The research aims to identify the impact of the teaching methods Breathe test and imperative training method in learning some basic skills in Volleyball. The sample included 30 students of the first intermediate level from Al-Tawaia for boys / the public directorate of the education of Baghdad province – Al-Rasafa /2 ( The second). The samples are chosen randomly and divided into three groups : The systematic (Imperative method), first experimentary (training method), second experimentary (training method). Ten students are chosen for each group . The syllabus of the ministry of education is adopted on the systematic group while educational unites, which are prepared by the researcher, are used for the first and second experimenting group
... Show MoreSesame crop, one of the very important oily, industrial, and summer crops that is economically important, has been investigated. The plantation and production of this crop has been studied in Al-Qadisiyah governorate during 2003-218. This is because this governorate is well-known by sesame plantation. Such a study helps to know the geographical distribution of sesame agricultural season in 2017-2018, and explore the most important natural factors that affect its plantation. Different research approaches have been adopted based on that facts that need to be met. A field study approach has been used in studying sesame crop descriptively and conceptually, shedding light on its nutritional and economic importance. Moreover, a descriptive com
... Show More This study titled “digital addiction and its relationship to social isolation among children in the autism spectrum from the point of view of their parents” in which the
researcher addressed an important topic which is knowledge of digital addiction in a
child with autism spectrum and its relationship to social isolation in them.
The study aimed to dhed the light on the digital addiction in a spectrum child Autism
from the point of view of their parents، by knowing the extent of addiction of children
in the autism spectrum، and identifying the relationship between electronic addiction and the social isolation of children in the autism spectrum.The study presented
several hypotheses،
The aim of the study was extraction of arial part of Euphorbia cyathophora constituents with methanol and evaluate its effect on mitotic index and total chromosomal aberration bone marrow cell and spleen cell in mice 200 gm of E. cyathophora fine powder was defatted then extracted by cold maceration 80% ethanol for seven days. The extract was filtered and dried in a rotary evaporator then the dried extract was suspended with water and consecutively extracted using chloroform, ethyl acetate for each. The aqueous layer was then mixed with 100ml methanol. These fractions are dried under reduced pressure to obtain the dry extract. Twenty-four Albino mice were used for the experiment. The animals were divided into four groups: Gr
... Show MoreAbstract:
Taghlib tribe had an important part in the history of the first century of
hijra. She managed to get the best social, economic and political basis in the
Arab- Islamic state. In this basis Taghlib was the best Dhimies in the Islamic
state. This tribe refused to be among the people of the book, and to be from
the people of dhima. That tribe refused to pay the Jizya and Khraj, but
accepted to pay double Sadaqa in stead of Jizya and Khraj, so in that case
many Muslims become angry.
Although their Christianity was naïve and simple, Taghlib hold it until the
end of the third century A.H. Taghlib did so because her people wanted to
keep their good relation with the Byzantine. Taghlib thought that the
This study aims to prepare educational sessions for the strategy (team-pair-solo) in practical volleyball lessons for female students and identifying its effect on learning the accuracy of the spiking skill in volleyball. An experimental design with experimental and control groups was employed on a purposive sample of (30) female students who were to constitute (42.254%) from their community represented by the sophomores at the College of Physical Education and Sports Sciences for Girls / University of Baghdad who are in good standing in the morning study for the academic year (2022-2023), whose total number is (71) students. According to the determinants of the experimental design, participants were divided into two equal groups, a
... Show MoreThis research deals with the poetic image of poets of the eighth century poetic, where they embodied the features of the religious life in which they live, and their impact on the Koranic text in the reflection of the image on their poems, where it becomes clear the ability of the poet at that stage to clarify the aesthetic components of the poetic text; Investigations, singled out the first topic: the analogy, and the second metaphorical picture, and the third: the picture.
The difference The doctrines of the four jurists were built in Achieving the purposes of Tesper in Islam
Free Space Optics (FSO) plays a vital role in modern wireless communications due to its advantages over fiber optics and RF techniques where a transmission of huge bandwidth and access to remote places become possible. The specific aim of this research is to analyze the Bit-Error Rate (BER) for FSO communication system when the signal is sent the over medium of turbulence channel, where the fading channel is described by the Gamma-Gamma model. The signal quality is improved by using Optical Space-Time Block- Code (OSTBC) and then the BER will be reduced. Optical 2×2 Alamouti scheme required 14 dB bit energy to noise ratio (Eb/N0) at 10-5 bit error rate (BER) which gives 3.5 dB gain as compared to no diversity scheme. Th
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show More