The purpose of this paper is to identify environmental awareness under the Corona pandemic among students of the Faculty of Physical Education and Sports Sciences at the University of Kufa. and comparison of environmental awareness under the Corona pandemic between students of the Faculty of Physical Education and Sports Sciences at the University of Kufa. The two researchers used the descriptive approach in the style of the survey and comparisons to identify the research community in the students of the College of Physical Education and Sports Sciences at the University of Kufa for the academic year 2020-2021, who numbered (210) students, then a sample of (80) students was chosen randomly, with a percentage of (38.09%) from the research community, with (20) students from each stage, and (10) students for the exploratory experiment at a rate of (9.52%) from the research community, then the two researchers chose And the application of the environmental awareness scale, which consists of (32) items on the research sample, and the results were extracted and the appropriate statistical treatments were used to reach the results. Then the results were presented, analyzed and discussed. The two researchers reached the most important conclusions: Students of the College of Physical Education and Sports Science have a varying level of environmental awareness. And there are real differences among students of the Faculty of Physical Education and Sports Sciences in environmental awareness and in favor of the fourth stage. Based on the findings of the research, the researchers recommend the most important recommendations: Take advantage of the environmental awareness scale that the two researchers used and applied to detect environmental awareness. And Using other psychological variables to know the psychological states of students and players in order to take into consideration how to give directions and instructions to them.
Praise be to God, and may blessings and peace be upon our master and Prophet Muhammad and those who follow him, and may God be pleased with him
Taha is my guardian and whoever follows their path until the Day of Judgment. And after... The book (The Treasure in the Ten Recitations), written by Abu Muhammad Abdullah bin Abd al-Wasiti, who died in the year 710 AH, is considered one of the important books in recitations: because it included the universal custom that it contained in the books Al-Taysir by Al-Dani and Al-Irshad by Al-Falanisi, as the first of them was specialized.
Satisfy the second with the ten readings
May God bless my time, through His grace and generosity, to achieve this treasure and to publish it
... Show MoreIn this paper, a design of the broadband thin metamaterial absorber (MMA) is presented. Compared with the previously reported metamaterial absorbers, the proposed structure provides a wide bandwidth with a compatible overall size. The designed absorber consists of a combination of octagon disk and split octagon resonator to provide a wide bandwidth over the Ku and K bands' frequency range. Cheap FR-4 material is chosen to be a substate of the proposed absorber with 1.6 thicknesses and 6.5×6.5 overall unit cell size. CST Studio Suite was used for the simulation of the proposed absorber. The proposed absorber provides a wide absorption bandwidth of 14.4 GHz over a frequency range of 12.8-27.5 GHz with more than %90 absorp
... Show MoreThe goal of this research is to use optical emission spectroscopy to investigate the parameters of exploding silver wire plasma. The silver discharge plasma's emission spectra were recorded and studied. For silver wire of diameter 0.4 mm and different currents 75,100, and 125A in deionized water, the plasma electron temperature ( ) was calculated by Boltzmann plot and container plasma medium temperature by thermal camera, and the electron density ( ) was computed by Stark broadening using the hydrogen (H line) at 656.279 nm With increasing current from 75 to 125 A, the electron density (ne) increased from 3.160× to 8.762× , while electron temperatures increased from 0.571 to 1.334 eV under the same conditions.
... Show MoreSteady natural and mixed convection flow in a square vented enclosure filled with water-saturated aluminum metal foam is numerically investigated. The left vertical wall is kept at constant temperature and the remaining walls are thermally insulated. Forced convection is imposed by providing an inlet at cavity bottom surface, and a vent at the top surface. Natural convection takes place due to the temperature difference inside the enclosure. Darcy-Brinkman-Forchheimer model for fluid flow and the two-equation of the local thermal non-equilibrium model for heat flow was adopted to describe the flow characteristics within the porous cavity. Numerical results are obtained for a wide range of width of the inlet as a fraction
... Show MoreThe unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More