The aim of this study to identify patterns of cerebral control (right and left) for second grade students in the collage of physical education and sports science of the University of Baghdad, as well as identify the definition of theThe Effect of Using the Bybee Strategy(5ES) according to Brain Control Patterns in Learning a Kinetic Series on Floor exercises in Artistic Gymnastics for menمجلة الرياضة المعاصرةالمجلد 19 العدد 1 عام 2020effect using the (Bybee) strategy (5ES) according to brain control patterns inlearning a Kinetic series on floor exercises In artistic gymnastics for men, andidentify the best combination between the four research groups learn, use Finderexperimental method research sample consi
... Show MoreLong-term use of non-steroidal anti-inflammatory drugs (NSAIDs) mostly associated with renal and hepatic adverse effects, and the adjunct use of compounds with potent protective effects, like silymarin, may be one of the choices to avoid these effects. This project was designed to evaluate the protective effect of silymarin against the suspected renal and hepatic injury induced with long term use of NSAIDs; 220 patients with osteoarthritis were randomized into 5 groups and treated with either silymarin 300mg/day alone, piroxicam 20mg/day alone, meloxicam 15mg/day alone or the combination of each of them with silymarin for 8 weeks. The renal and hepatic functions were evaluated before starting treatment and after 8 weeks including assessm
... Show MoreDialogue is one of the pillars of character building in the television series, through which it is possible to identify the most important characteristics and traits of the personality, in addition to its ability to reveal the most important problems at all levels. The following: (How does dialogue contribute to enhancing the traits of the alienated personality?). It therefore aims to identify the effectiveness of the dramatic dialogue in enhancing the traits of the alienated personality represented by (powerlessness, isolation, meaninglessness, objectification, non-standardization and rebellion). (The traits of the alienated character, and the second is the psychological function of the dramatic dialogue), to extract from them the main
... Show MoreThis paper tries to understand the poetic reference in the images of woman, she-camel, horse and their manifestations in Tarafah-ibnulAbd's poetry. There has got my attention the fact that these three images have their own distinct taste which is characterised by a clear rhythm, let alone the lively nature that is filled with liveliness and activity to be in harmony with the poet's youth. For these three images represented the best manifestations of his psychological and artistic poetics. The paper adopts an artistic analysis to arrive at the psychological aspects of these experiences-the woman, the she-camel, and the horse- and to understand the functions of their images and symbolic reference.
Cutaneous leishmaniasis (CL) is a widespread, yet often overlooked, parasitic disease caused by the Leishmania protozoan, which is prevalent in numerous countries, including Iraq. This condition is marked by the appearance of skin lesions on various exposed areas of the body. In most old-world regions, sodium stibogluconate (SSG) is the classical widely used drug to treat CL. The progression of skin ulceration is controlled by different inflammatory modulators including cytokines and enzymes. In this study, the possible role of the enzyme Matrix metalloproteinase9 (MMP-9) and its inhibitor Metallopeptidase inhibitor-1 (TIMP-1) as immunological markers was evaluated in CL patients suffering from cutaneous leishmaniasis before and aft
... Show More
Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show More