Designing and Standardizing two tests for motor coordination timing for youth basketball players Research submitted by Prof. Faris sami & asst. prof. Wasan hanoon ali & asst. prof. Feras muttasher Baghdad University-College Of Physical Education and Sport Sciences Motor coordination in basketball is considered one of the most important factors for success in skill performance accuracy and speed due to the defensive and offensive situations of the game. The problem of the research lies in the lack of tests that can specify the growth of motor coordination through which the relative change for a number of players can be noticed due to practice and training. The subjects of the research were (30) young league players of National Center for gifted in sports 2015-2016 U16. They were selected deliberately because it came first in the national league. A data base was founded for 100 players to come up with the results that were treated statistically. The researchers concluded designing and standardizing two tests for motor coordination procedures for young players under 16, motor coordination tests were applied for the first time in Iraq for youth basketball players, and specifying reference norms for motor coordination tests.
In this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.
Freedom of opinion is one of the freedoms that constitutions and laws have guaranteed to protect and is exercised through the media. However, this freedom must be exercised within certain limits, which include respecting a person’s right to preserve his privacy, image and reputation. Just as the media has the freedom to exercise its right to publish and express its opinion with complete frankness, it is in return obligated to respect the rights of others and avoid defaming them and violating their privacy. If the media does this, the injured party has the right to demand compensation for the damage he has suffered as a result.
The present work describes guggul as a novel carrier for some anti-inflammatory drugs. Guggulusomes containing different concentration of guggul with aceclofenac were prepared by sonication method and characterized for vesicle shape, size, size-distribution, pH, viscosity, spread ability, homogeneity, and accelerated stability in-vitro drug permeation through mouse skin. The vesicles exhibited an entrapment efficiency of 93.2 ± 12%, vesicle size of 0.769 ± 3μm and a zeta potential of - 6.21mV. In vitro drug release was analyzed using Franz’s diffusion cells. The cumulative release of the guggulusomes gel (G2) was 75.8% in 18 hrs, which is greater than that all the gel formulation. The stability profile of prepare
... Show MoreThe Multiple Signal Classification (MUSIC) algorithm is the most popular algorithm to estimate the Angle of Arrival (AOA) of the received signals. The analysis of this algorithm (MUSIC) with typical array antenna element ( ) shows that there are two false direction indication in the plan
aligned with the axis of the array. In this paper a suggested modification on array system is proposed by using two perpendiculars crossed dipole array antenna in spite of one array antenna. The suggested modification does not affect the AOA estimation algorithm. The simulation and results shows that the proposed solution overcomes the MUSIC problem without any effect on the performance of the system.
Fading channel modeling is generally defined as the variation of the attenuation of a signal with various variables. Time, geographical position, and radio frequency which is included. Fading is often modeled as a random process. Thus, a fading channel is a communication channel that experiences fading. In this paper, the proposed system presents a new design and simulate a wireless channel using Rayleigh channels. Rayleigh channels using two approaches (flat and frequency-selective fading channels) in order to calculate some path space loss efforts and analysis the performance of different wireless fading channel modeling. The results show that the bite error rate (BER) performance is dramatically improved in the value of signal to
... Show MoreCopper nanoparticles (CuNPs) were prepared with different diameters by sonoelectrodeposition technique using Electrodeposition process coupled with high-power ultrasound horn (Sonoelectrodeposition). The particle diameter of the CuNPs was adjusted by varying CuSO4 solution acidity (pH) and current density. The morphology and structure of the CuNPs were examined by X-ray diffraction (XRD) and Scanning Electron Microscopy (SEM). It was found that the size of the produced copper nanoparticles ranged between 22 to 77 nm, where the diameter of CuNPs increases with reduction the solution acidity from 0.5 to 1.5 pH and increasing the current density of the deposition from 100 to 400 nm. Finally the produced CuNPs were pressed to fabricate disc
... Show MoreSurvivin, a member of inhibitor of apoptosis family is increasingly used as a target for cancer therapy design because it has a key role in cell growth and inhibition of cell apoptosis. Also it can be used as a biomarker for targeting cancer because it is found in almost all cancer but not normal cells. Our strategy was to design (computationally) a molecule to be used as survivin inhibitor. This molecule was named lead10 and was used furthermore to find (virtually) existing drugs with a good survivin inhibition activity.
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More
