أن التطور العلمي الحاصل فيما يخص المجال الرياضي أرسى آفاق جديدة لمواكبة التطور الكبير في مجا ل الألعاب والفعاليات الرياضية المختلفة ,و أن تحقيق النتائج الجيدة في فعاليات العاب القوى بشكل عام والثلاثية بشكل خاص في التدريب الرياضي يتطلب إتباع الأساليب العلمية الدقيقة والموضوعية بشكل سليم ومخطط له،فضلا عنة تطبيق نظريات ومنحى جديد لمواكبة الاتجاهات الحديثة في تحقيق النتائج الجيدة للوصول إلى المستويات العالية. تعد الوثبة الثلاثية احدى فعاليات العاب القوى التي يتأثر فيها الأداء بتطور القدرات الخاصة بالأداء ومنها (القوة المميزة بالسرعة،القوة الانفجارية والقوة الخاصة بالأداء ) والتي تشكل نوع القوة المطلوب تحقيقها أثناء أداء المراحل الفنية لهذه الفعالية. أن أكثر الأساليب السابقة في تدريب القوة للاعبات الوثبة الثلاثية يكون على اليابسة وظل هذا الأسلوب لفترات طويلة في العراق ،حيث تستخدم تدريبات الإثقال التي تعمل على تنمية القوة, وإذا زاد حجم العضلة نتيجة للتدريب فهذا يسمى تضخما"، وتضخم العضلة يتكون بصورة أوسع مع استخدام تدريبات القوة القصوى( ).وكذلك يطبق (طلحة حسام) هنالك العديد من تدريبات المقاومة على اليابسة باستخدام الإثقال الحرة وأجهزة المقاومة البنيومائية وأجهزة المقاومات المختلفة باستخدام أنواع الانقباضات العضلية المتحركة والثابتة
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreImproving speaking skills of Iraqi EFL students was the main purpose of the current research. Thirty EFL students were selected as the research participants for achieving this aim. All students completed the pretest and then spent the next 25 weeks meeting for 90 minutes each to present their nine lectures, answer difficult questions, and get feedback on their use of language in context. Progressive-tests, posttests and delayed post-tests followed every three courses. The researcher utilized SPSS 22 to anal Analyze the data descriptively and inferentially after doing an ANOVA on repeated measurements. It has been shown that using the ideas of sociocultural theory in the classroom has an important and positive impact on students of
... Show MoreRecent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T
... Show MoreIn this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreAbstract
Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h
... Show MoreSoils that cause effective damages to engineer structures (such as pavement and foundation) are called problematic or difficult soils (include collapsible soil, expansive soil, etc.). These damages occur due to poor or unfavorited engineering properties, such as low shear strength, high compressibility, high volume changes, etc. In the case of expansive soil, the problem of the shrink-swell phenomenon, when the soil reacts with water, is more pronounced. To overcome such problems, soils can be treated or stabilized with many stabilization ways (mechanical, chemical, etc.). Such ways can amend the unfavorited soil properties. In this review, the pozzolanic materials have been selected to be presented and discussed as chem
... Show MoreRobots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show MoreTo assess cultural competence among nursing students from nine countries to provide an international perspective on cultural competence.
A descriptive, cross‐sectional design.
A convenience sample of 2,163 nursing students from nine countries was surveyed using the Cultural Capacity Scale from April to November 2016.
The study found a moderate range of cultural competence among the students. The ability to teach and guide other nursing colleagues to displ
Standardized uptake values, often known as SUVs, are frequently utilized in the process of measuring 18F-fluorodeoxyglucose (FDG) uptake in malignancies . In this work, we investigated the relationships between a wide range of parameters and the standardized uptake values (SUV) found in the liver. Examinations with 18F-FDG PET/CT were performed on a total of 59 patients who were suffering from liver cancer. We determined the SUV in the liver of patients who had a normal BMI (between 18.5 and 24.9) and a high BMI (above 30) obese. After adjusting each SUV based on the results of the body mass index (BMI) and body surface area (BSA) calculations, which were determined for each patient based on their height and weight. Under a variety of dif
... Show More