The research aim to the usage educational method for jump shooting and it effect on speed strength in basketball for the specialist students in College Sport of Dayla University, which used the following statistic treatment (The T.test for compatible specimens), so after statistic treatment which appears theres a tow moral differences in speed strength and jump shooting tests results to (legs & arms) for the before and after tests, and after that the conclusions we positive and the second the special drills effect immaterial speed strength to legs and arms, so the tow researches recommended to looking after the best for educational methods that used in our sport colleges in Iraq.
The current study aims to determine the extent of SOMO's interest in strategic alignment operations and whether this interest is sufficient to be reflected in enhancing its organizational reputation. The field of research was in the oil marketing company SOMO. The managers in the top management within this company were targeted and the questionnaire was used as a data collection tool. The study population (109), (105) questionnaires were distributed, (94) questionnaires and (11) questionnaires were not retrieved, and the valid questionnaires had reached (91) and the analytical and descriptive approach was used for the study, the current research found to find A direct relationship and a positive effect of strategic
... Show Moreهدف ال الأسلوب المعرفيّ م الإد ا ركيّ اضة للبنات، والتعرّف على علاقة التنظ ة وعلوم الر ة البدنّ ة التر لّ ة في ات المرحلة الثانّ طال إنّه احثتان اضة للبنات، وأفترضت ال ة وعلوم الر ة البدنّ ة التر ل ة في ات المرحلة الثان عض طال التأمّليّ الاندفاعيّ لدى اس الأسلوب المعرفيّ التأمّليّ الاندفاعيّ لدى عیّنة م الإد ا ركيّ ونتائج مق اس التنظ ة بین نتائج مق
... Show MoreThe study aims to introduce at the difficulties in which delay the using of the internet In the educational process – learning , Study was conducted on a sample of students in the College of Education for Girls and the effects of variables : possession of computer , availability of the internet service , and the level of parents on these difficulties , Used for this purpose, a total sample size (400) students, distributed Departments . Results showed that the most important difficulties in which delay using of internet were : Lack of knowledge of internet availability , Lack of knowledge of the aim of using this service , and the students satisfaction that the disadvantages is more than the advantages of
... Show MoreCultured fruits of theCorundum Coriandrum sativum were sown On 11/11 / 2008 in basins containing 15 kg of soil (Silty Loam) .Fruits were divided into two parts the first was soaked in normanl water and the second was magnetized for a period of 24 hours Irrigation was up to (75% of capacity field.Two types of water (normal water and magnetized water)with three repetitions were used the access to magnetic water was supplied from a special electric device. Recorded measurements were plant height the number of stems / plant, weight of plant, number of flowers, 1000 seed weight) during the cultivation period, which ended on 11/5/2009. Results indicated the absence of any effect of magnetic water on plant growth of Fenugreek while seeds tre
... Show MoreTheresearch took the spatial autoregressive model: SAR and spatial error model: SEM in an attempt to provide a practical evident that proves the importance of spatial analysis, with a particular focus on the importance of using regression models spatial andthat includes all of them spatial dependence, which we can test its presence or not by using Moran test. While ignoring this dependency may lead to the loss of important information about the phenomenon under research is reflected in the end on the strength of the statistical estimation power, as these models are the link between the usual regression models with time-series models. Spatial analysis had
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreIn this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreThis paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.