Preferred Language
Articles
/
iBZOIocBVTCNdQwCRzlf
Effect of taking some of dietary supplements according to special forces exercises to develop some physical abilities, speed and accuracy smash shot for badminton young players
...Show More Authors

Set dietary program for some of dietary supplements and training for badminton young players, and identifying effect of taking some of the dietary supplementary for badminton young players. The research population :( badminton young players group (Arminian club). For age group (16-18) years the sample is divided in to two experimental groups within each group (6) players, and two for the exploratory experiment which was within the research sample, they were divided in to two groups, the first group take some of the dietary supplements (multivitamin creating) .the set exercises by the researchers in the main part of the training unit and the second group (amino acids, vitamins) and the set exercises by the researcher. The scientific approach :( the experimental approach to design the two groups of the pre and posttests). The measurement instruments: physical tests for the explosive power and the power characteristic by speed for the two arms and the legs, besides, the smash shot), after applying the pre-tests, and applying the muscular ability, then applying the exercises for two months set by the researcher. The statistical processing :( the mean was used and the standard deviation and torsion for the one sample, and (t ) test for two independent samples).The research results: ( using the exercises and some of the dietary supplements have positive effect on improving some of the physical abilities, speed and accuracy of smash shot skill for badminton young players).The researcher recommends: (depending exercises accompanying with the dietary supplements for badminton young players of age group(16-18) years by the trainers and using dietary supplements with training and contests to retain the player's energy.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Materials Research Express
SiC composite based selective electromagnetic propagation for GHz application
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Fri Jul 19 2019
Journal Name
Iraqi Journal Of Science
Efficient Iterative Method for Solving Korteweg-de Vries Equations
...Show More Authors

The Korteweg-de Vries equation plays an important role in fluid physics and applied mathematics. This equation is a fundamental within study of shallow water waves. Since these equations arise in many applications and physical phenomena, it is officially showed that this equation has solitary waves as solutions, The Korteweg-de Vries equation is utilized to characterize a long waves travelling in channels. The goal of this paper is to construct the new effective frequent relation to resolve these problems where the semi analytic iterative technique presents new enforcement to solve Korteweg-de Vries equations. The distinctive feature of this method is, it can be utilized to get approximate solutions for travelling waves of 

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Aug 17 2023
Journal Name
Revista De Gestão Social E Ambiental
Complete Street as a Key for Urban Environment Development
...Show More Authors

Purpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad.   Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements.   Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 09 2022
Journal Name
Wireless Personal Communications
Strongly Connected Ramanujan Graphs for Highly Symmetric LDPC Codes
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
International Journal Of Pure And Apllied Mathematics
A SEMI ANALYTICAL ITERATIVE TECHNIQUE FOR SOLVING DUFFING EQUATIONS
...Show More Authors

View Publication
Crossref (11)
Crossref
Publication Date
Thu Jun 29 2023
Journal Name
Wasit Journal For Pure Sciences
Suitable Methods for Solving COVID-19 Model in Iraq
...Show More Authors

Because the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Journal Of Yarmouk
Artificial Intelligence Techniques for Colon Cancer Detection: A Review
...Show More Authors