The main objective of this paper is to designed algorithms and implemented in the construction of the main program designated for the determination the tenser product of representation for the special linear group.
The research problem focused through the researcher's experience in the gymnastics game and the lack of use of educational models that give the student an important role in the educational process, so it became necessary to identify the type of prevailing style for students, and the need for diversity in the use of educational models based on scientific theories, including the Daniel Document model. Based on three theories of learning, which are structural, behavioral, and meaningful learning. The research aimed to identify the effect of using the Daniel model for people with two types of brain control (left and right) to learn the skill of the Cartwheel in artistic gymnastics for students of the second stage. The researcher used the experi
... Show MoreTo study the site of placentae and the umbilical artery blood flow of different age groupsand relate that to the newborn baby and the mother. 117 placentae samples were investigatedusing ultrasound and 30 placentae samples were studied using Doppler ultrasound during theperiod from August 2007 to August 2008 for full term placentae of mothers aged 15- > 45 yearsold. By ultrasound; there was detection of good pe rcentage of the placental site to be on theposterior wall of the uterus in case of male babies, while it was anterior in case of female babiesand it was previa and fundal in females more than in the males. The Doppler ultrasound revealedthat the mother in any age group can conceive and have a healthy placenta because the readings ina
... Show MoreUntil The Second Half Of Nineteenth Century , Psychology Depended On Philosophy In Its Experiences Which Means It Depend On Individuals Feelings Toward Psychological Experiences And Rapid Observation . As For The Scientific Organized Experimentation And Observation By Machines Have Been Used Later .
The Experimentation Looking For The Cause Of Phenomena And How Is That Happened Also Reveal The Causal Relationship Between Among Phenomena . The Experiences In Psychology Field Include In Its Simplest Form Only One Variable ( Effective) Which Is Called Independent Variable As Well As Another Variable ( Affected ) That Called Dependent Variable .
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreIn this paper, we used four classification methods to classify objects and compareamong these methods, these are K Nearest Neighbor's (KNN), Stochastic Gradient Descentlearning (SGD), Logistic Regression Algorithm(LR), and Multi-Layer Perceptron (MLP). Weused MCOCO dataset for classification and detection the objects, these dataset image wererandomly divided into training and testing datasets at a ratio of 7:3, respectively. In randomlyselect training and testing dataset images, converted the color images to the gray level, thenenhancement these gray images using the histogram equalization method, resize (20 x 20) fordataset image. Principal component analysis (PCA) was used for feature extraction, andfinally apply four classification metho
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreThe study aimed at ideutifying the impact of scieutific skills in strategy and liabits of mind amony stueuts in tenth grade . The study demanded to choose a sampie that coutaiun (42) student of the fourth grade of the secondary school who were dirided into tow groups , the first is experimental studied according to scieutific skill strategy , and the other controlling , studied according to the usualway . An achievement test has been taken that adopted staudard for mind skills as research tools that are applid after ascertaining sincerity proved at the end of the experiment .The study has reached to the conclusion that there are statistically significant differnces in farour of the experiment group in both
... Show MoreAA wahid, journal mustansiriyah of sports science, 2023