This research aims to prepare exercises of varying resistances and muscular work exchange for 200m freestyle swimmers, in addition to these exercises’ effects on physical adequacy and the time needed to complete this distance. The experimental method is the basis for the design of the experimental group and the control group of a 100% intentionally chosen sample from a community of elite-youth swimmers of 200m freestyle swimming for the sport season of 2020-2021 at the Police Sports Club. The sample consists of 15 swimmers that were divided, randomly, into two groups; 7 of them in the experimental group while 8 were in the control group. Physical adequacy was calculated with the use of swimmers’ mechanical energy measurements while they were on the treadmill. This was done to measure the kinetic energy by fixing the potential energy and in order to measure the kinetic energy from the calories measurements by linking the Fitmate Pro device’ system. The following equation was applied: physical adequacy = mechanical energy\kinetic energy. Exercises’ preparation relies on resistance’ quantity graduation and diversification in every instrument within these exercises. This was achieved by two methods of periodic, intensity elevated, and repetitive training with the addition of applying this procedure for 10 consecutive-training weeks at the rate of 3 units each off day within the same-training week. In each training unit, there were 4 quick movement exercises. After the previously mentioned was done, the data was processed by the use of the SPSS program in order for the conclusions and applications of this research to demonstrate the helpful quality of these exercises, of varying resistances and muscular work exchange, in the development of the level of physical adequacy and the improvement of the period needed to complete the 200m distance for the elite-youth swimmers. It is of the utmost importance to support the knowledge of coaches on how to utilize the laws of physics to help them affect the energy-producing chemical processes in swimmers. Furthermore, it is vital to account for the muscular contractions and their direction, in swimmers, whenever the employment of resistances is involved. This enables swimmers to overcome the circumstances of the race at maximum speed; avoiding negative side effects, when the quantity of these resistances rises, on the decrease of the speed of completion.
The letters are exposed in some texts of the classical Arabic language (poetry or prose), or in some of the Qur’anic texts, which are the main sources that were adopted on the day when provisions, rules and linguistic controls were established. I say that some of these letters are exposed in some contexts to deletion, mention, or change in the structure and shape of the letter. As for the omission, it is one of the aspects that distinguished Arabic, as well as other languages, for many purposes that differ among their user.
This paper was conducted to identifying the body growth averages for the infants of the age (3-6) months and their relation with brest (natural ) or artificial feeding The results showed that the higher percentage was for the infants with the natural feeding in comparison with those of the artificial or mixed feeding. Also there was a clear increase in the average of the body growth for those with the natural feeding and such results were closer to the standard criterion. While the averages of body growth for those with the artificial or mixed feeding were low. In addition, it was clear that the averages of body growth of the i
... Show MoreThe aim of the current research is to identify the impact of the SWOT strategy on developing systemic intelligence among students of the Ibn Rushd College of Education for Human Sciences University of Baghdad / College of Education Ibn Rushd for Human Sciences. The current research community consists of (8590) male and female students, divided into (7) departments. The current research relied on one of the partial control designs, which is the design of non-random groups: experimental group and a control group with a pre and post-test. As for the research tool, It was represented by Tourmanin’s Systemic Intelligence Scale (2012) of (50) items that measure the eight components of systemic intelligence. The results of the Mann Whitney te
... Show MoreIn this research, we studied the effect of concentration carriers on the efficiency of the N749-TiO2 heterogeneous solar cell based on quantum electron transfer theory using a donor-acceptor scenario. The photoelectric properties of the N749-TiO2 interfaces in dye sensitized solar cells DSSCs are calculated using the J-V curves. For the (CH3)3COH solvent, the N749-TiO2 heterogeneous solar cell shows that the concentration carrier together with the strength coupling are the main factors affecting the current density, fill factor and efficiency. The current density and current increase as the concentration increases and the
The weight of larvae virgins and Alcamlat for males more than the weight of females of the roles themselves that the highest rate of loss in weight of larvae developed to virgins when field conditions were (21.5,22,21.3) mg during June and July and August respectively, recorded the highest degrees of heat and less attributed to moisture
The research aims to
1 – The discloser of the level of moral values in the children of kindergarten.
2 - Building an educational program designed to develop moral values on the children of kindergarten.
3 - Knowing the impact of the program in the development of moral values in children
Purposive sample was selected consisted of 40 children and a child aged 5-6 years and to achieve objectives of the research promising measure of the moral values kindergarten has been applied to the children of the two groups was based on pre and post test
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More