Basketball is a popular game in many parts of the world and many developed countries are making continuous efforts to prepare and develop their emerging players on scientific and clear bases as the basis for reaching high levels The researchers used the descriptive approach in the method of correlative studies to suit the nature of the study The readymade software (IBM SPSS Statistics Version24) was used to perform statistical treatments The researchers concluded that there was a significant relationship between body size indicators (height and weight) with the fitness elements of the emerging basketball players The researchers recommended conducting a similar study to determine the type of relationship to the indicators of the physical str
... Show MoreBacterial strains were isolated from oil-contaminated soil, in 2018, these isolates were identified, and with the aim of finding out the ability of these isolates to degrede the oil compounds, the color change of medium which added to it isolates was read by the method of Pacto Bushnell Hans. Then the change in the petroleum compounds was read by gas chromatography, for the most effective isolates.
The nine isolated bacterial showed different degrees of color change, and the isolates (Pseudomonas, Bacillus, Micrococcus) outperformed the color change amount (78, 78, 77) %, respectively, compared to the control, and the three isolates together showed the best color change of 90.7. % Compared to the control, and the
... Show MoreMixed ligands of 2-benzoyl Thiobenzimiazole (L1) with 1,10-phenanthroline (L2) complexes of Cr(III) , Ni(II) and Cu(II) ions were prepared. The ligand and the complexes were isolated and characterized in solid state by using FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR, flame atomic absorption, elemental micro analysis C.H.N.S, magnetic susceptibility , melting points and conductivity measurements. 2-Benzoyl thiobenzimiazole behaves as bidenetate through oxygen atom of carbonyl group and nitrogen atom of imine group. From the analyses Octahedral geometry was suggested for all prepared complexes. A theoretical treatment of ligands and their metal complexes in gas phase were studied using HyperChem-8 program, moreover, ligands in gas phase
... Show MoreThis paper is interested in certain subclasses of univalent and bi-univalent functions concerning to shell- like curves connected with k-Fibonacci numbers involving modified Sigmoid activation function θ(t)=2/(1+e^(-t) ) ,t ≥0 in unit disk |z|<1 . For estimating of the initial coefficients |c_2 | , |c_3 |, Fekete-Szego ̈ inequality and the second Hankel determinant have been investigated for the functions in our classes.
Nowadays nanoparticles have widespread application in various industriesbecause of their special and unique features, there are many studies in sideeffects of nanomaterial. This study done by 40 white female mice withevery other day intraperitoneally injection of low and high doses of both ofZnO kg of body weight) and FeOnanoparticles (5 and 40 mg/kg). After a 15 days period, the mice weresacrificed and blood samples were collected for hormone analysis, andtissue samples for morphometric studies.Statistical Analysis shows significant differences in LH, Estrogen,Progesterone hormone levels between groups, while there are insignificantdifferences in Follicle stimulating hormone (FSH) level between thegroups compared with its level in
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThis paper deals with constructing mixed probability distribution from mixing exponential
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the