The importance of the research lies in preparing exercises using a proposed device to learn the skill of thehuman wheel on a machine rug of ground movements of the artistic gymnastics. As for the research problem:Through the presence of the two researchers as teachers and observers of this sport in the gymnastics hall,they noticed that there is difficulty in the students’ performance of the skill of the round off on the machineof the mat of ground movements, according to the researchers’ opinion, the reason for this is that skillsare taught with the limited availability of assistive devices, as well as the lack of use of these devices inexercises according to biomechanical variables, although they facilitate the learning process for these skillsand work to shorten the time and effort in the learning process and enable the removal of the difficultiesencountered before. As for the objectives of the research : Design and manufacture of a device that teachesthe skill of the round off and helps in overcoming the difficulty of performing that skill for female studentsand preparing exercises with a proposed device to learn the skill of the human wheel on the machine of theground movements mat in the artistic gymnastics of the students.
Human beings have an innate and natural aim to achieve their self-interests and to show their ability to overcome challenges in a better way, therefore the move towards self determination is expressed by intrinsic motivation. The desire of absorbing in this task is to enjoy the task in it self and benefitting from it such a motivation is the desire rooted in human nature to judge and choose in which individual is conscious in his self, abilities and adequacy that help him in control the different situations of life passed by him. His choices and actions are voluntary and non-restricted to intervention or external control because control is inner and subjective, while his behavior is self-regulated with the feeling of
... Show MoreSome methods recommended abroad to control the oriental hornet, Vespa orientalis L., attacking the honey bee, Apis mellifera L., colonies were tested, with some modifications, for the first time under the Iraqi conditions. One of these methods was carried out by covering the hive entrance with a piece of queen excluder to prevent the hornet from entering the hive. Also, the position of hive stand was reversed to deprive the hornet from using the flight board as a stage for waiting and creeping toward the defending bees. The second method was carried out by fixing a cardboard cone as a bee passage at the hive entrance to hinder the entry of the hornet into the hive. Both of these methods were found to be unsuccessful to
... Show MoreAllowing Iraqi companies to use multiple systems and policies leads to varying levels of disclosure and no high symmetry between report preparers and users, and that the adoption of integrated reporting can reduce information asymmetry. The theoretical side addressed the concepts of these variables, and in the practical side the binary variable (0, 1) was used. To compensate for the value of the independent variable (integrated reporting) based on the Central Bank of Iraq’s classification of banks according to the (CAMLES) index, and the dependent variable (information asymmetry) was measured through two measures (price difference, unusual return), the research community was represented by (5) Banks out of the total of banks li
... Show MoreModeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreThat researchers in the play Science Find a theatrical form of an experimental creative, and these experiences taken from the innovation space aesthetic dialogue with the receiver, especially since with previous theatrical experience and is an extension of her, because the interactive theater theatrical terms that assume a pattern do from the depth of the relationship between supply playwright and the audience, which alters the receiving skills actually change, and to monitor these differing divided into three classes that include research, methodological framework (Chapter I) and includes, research problem, the importance of research and the need to him, the goal of the research, the limits Find it border, and the theoretical framework
... Show Morethe digital public relations aim at make the workers getting the necessary information about the governmental institutions where they work and the enveronment surrounding them. it also tries to let the workers get the special knowlege of tthe publich relations and their jobs like the works of planning , arranging the active communication and executive skills needed in their writing , editing , special art skills for designing , production and technological skills to deal with the computer.
the problem of the research includes some questions as :
1- what are the uses achieved by degetal public relations workers at Iraqi universities (Baghdad, Mustansiriya, and Iraqi)
2- what are the tools used to apply digital public relations
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show More