The research aimed at designing a rehabilitation program using electric stimulation for rehabilitating knee joint working muscles as a result of ACL tear using an apparatus developed by the researchers that stimulate the muscle vibration and work as well as the ability to rehabilitate the join in shorter periods. In addition to that, it aimed at identifying the effect of this program on rehabilitating the knee joint working muscles. The researchers used the experimental method on Baghdad clubs’ players who suffer from complete knee joint ACL tear aged (19 – 24) years old. The results showed that the training program developed the working muscles significantly achieving normal levels of activity.
The letters are exposed in some texts of the classical Arabic language (poetry or prose), or in some of the Qur’anic texts, which are the main sources that were adopted on the day when provisions, rules and linguistic controls were established. I say that some of these letters are exposed in some contexts to deletion, mention, or change in the structure and shape of the letter. As for the omission, it is one of the aspects that distinguished Arabic, as well as other languages, for many purposes that differ among their user.
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Education is a process of learning and education at the same time. As the conditions of modern life necessitate every person to keep learning, education has become a necessity to meet life needs. The society today is concerned with the educational process and aims to live up the expectations. Since education is an integral part of education and its means, it has become as a mean to achieve its purposes. The educational environment was a traditional environment limited to specific inputs, possibilities and stimulus of both teacher and student. Due to the latest advancement, the educational environment has been expanded to become a rich, with strong connections. It has expanded to encompass the entire global environment. The current
... Show MoreIn this paper the reinforced materials manufactured from steel continues fibers are used in Aluminum matrix to build a composite material. Most of researches concentrated on reinforced materials and its position in the matrix according to its size and distribution, and their effects on the magnitude of different kinds of the stresses, so this paper presents and concentrate on the geometrical shape of reinforced material and its effects on the internal stresses and strains on the composite strength using FEM as a method for analysis after loaded by certain force showing the deference magnitudes of stresses according to the different geometrical shapes of reinforced materials.
The research aims to identify the degree of the availability of knowledge, skill and ability as components of human capital, in addition to stand at the level of strategic agility upon tourism and travel agencies company of Jordan, the impact of human capital on strategic agility has been tested through distribution of a questionnaire on a Randomly Sample from Workers in Jordan tourist Companies of (349),a number of statistics techinces have been used simple liner Regrision and Multiplayer regession, it has shown that the degree of knowledge, ability and skill availability was high, and the same applies on strategic agility components, and shown out that there is a statistically significant impact between human capital and strate
... Show MoreActivity test of the inhibitors purified from barley and broad beans crop proved the inhibition activity against 6 types of rots Pencillium ssp and Aspergellusflavus and Aspergillus niger and Fusarium solani and Fusarium semitectum and Mucor with three concentrations 0.1 and 0.2 and 0.3 mg/ml, where the inhibitor purified from the second peak of broad beans proved that it had a higher inhibition activity against the growth of test rots which were 53.75 and 62.5 and 78.5 and 76.25 and 84 and 18.8% respectively, at 0.3 mg/ ml followed by the first peak of the inhibitor purified from broad beans the inhibition activity were 43.75 and 50 and 62.96 and 75 and 80 and 12.5 then the inhibitor purified from barley in which the inhibition activity
... Show MoreOur research is based on the fact that the reflection of entertainment programs in Arab satellite channels on the social behavior of Iraqi youth … a field analysis of the Arab ldol program) and that its importance is the entertainment programs and their reflection on social behavior، which occupies
large areas of time from Satellite channels in the form of various episodes and each episode contains several categories، or in the form of templates and forms of various goals and contents، but the problem of
research boils down to (how far iraqi youth follow the entertainment programs in Arab satellite channels and what are the motives for watching the Program Arab ldol )) by For Iraqi youth and what are the positive and negative
Twelve pends were selected and distributed on three verticals transects paths on the Tigers river in Al Rasheed county.Passing through land covers, that classified and covers the whole region. Based on the 8 Landsat of the year 2015. It was oriental classified by using Erdas 10.2 . The pedons were distributed on the area of each varicty of these classes. the series of soil according of the transect series (DW74,MMg,DMu6 , Df96) respectively were represented P1 , P2 , P3 , P4 .
The second transits series(DM97,MM5,DM96,DF115) respectively were represented P5 , P6 , P7 , P8 .The third transits series(DM46,MMg,MF12,MM11) re
... Show More