أن التطور العلمي الحاصل فيما يخص المجال الرياضي أرسى آفاق جديدة لمواكبة التطور الكبير في مجا ل الألعاب والفعاليات الرياضية المختلفة ,و أن تحقيق النتائج الجيدة في فعاليات العاب القوى بشكل عام والثلاثية بشكل خاص في التدريب الرياضي يتطلب إتباع الأساليب العلمية الدقيقة والموضوعية بشكل سليم ومخطط له،فضلا عنة تطبيق نظريات ومنحى جديد لمواكبة الاتجاهات الحديثة في تحقيق النتائج الجيدة للوصول إلى المستويات العالية. تعد الوثبة الثلاثية احدى فعاليات العاب القوى التي يتأثر فيها الأداء بتطور القدرات الخاصة بالأداء ومنها (القوة المميزة بالسرعة،القوة الانفجارية والقوة الخاصة بالأداء ) والتي تشكل نوع القوة المطلوب تحقيقها أثناء أداء المراحل الفنية لهذه الفعالية. أن أكثر الأساليب السابقة في تدريب القوة للاعبات الوثبة الثلاثية يكون على اليابسة وظل هذا الأسلوب لفترات طويلة في العراق ،حيث تستخدم تدريبات الإثقال التي تعمل على تنمية القوة, وإذا زاد حجم العضلة نتيجة للتدريب فهذا يسمى تضخما"، وتضخم العضلة يتكون بصورة أوسع مع استخدام تدريبات القوة القصوى( ).وكذلك يطبق (طلحة حسام) هنالك العديد من تدريبات المقاومة على اليابسة باستخدام الإثقال الحرة وأجهزة المقاومة البنيومائية وأجهزة المقاومات المختلفة باستخدام أنواع الانقباضات العضلية المتحركة والثابتة
This paper presents a research for magnetohydrodynamic (MHD) flow of an incompressible generalized Burgers’ fluid including by an accelerating plate and flowing under the action of pressure gradient. Where the no – slip assumption between the wall and the fluid is no longer valid. The fractional calculus approach is introduced to establish the constitutive relationship of the generalized Burgers’ fluid. By using the discrete Laplace transform of the sequential fractional derivatives, a closed form solutions for the velocity and shear stress are obtained in terms of Fox H- function for the following two problems: (i) flow due to a constant pressure gradient, and (ii) flow due to due to a sinusoidal pressure gradient. The solutions for
... Show MoreThe growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi
... Show More<p>Recently, reconfigurable intelligent surfaces have an increasing role to enhance the coverage and quality of mobile networks especially when the received signal level is very weak because of obstacles and random fluctuation. This motivates the researchers to add more contributions to the fields of reconfigurable intelligent surfaces (RIS) in wireless communications. A substantial issue in reconfigurable intelligent surfaces is the huge overhead for channel state information estimation which limits the system’s performance, oppressively. In this work, a newly proposed method is to estimate the angle of arrival and path loss at the RIS side and then send short information to the base station rather than huge overhe
... Show MoreABSTRACT
Background : The aim of this work is to assess the role of breast sonography and ductography in the evaluation of different causes of nipple discharge.
Methods : The study will be carried out on twenty-five female patients referred to the Radiodiagnosis department at Alexandria Main University Hospital presenting with nipple discharge.
They were divided into two groups:
Group I include 10 patients (40%) with surgically significant nipple discharge who were the patients with unilateral, uniorificial surgically significant colour type nipple discharge .They were investigated by mammography, sonography, and ductography.
Group II include 15 patients
... Show MoreSystemic lupus erythematosus (SLE) is an autoimmune disease with polymorphic expression. B cells have an essential contribution in immune system activation via the production of different cytokines and functioning as potent antigen-presenting cells. Therefore, a drug that particularly targets B cells may represent an ideal therapeutic approach for SLE. Rituximab (RTX), an anti-CD20 monoclonal antibody causing transient B-cell depletion, has been used to manage SLE. This study aims to assess Rituximab effects on lupus nephritis (LN) patients when added to conventional immunosuppressants. Twenty four patients, 15-32 years old, with class III/IV/V LN were involved in this study. All were on steroids before lupus nephritis occurrence. They were
... Show MoreSystemic lupus erythematosus (SLE) is an autoimmune disease with polymorphic expression. B cells have an essential contribution in immune system activation via the production of different cytokines and functioning as potent antigen-presenting cells. Therefore, a drug that particularly targets B cells may represent an ideal therapeutic approach for SLE. Rituximab (RTX), an anti-CD20 monoclonal antibody causing transient B-cell depletion, has been used to manage SLE. This study aims to assess Rituximab effects on lupus nephritis (LN) patients when added to conventional immunosuppressants. Twenty four patients, 15-32 years old, with class III/IV/V LN were involved in this study. All were on steroids before lupus nephritis occurrence. They were
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More