational structure, human resources, organizational culture) in the strategic success through its components (a specific strategy, effective implementation, innovation, customer satisfaction)، And that by two main hypotheses, branched about eight hypothes
... Show MoreObjectives: The research aims to highlight the semiotic approach and apply it to a photograph of the Pope's reception at Baghdad International Airport, published on the page of the Media Office of Iraqi Prime Minister Mustafa Al-Kazemi in the Twitter application, in order to study its components, analyze its contents and clarify its implications, as well as approach the image as a political and media act. Methods: The stages of research were accomplished by "investigation, observation, and analysis", and the dismantling of the composition of the photograph, thus revealing the hidden and hidden aspects, relying on the semiotic approach to analysis. Results: The study showed that the ideas and meanings included in the image in form
... Show MoreThe survey showed sample opinions of officials in the general company for vegetable oils industry, and the statement of the order of the effect of these dimensions depending on the degree of importance, the questionnaire was used as a key tool in collecting data and information of the sample consisted of 30 officials, arithmetic mean, standard deviation, percentages, Spearman correlation coefficient and the global statistical analysis as a statistical methods that based on statistical program (SPSS), The researcher came to several conclusions, most important that there is high agreement by the respondents of the importance of the dimensions of building a mental picture of the company and to attract the consumer's attention, Also research
... Show MoreThis research aims to know the effectiveness of teaching with a proposed strategy according to the common Knowledge construction modelin mathematical proficiency among students of the second middle class. The researchers adopted the method of the experimental approach, as the experimental design was used for two independent and equal groups with a post-test. The experiment was applied to a sample consisting of (83) students divided into two groups: an experimental comprising (42) students and a control group, the second comprising (41) students., from Badr Shaker Al-Sayyab Intermediate School for Boys, for the first semester of the academic year (2021-2022), the two groups were rewarded in four variables: (chronological age calculated in mo
... Show MoreWas conducted neutralize content Albulamedi for local isolates using Alacardan dye orange selection experience showed loss of local isolates resistant life antibiotic ampicillin, chloramphenicol