أن التطور العلمي الحاصل فيما يخص المجال الرياضي أرسى آفاق جديدة لمواكبة التطور الكبير في مجا ل الألعاب والفعاليات الرياضية المختلفة ,و أن تحقيق النتائج الجيدة في فعاليات العاب القوى بشكل عام والثلاثية بشكل خاص في التدريب الرياضي يتطلب إتباع الأساليب العلمية الدقيقة والموضوعية بشكل سليم ومخطط له،فضلا عنة تطبيق نظريات ومنحى جديد لمواكبة الاتجاهات الحديثة في تحقيق النتائج الجيدة للوصول إلى المستويات العالية. تعد الوثبة الثلاثية احدى فعاليات العاب القوى التي يتأثر فيها الأداء بتطور القدرات الخاصة بالأداء ومنها (القوة المميزة بالسرعة،القوة الانفجارية والقوة الخاصة بالأداء ) والتي تشكل نوع القوة المطلوب تحقيقها أثناء أداء المراحل الفنية لهذه الفعالية. أن أكثر الأساليب السابقة في تدريب القوة للاعبات الوثبة الثلاثية يكون على اليابسة وظل هذا الأسلوب لفترات طويلة في العراق ،حيث تستخدم تدريبات الإثقال التي تعمل على تنمية القوة, وإذا زاد حجم العضلة نتيجة للتدريب فهذا يسمى تضخما"، وتضخم العضلة يتكون بصورة أوسع مع استخدام تدريبات القوة القصوى( ).وكذلك يطبق (طلحة حسام) هنالك العديد من تدريبات المقاومة على اليابسة باستخدام الإثقال الحرة وأجهزة المقاومة البنيومائية وأجهزة المقاومات المختلفة باستخدام أنواع الانقباضات العضلية المتحركة والثابتة
The purpose of this paper is to statistically classify and categorize Building Information Modelling (BIM)-Facility Management (FM) publications in order to extract useful information related to the adoption and use of BIM in FM.
This study employs a quantitative approach using science mapping techniques to examine BIM-FM publications using Web of Science (WOS) database for the period between 2000 and April 2018.
The findi
This study aims to study argumentation in political debates by figuring out the logical fallacies employed in the debates of Clinton and Trump, the presidential nominees of the 2016 elections, and Biden and Trump, the leading contenders in the 2020 United States presidential election. The study attempts to answer the questions: (1) What relevance fallacies are adopted in the debate between Trump and Clinton? (2) What rhetorical devices are used to influence the audience and gain voters besides fallacies in the debates selected? The study analyses two texts from two arguments using Damer's (2009) taxonomy of relevance fallacy and rhetorical devices based on Perrine’s (1969) model of communication and interpersonal rhetoric to answe
... Show MoreLet be an infinite dimensional separable complex Hilbert space and let , where is the Banach algebra of all bounded linear operators on . In this paper we prove the following results. If is a operator, then 1. is a hypercyclic operator if and only if D and for every hyperinvariant subspace of . 2. If is a pure, then is a countably hypercyclic operator if and only if and for every hyperinvariant subspace of . 3. has a bounded set with dense orbit if and only if for every hyperinvariant subspace of , .
Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.
Abstract
There has been a heated controversy over the role the financial policy plays and how sufficient it is in affording the financial burden. This burden is known as the operational current expenses which the governments of various countries mainly afford, despite the discrepancy in the government’s economic policy. After the deterioration and deficit in the state budget in all countries nowadays, it was necessary to find an appropri
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreAspect categorisation and its utmost importance in the eld of Aspectbased Sentiment Analysis (ABSA) has encouraged researchers to improve topic model performance for modelling the aspects into categories. In general, a majority of its current methods implement parametric models requiring a pre-determined number of topics beforehand. However, this is not e ciently undertaken with unannotated text data as they lack any class label. Therefore, the current work presented a novel non-parametric model drawing a number of topics based on the semantic association present between opinion-targets (i.e., aspects) and their respective expressed sentiments. The model incorporated the Semantic Association Rules (SAR) into the Hierarchical Dirichlet Proce
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication
... Show MoreThis paper interest to estimation the unknown parameters for generalized Rayleigh distribution model based on censored samples of singly type one . In this paper the probability density function for generalized Rayleigh is defined with its properties . The maximum likelihood estimator method is used to derive the point estimation for all unknown parameters based on iterative method , as Newton – Raphson method , then derive confidence interval estimation which based on Fisher information matrix . Finally , testing whether the current model ( GRD ) fits to a set of real data , then compute the survival function and hazard function for this real data.
Imaging by Ultrasound (US) is an accurate and useful modality for the assessment of gestational age (GA), estimation fetal weight, and monitoring the fetal growth during pregnancy, is a routine part of prenatal care, and that can greatly impact obstetric management. Estimation of GA is important in obstetric care, making appropriate management decisions requires accurate appraisal of GA. Accurate GA estimation may assist obstetricians in appropriately counseling women who are at risk of a preterm delivery about likely neonatal outcomes, and it is essential in the evaluation of the fetal growth and detection of intrauterine growth restriction. There are many formulas are used to estimate fetal GA in the world, but it's not specify fo
... Show More