This article investigates the relationship between foot angle and jump stability, focusing on minimizing injury risk. Here are the key points: Importance: Understanding foot angle is crucial for improving jump stability, athletic performance, and reducing jump-related injuries like ankle sprains. Ideal Foot Angle: Research suggests a forward foot angle of around 15 degrees might be ideal for many people during jumps. This angle distributes forces evenly across the foot, lowers the center of gravity, and provides more surface area for pushing off the ground. Factors Affecting Ideal Angle: The optimal angle can vary depending on the type of jump (vertical vs. long jump), fitness level, and personal preference. Incorrect Foot Angles: Landing with a foot angle that is too flat (0 degrees) or too forward (more than 15 degrees) can lead to concentrated forces on specific areas, increasing the risk of injuries like plantar fasciitis, Achilles tendonitis, and stress fractures. Recommendations: Maintain a forward foot angle of around 15 degrees during jumps for better stability and injury prevention. Consider consulting a healthcare professional or sports trainer for personalized advice on foot angle and jump mechanics. The article also explores findings from bird studies on foot advancement angle, but acknowledges these may not directly translate to humans. It emphasizes the importance of consulting professionals for personalized recommendations to optimize jump performance and minimize injury risk. and this achieves one of the sustainable development goals of the United Nations in Iraq which is (Good Health).
Abstract
The experiment has been carried out in the Syrian National Commission of Biotechnology, during the growing season 2018/2019, to study the effect of abiotic stresses (salinity and osmotic stresses) on the activity of some antioxidant enzymes and biochemical traits in Catharanthus roseus. The experiment has been laid according to (CRD) with three replications. The seeds have been sterilized by NaOCl solution (0.5% v/v), then planted on MS medium. Plantlets have been moved to MS medium enriched with NAA (1 mg.L-1) and BA (2 mg.L-1). The callus has been initiated from leaves using MS medium containing NAA (1 mg L-1) and KIN (2 mg.L-1). After 60 days, callus
... Show MoreSome metal ions (Mn+2, Co+2, Ni+2, Cu+2, Zn+2, Cd+2 and Hg+2) complexes of quinaldic acid (QuinH) and α-picoline (α-Pic) have been synthesized and characterized on the basis of their , FTIR, (U.V-Vis) spectroscopy, conductivity measurements, magnetic susceptibility and atomic absorption. From the results obtained the following general formula has suggested for the prepared complexes [M(Quin)2( α-Pic)2].XH2O where M+2 = (Mn, Co, Ni, Cu, Zn, Cd and Hg), X = 2, X = zero for (Co+2 and Hg+2) complexes, (Quin-) = quinaldate ion, (α-Pic) = α-picoline. The results showed that the deprotonated ligand (QuinH) by using (KOH) coordinated to metal ions as bidentate ligand through the oxygen atom of the carboxylate group (-COO-) and the nitrogen ato
... Show MoreOlmesartan medoxomil (OM) has low bioavailability and limited solubility. To enhance bioavailability, fast dissolving films (FDF) with mixed micelles of soluplus (SPL) and solutol HS15 (STL H15) were developed using solvent casting. The optimised formula, FM2, used polyvinyl alcohol (PVA) and showed high entrapment efficiency, rapid disintegration, and significant improvement in OM bioavailability compared to the market tablet (Olmetec®). FM2 also demonstrated stability and potential for enhanced drug delivery.
Relationship between thyroid dysfunction and periodontal disease has been mediated through an immune response. Cytokines are implicated in the initiation, consequences of immune response and a crucial role in the pathogenesis of thyroid disease, directly target thyroid follicular cells; and in the development and progression of periodontitis. This study aimed to detect cytokines levels which known to be associated with periodontitis in serum and saliva, to test the hypothesis that hypothyroidism influences the levels of biomarkers of periodontitis. Samples were collected from sixty patients with hypothyroid age ranged (20-64) years, thirty of patients were without periodontitis (group I) and 30 with periodontal disease (II); moreover, 30 su
... Show MoreThe necessity of addressing global economic prosperity has garnered significant attention from recent studies and policymakers. This article analyses the effects of the digital economy, business synergies, and trade policies on the economic prosperity of China and India. The study examines the impact of political support on the digital economy, business synergies, trade policies, and global economic prosperity in China and India. The study collects data from prominent economists in India and China using questionnaires. The article utilised the SPSS-AMOS software to analyse the relationship between variables. The results showed that the digital economy, business synergies, and trade policies are positively linked to global economic prosperit
... Show Moreجريت التجربة في اصص فخارية سعة كل اصيص 4 كغم تربة في البيت الزجاجي التابع لقسم علوم الحياة/كلية التربية ابن الهيثـــــــــم/جـامعــة بـغداد لموســم النمـو 2008-2009 لدراســة تأثيــر اربعـــة مستويـــــات من سمــــاد اليوريـــا وهي (0, 0.1, 0.2, 0.4) غم/اصيص والتي تعادل (0, 100, 200, 400) كغم/هكتار وثلاث مستويات من سماد السوبر فوسفات وهي (0, 0.1, 0.2) غم/اصيص والتي تعادل (0, 100, 200) كغم/هكتارفي مكونـات الحاصـــل لنبــات الحلبـــة Trigonella foe
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More