منطق الشكل في الخزف
The study aimed to determine the impact of awareness of the exercisearm at the level of performance skill Tabtabp in basketball.Used the experimental approach to female students of the fourth stage(25) Ksmo students into two groups (experimental and officer) applied theempirical understanding of the arm exercises, during Tabtabp (to push theball) introduced in the main section of the application of the lesson and by(10) minutes and over the 8 weeks . Concluded that the awareness of thearm exercises a positive influence in the development of skill in basketballTabtabp of members of a sample search.It recommends that researchersfocus on understanding the exercise arm, especially during the lesson toupgrade the performance of skill.God bless
the civil relation between Iraqis and Egyptian was close , it is clear that is the opening relation between two countries esoecally in trade and demand education , but after mongle occupation , For the capital of the Abbasid Caliphate, the situation in Baghdad, had changed in 656 AH/1258 AD, the Iraqi migration started security and safety, including scholars and writers, in addition to the presence of entire Iraqi families who immigrated to Egypt and resided there, including the family of Al-Hafiz Al-Iraqi The Ibn al-Kwaik family, the subject of the study, had an important impact on the scientific movement in Egypt.
Information Technology has become one of the Most Prominent tools in the Era of Technology and Telecommunication of our Digital World. For that Reasons most Organizations had taken the tools Adapted to their Present and Future Directions and for the Improvement for it's Operations and Workability in Internal or External Enviroment. Consequently the Points of Strength Beats the Weakness and as Result of Increase Opportunities and Decrease the Threats Facing these Organizations. This Search has been made to test the Existence or not Existence role of the Information Network Technologies that Include {Internet and Extranet} in Application of Information Technology t
... Show MoreThe purpose of this paper is use the Dynamic Programming to solve a deterministic periodic review model for inventory problem and then to find the optimal policies that the company must uses in the purchase or production (in the practical application example the Al Aksa company purchase the generators from out side country).
This research has taken to the knowledge of the scope of applying the international specification of (ISO 10015) which is regarded to training by the Iraqi ministry of municipalities and public works ,in order to determine its training quality .By using the checklist made based upon the items of the specification ,after translating the English copy into Arabic ,which takes the indications of training depending on qualitative bases. The results of the analysis emphasized that occurred total average by comparison the evaluation of the training activity in the mentioned ministry with the international specification in all of its main items, which was (%55) ,and totally documented ,which finally refer to the existence of great
... Show MoreMRP is a system intended for the batch manufacturing of discrete parts including assemblies and subassemblies that should be stocked to support future manufacturing needs. Due to the useful information provided by MRP it has evolved into a Manufacturing Resources Planning, MRP II, a system that ties the basic MRP system to the other functional areas of the company such as marketing, finance, purchasing, etc. The objective of this research, which was conducted at the State Company for Batteries Manufacturing, is to test the performance of some popular lot-sizing techniques used within MRP II framework. It is hypothesized that the technique which minimizes the total inventory costs does no
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show More