The research aims to identify the impact of using the electronic participatory learning strategy according to internet programs in learning some basic basketball skills for middle first graders according to the curricular course, and the sample of research was selected in the deliberate way of students The first stage of intermediate school.As for the problem of research, the researchers said that there is a weakness in the levels of school students in terms of teaching basketball skills, which prompted the researchers to create appropriate solutions by using a participatory learning strategy.The researchers imposed statistically significant differences between pre and post-test tests, in favor of the post tests individually and in favor of the electronic participatory learning strategy in learning some basic skills in basketball. One of the most important conclusions and recommendations made by the researchers are using the e-participatory learning strategy has shown improvement in basketball skills learning and directing the attention of teachers and trainers in the field of sports using the e-participatory learning strategy as a means of learning basic basketball skills.
In :the _pr sent _paper we report ths. ynthesis ·of a new li:ga!!d..
[f4LJ [{'2 {1-'[(2-hyd•:0xy-.ben:zy1i.den·e)..,bxcJrazanci}:etby-l }benzerieÂ
J,5 t;rtiol .aad its complexes ·w-ith '('Mlif(1 J Fev 1 ), ed(J'l), and. :f.::I:g 01>-)
The ligand \VS preP..ated rin tWo steps' • fp I t}Je nrst stea -soJutiQil Qf
-saUcyla[deeyeq. ip methatt:oJ . re3ctcd lU1der reflux
... Show MoreDeep learning techniques are applied in many different industries for a variety of purposes. Deep learning-based item detection from aerial or terrestrial photographs has become a significant research area in recent years. The goal of object detection in computer vision is to anticipate the presence of one or more objects, along with their classes and bounding boxes. The YOLO (You Only Look Once) modern object detector can detect things in real-time with accuracy and speed. A neural network from the YOLO family of computer vision models makes one-time predictions about the locations of bounding rectangles and classification probabilities for an image. In layman's terms, it is a technique for instantly identifying and recognizing
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThis paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a
... Show MoreEight different Dichloro(bis{2-[1-(4-R-phenyl)-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})iron(II) compounds, 2–9, have been synthesised and characterised, where group R=CH3 (L2), OCH3 (L3), COOH (L4), F (L5), Cl (L6), CN (L7), H (L8) and CF3 (L9). The single crystal X-ray structure was determined for the L3 which was complemented with Density Functional Theory calculations for all complexes. The structure exhibits a distorted octahedral geometry, with the two triazole ligands coordinated to the iron centre positioned in the equatorial plane and the two chloro atoms in the axial positions. The values of the FeII/III redox couple, observed at ca. −0.3 V versus Fc/ Fc+ for complexes 2–9, varied over a very small potential range of 0.05 V.
... Show MoreThe eaction of 2 4 .6-trihydroxyactophenonemonohydra1e with
l hydr.azine monohydrate was realized ti·nder reflu.(( in methanol and i:l.
Jew drops of glacial acetic acid we.re added to give lhe'(int rmediate)
2-(1hydr pno-ctbyt)-benzcne-·1.3.5-r:Qql, which reacted wittl
saEcy.laldehyde. jn methm)ql to gjy;e 'a new :tyRe CNzOi) Ligand (H:flL]
f(2-{1-[(2-=bydroxy-bertzylide·ne)-bydrazqoo,J-e·thy.1}bcnze·neJ ;3·,5
|
New Schiff base [3-(3-acetylthioureido)pyrazine-2-carboxylic acid][L] has been prepared through 2 stages, the chloro acetyl chloride has been reacting with the ammonium thiocyanate in the initial phase for producing precursor [A], after that [A] has been reacting with the 3-amino pyrazine-2-carboxilic acid to provide a novel bidentate ligand [L], such ligand [L] has been reacting with certain metal ions in the Mn(II), VO(II), Ni(II), Co(II), Zn(II), Cu(II), Hg(II), and Cd(II) for providing series of new metal complexes regarding general molecular formula [M(L)2XY], in which; VO(II); X=SO4,Y=0, Co(II), Mn(II), Cu(II), Ni(II), Cd(II), Zn(II), and Hg(II); Y=Cl, X=Cl. Also, all the compounds were characterized through spectroscopic techniques [
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreIn this study, we attempt to provide healthcare service to the pilgrims. This study describes how a multimedia courseware can be used in making the pilgrims aware of the common diseases that are present in Saudi Arabia during the pilgrimage. The multimedia courseware will also be used in providing some information about the symptoms of these diseases, and how each of them can be treated. The multimedia courseware contains a virtual representation of a hospital, some videos of actual cases of patients, and authentic learning activities intended to enhance health competencies during the pilgrimage. An examination of the courseware was conducted so as to study the manner in which the elements of the courseware are applied in real-time learn
... Show More