Objective: Preparing training in a diverse style for young basketball players, and identifying the effect of training in a diverse style on some physical abilities (for young basketball players).Research methodology: the researchers chose the experimental method to know the research problem and its objectives, as it is represented by designing two equal groups, the control and the experimental, with pre- and post-tests. The study community was determined by youth basketball players for the 2023-2024 season, as the research community is (104) players, and a sample of (20) players was drawn from the youth category from Al-A'dhamiyah Sports Club, and it was chosen intentionally because they are the clubs most committed to training, as they were divided into two groups, a control group, numbering (10) players, and (10) players, who are the experimental group, and (5) players for the exploratory experiment.Result: The researcher the significance of the differences to the effectiveness of the training using the methods applied to the research sample, which are distinctive by diversity, change in intensity, repetition, and quick reactions in response to the appearance of the stimulus. The goal of these is to develop the characteristic of kinetic response speed for basketball players, in addition to the gradual increase in the training load in a manner that suits the youth category, as well as using appropriate repetitions with them.Conclusions: The results showed that exercises using various methods helped develop the speed of kinetic response and the distinctive strength of speed of the legs and arms of the experimental group members.
The current research aims to identify the effect of the learning mastery strategy using interactive learning as a therapeutic method on the achievement of secondary school students in mathematics. To achieve the research objective, the researcher selected second-grade middle school students at Al-Haybah Intermediate School for Boys and determined his research sample, which consisted of (77) students distributed into two sections: Section (A) the experimental group, with (38) students, and Section (B) the control group, with (39) students. The statistical equivalence of the two research sample groups was confirmed in the variables (intelligence test, previous achievement, and previous knowledge test). The researchers chose the par
... Show MoreIn this study, the possible protective effects of daidzein on ifosfamide-induced neurotoxicity in male rats were examined by the determination of changes in selected oxidant–antioxidant markers of male rats’ brain tissue.
Twenty-eight (28) apparently-healthy Wistar male rats weighing (120-150gm) allocated into 4 groups (n=7) were used in this study. Rats orally-administered 1% tween 20 dissolved in distilled water/Control (Group I); rats were orally-administered daidzein suspension (100mg/kg) for 7 days (Group II); rats intraperitoneally-injected with a single dose of ifosfamide (500 mg/kg) (Group III); rats orally-administered for 7 days with the daidzein (100mg/
... Show MoreThis research aims to know the effect of the strategy of map bubbles on developing the skills of science operations among 5th grade literary students in the subject of rhetoric and application, and the design of the experimental and control groups with the pre and post-tests was used. The research sample consisted of (50) students divided into two groups, an experimental group of which reached the number of its members is (25) students and studied using the strategy of map bubbles, and a control group of its members reached (25) students and studied in the traditional (standard) method. The researchers prepared a multiple-choice achievement test with several (30) paragraphs, and its validity and consistency were extracted. Then the test was
... Show MoreAntibiotics present the greatest threat to soil and aquatic ecosystems among the different therapeutic groups of medicines (which include prescription drugs and treatments for cancer). The strongest drugs, antibiotics, have been utilized to stop the growth of microorganisms or eradicate them. Using high-performance liquid chromatography technology with fluorescence detection, the amounts of levofloxacin and tetracycline in the wastewater from three hospitals (Medical City, AlKindi, and Al-Yarmouk) were determined. Levofloxacin and tetracycline were chosen in this study because they are the most important water pollutants. These antibiotic residues were separated and measured using a gradient elution technique on a reverse-phase C18 co
... Show MoreAbstract
In this research provide theoretical aspects of one of the most important statistical distributions which it is Lomax, which has many applications in several areas, set of estimation methods was used(MLE,LSE,GWPM) and compare with (RRE) estimation method ,in order to find out best estimation method set of simulation experiment (36) with many replications in order to get mean square error and used it to make compare , simulation experiment contrast with (estimation method, sample size ,value of location and shape parameter) results show that estimation method effected by simulation experiment factors and ability of using other estimation methods such as(Shrinkage, jackknif
... Show MoreAntibiotics present the greatest threat to soil and aquatic ecosystems among the different therapeutic groups of medicines (which include prescription drugs and treatments for cancer). The strongest drugs, antibiotics, have been utilized to stop the growth of microorganisms or eradicate them. Using high-performance liquid chromatography technology with fluorescence detection, the amounts of levofloxacin and tetracycline in the wastewater from three hospitals (Medical City, Al-Kindi, and Al-Yarmouk) were determined. Levofloxacin and tetracycline were chosen in this study because they are the most important water pollutants. These antibiotic residues were separated and measured using a gradient elution technique on a reverse-phase C18
... Show MoreThe phenomenon of poverty is one of the most important phenomena facing the world at large. Despite the tremendous technological progress witnessed by mankind and despite the unprecedented high levels of world economic production, poverty remains the greatest challenge facing the world. Statistics and studies have shown that poverty is caused by several problems: (health, social, economic, educational, etc.) These problems are obstacles to the ability to obtain employment opportunities, which leads in the beginning to the growth phenomenon of unemployment, and ultimately to the growth of poverty.
The results of a range of research in the field of psychology have confirmed that children from poor homes suffer from a high level of
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More