The introduction and importance of the research included that physical education and its various activities are important for the disabled. The exercise of physical activities by the disabled effectively contributes to raising their level of fitness and reducing diseases caused by lack of movement. Disabled people often suffer from psychological and social problems, and this feeling may be accompanied by a high level of anxiety, a lack of self-esteem and a loss of self-confidence. Psychological adaptation is one of the concepts of sports psychology interconnected with the psychological climate, as the process that the player seeks to meet his demands and needs. Adaptation includes the pursuit of emotional balance between the individual player and the surrounding environment. Therefore, the importance of the research enables to identify the degree of both self-efficacy and psychological adjustment among disabled table tennis players, and to know the extent of the compatibility of the relationship betweenthem. The study aimed to prepare two scales, a measure of self-efficacy and a measure of psychological adjustment, and to identify the relationship of self-efficacy to psychological adjustment among handicapped table tennis players. As for theoretical studies, the researcher touched on topics related to self-efficacy, psychological adjustment, people with special needs, table tennis and similar studies.The researcher followed the field procedures using the descriptive approach in a survey method. The research community was identified from the table tennis players with disabilities in the hall, the training center of the Iraqi National Paralympic Committee / Ministry of Youth and Sports. The total number of (45) players and players distributed (5) for the exploratory experiment and (40) for the main experiment The two scales of self-efficacy and psychological adjustment were distributed on Saturday and Sunday on 28-29/12/202019 in order to find out the compatibility between them. The results were presented and analyzed, and the most important conclusions were reached: Self-efficacy and its relationship to psychological adjustment among table tennis players with special needs.
Background: Osteoporosis is a skeletal defect manifested by a reduction of bone strength as a result of reduced bone mass to the extent that there is a higher risk of fracture even on minor trauma. Hysterectomy in a premenopausal woman is a well known cause of ovarian failure resulting in an increased risk of osteoporosis.
Objective : To clarify bisphosphonate's preventive effect on osteopenia and osteoporosis in premenopausal women after hysterectomy.
Type of the study: Cross –sectional study.
Method: 84 premenopausal females post hysterectomy aged between 40 – 50 years, were enrolled in this randomized controlled double blinded trail a
... Show MoreThe research deals with A very important two subjects, computer aided process planning (CAPP) and Quality of product with its dimintions which identified by the producer organization, the goal of the research is to Highlight and know the role of the CAPP technology to improve quality of the product of (rotor) in the engines factory in the general company for electrical industries, The research depends case study style by the direct visits of researcher to the work location to apply the operational paths generated by specialized computer program designed by researcher, and research divides into four axes, the first regard to the general structure of the research, the second to the theoretical review, the t
... Show MoreCohesion is well known as the study of the relationships, whether grammatical and/or lexical, between the different elements of a particular text by the use of what are commonly called 'cohesive devices'. These devices bring connectivity and bind a text together. Besides, the nature and the amount of such cohesive devices usually affect the understanding of that text in the sense of making it easier to comprehend. The present study is intendedto examine the use of grammatical cohesive devicesin relation to narrative techniques. The story of Joseph from the Holy Quran has been selected to be examined by using Halliday and Hasan's Model of Cohesion (1976, 1989). The aim of the study is to comparatively examine to what extent the type
... Show MoreAbstract. Shatt Al-Arab River was the most important tide river in Iraq, it suffered from neglect and lack of maintenance in the past decades. The river embankment is constantly exposed to erosion processes due to several factors, one of the most important of these factors is the movement of water currents due to the tidal energy coming from the Arabian Gulf. In this study, one dimension unsteady-state model was implemented to study river flood capacity simulation by using HEC-RAS (5.0.7) software in Shatt Al Arab River and its tributaries. The data included flow rate, water level records were collected daily from 2018 to 2020 at different stations along the mentioned river and its feeders, additionally, the considered flood discharge data
... Show MoreInvestment in Human is one of the best and most important investments as it is renewed and developed resource over time in comparison with depleted material resources. Human resources is considered the part of the population that could be employed economically to contribute in increasing production energies as it is the support pillar of the society and have great energies that construct the society and raise of nations as well as he is distinguished with characteristics of ambitions to freedom.
Iraq is one of the countries that has large number of population in age of work and production and reduce in age dependent classes (children and old people).This dynamic in population led to step
... Show MoreThe main objective of this study is to characterize the main factors which may affect the behavior of segmental prestressed concrete beams comprised of multi segments. The 3-D finite element program ABAQUS was utilized. The experimental work was conducted on twelve simply supported segmental prestressed concrete beams divided into three groups depending on the precast segments number. They all had an identical total length of 3150mm, but each had different segment numbers (9, 7, and 5 segments), in other words, different segment lengths. To simulate the genuine fire disasters, nine beams were exposed to high-temperature flame for one hour, the selected temperatures were 300°C (572°F), 500°C (932°F) and 700°C (1292°F) as recomm
... Show MoreWe know that the experiments which conducted by latin square in one location or in one period (season), but there are many cases that need to conduct the same experiments in many locations or in many periods (seasons) to study the interaction between the treatments and locations or between the treatments and periods (seasons) .In this research we present an idea for conduct the experiment in several locations and in many period (seasons) by using LSD , it represent acontribution in the area of design and analysis of experiments ,we had written. we had written (theoretically) the general plans, the mathematical models for these experiments, and finding the derivations of EMS for each component (
... Show MoreBackground: Breast cancer is the most common
malignancy affecting females worldwide. The association
of Epstein-Barr virus (EBV) with this cancer is a longstanding
interest to this field.
Aim: to investigate the presence of EBV in breast tumor
tissue in relation to age.
Patients and Methods: Paraffin-embedded tissue blocks
from 45 female patients with breast tumors (ranged in age
from 28 to 85 years) were retrieved. The cases were
grouped into two categories: group (A): included 30 cases
with breast carcinoma and group (B): included 15 cases
with benign breast diseases as a control group .The
expression of EBV protein was examined
immunohistochemically.
Results: Twelve (40%) of the 30 breast canc
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More