The purpose of this paper is to identifying the values of some physical and Bio- Kinematic variables during the performance of the jump spike serve skill, and identifying the effect of the proposed training program using intermittent training to develop some physical and Bio- Kinematic variables and accuracy of the jump spike serve skill among the research sample. The experimental method was used and the research was conducted on a deliberately chosen sample of the players of the Army Club, who were primarily advanced in volleyball, and the number of the sample was (10) players. The conclusions were reached that the proposed training program using intermittent training has a positive effect on some of the physical and Bio- Kinematic variables of the advanced volleyball players and that this program has made an improvement in accuracy of the skill, Therefore some recommendations were given, including the use of the intermittent training program to develop some physical and Bio- Kinematic variables because of its positive impact on volleyball players, and the use of intermittent training activities mainly in the special preparation period and the transitional period because of its importance in improving the physical and skill condition of volleyball players Providing sports equipment and tools used in intermittent training in sports clubs to serve the training process for volleyball players.
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThe behaviour of Np-239 during the Continuous extraction and stripping was followed . Three Continuous extraction experiments were carried out . In the first experiment the extraction and stripping were carried out by using Tributyl Phosphate / treated odorless kerosene as the organic phase , while the aqueous phase was uranium and neptunium-239 dissolved in 3M HNO3 . In the second experiment irradiation of organic phase up to 30 M rad were carried out , while keeping the aqueous phase as it is in the first experiment. In the third experiment , the acidity of the aqueous phase was 1.5M instead of 3M and keeping the organic phase as it is in experiment 1. The results obtained in tables 1-3 show the possibility of
... Show MoreThe influence of pre- shot peening and welding parameters on mechanical and metallurgical properties of dissimilar and similar aluminum alloys AA2024-T3 and AA6061-T6 joints using friction stir welding have been studied. In this work, numbers of plates were equipped from sheet alloys in dimensions (150*50*6) mm then some of them were exposed to shot peening process before friction stir welding using steel ball having diameter 1.25 mm for period of 15 minutes. FSW joints were manufactured from plates at three welding speeds (28, 40, 56 mm/min) and welding speed 40mm/min was chosen at a rotating speed of 1400 rpm for welding the dissimilar pre- shot plates. Tow joints were made at rotational speed of 1000 rpm and welding speed of 40m/min f
... Show MoreThe effects of Internet use on university’s students:The effects of Internet use on university’s students:“A Study on a Sample of Jordanian University’s students "This survey aims to identify the most important effects of Internet use on Jordanian public and private universities’ students by monitoring and analyzing a set of indicators that show the quality of the effects on specific fields such as cultural, social, psychological, moral and political effects .To achieve these goals, the study attempts to answer the following questions:1. What are the effects of Internet’s use on students?2. What is the relationship between the effects and demographic variables such as gender, age, family size an
... Show MoreThis study aims to explain the purposes of thinking in light of the Holy Qur’an. The study adopted the deductive method by analyzing the meanings of the eighteen thinking verses mentioned in the Holy Qur’an That is by referring to the ancient and contemporary book interpretations and inferring the purposes of thinking from the context of those verses. The study concluded that there are seven main purposes, for thinking in the light of the Holy Qur’an, are understanding the universal regulations, contemplating the social codes, inferring, extracting maxims and meanings from the Qur’anic proverbs, analyzing the situation objectively, balancing between interests and evils, and freeing the mind from the authority of the paranormal. T
... Show MoreText science presented a set of criteria to make the text essentially a project to create
texts and use. Me and means of cohesion script text scientists, two standard foundries and
knitting. Find this means their equivalent in the Arab rhetorical Heritage has been found, it
means foundries find Accompanying represented (link grammar in the classroom and link),
and referrals represented by (Baldmair, Ldefinition, and the name of the signal), and
deletion, and repetition, and presentation delays. As in the standard knitting it has confirmed
Albulagjun Arabs on the semantic consistency between the text components, as reflected in
the moral link in Chapter interfaces, as well as in moral coherence between parts of the te
In this paper , some of lexical stylistic , syntactical stylistic devices , and one phonetic stylistic device are going to be illustrated in the study of the aphorisms of “life and death” . These stylistic devices are parallelism , hyperbole , alliteration , meiosis , irony , oxymoron , cliché , litotes , metalepsis , and loose sentences. This paper aims at identifying the functions and the frequencies of these devices. These stylistic devices make one speech and writing more interesting and help to get the attention of readers/ listeners
Our research was launched in the study of the sustainable conflict of globalization and the rebalancing of the great powers that have made life on the earth unstable and insecure over the past and present eras, the purpose of which is to pay attention to the waste and instability that human societies are exposed to in different proportions between abstract right and continuous deviation.
The purpose of the study is to show the loss, waste and backwardness in managing and governing societies towards private interests, away from the standards of good institutional governance.
The study’s design was based on two demands, the first on the nature and eternity of
... Show MoreData Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show More