The job that confronts players with the effectiveness of shooting with an air rifle is high, so it requires necessary functional adaptations that differ in their degrees from other sports. Regular training in air rifle shooting leads to physiological changes in most of the body's internal systems, and changes and responses can be identified. The functional accompanying physical activity through the presence of body components that reflect these physiological changes in the form of changes in some components, and the importance of research lies in studying the physiological changes accompanying the maximum physical effort and the consequent development of the level of achievement in the effectiveness of shooting with air rifle and body
... Show MoreSTAG3 is the meiotic component of cohesin and a member of the Cancer Testis Antigen (CTA) family. This gene has been found to be overexpressed in many types of cancer, and recently, its variants have been implicated in other disorders and many human diseases. Therefore, this study aimed to analyze the major variants of STAG3. Western blot (WB) and immunoprecipitation (IP) assays were performed using two different anti-STAG3 antibodies that targeted the relevant protein in MCF-7, T-47D, MDA-MB-468, and MDA-MB-231 breast cancer cells with Jurkat and MCF-10A cells as positive and negative controls, respectively. In silico analyses were searched to study the major isoforms. WB and IP assays revealed two abundant polypeptides < 191 kDa and
... Show MoreThis study focusses on the effect of using ICA transform on the classification accuracy of satellite images using the maximum likelihood classifier. The study area represents an agricultural area north of the capital Baghdad - Iraq, as it was captured by the Landsat 8 satellite on 12 January 2021, where the bands of the OLI sensor were used. A field visit was made to a variety of classes that represent the landcover of the study area and the geographical location of these classes was recorded. Gaussian, Kurtosis, and LogCosh kernels were used to perform the ICA transform of the OLI Landsat 8 image. Different training sets were made for each of the ICA and Landsat 8 images separately that used in the classification phase, and used to calcula
... Show MoreThe stanza in the sonnet has been defined as a set of poetic lines followed after proem
and be the same meter as that of proem in complete stanza, but in rhyme scheme different
from that meter. The couplet is defined as set of poetic lines that followed the stanza and be as
the same meter as that of stanza, but with different rhyme scheme. This definition is approved
by all specialized in field of Andalus literature and it was also proven to them that this
construction emptied of indications. This meter has endeavored to prove that that there were a
difference in denotation for meaning between the stanza and couplet. Thus, the sonneteers
have outweighed the sonnet of the blind "Tutaili" to their sonnets as they felt
There are significant differences between the pre and post-tests in favor of the post-test in the tests) stroke volume (S.V), cardiac thrust (C.O.P), left ventricular volume, maximum oxygen consumption Vo2max), which indicates the effect of the proposed training approach.There are significant differences between the pre and post-tests in favor of the post-test in the achievement level test with air rifle shooting for young female shooters, which indicates the effect of the proposed training curriculum.There are no significant differences between the pre and post-tests in the tests (heart rate (HR) before exercise, heart rate (HR) after exercise, systolic blood pressure rate before exercise, systolic blood pressure rate after exercis
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More