Ibn al-Anbari, however, turned to Abu Hatim al-Sijistani in eleven places of his book ((clarify the endowment and start)). The study showed that the right and right was with the son of Anbari and that what went to Sistani saying uniqueness, and contrary to the vast majority of scientists. The study also showed that the science of grammar affects the endowment and initiation, as the study showed that the science of endowment and initiation is one of the important sciences of the Koran, which must be carefully received, researchers.
This study investigates the effectiveness of mental games in enhancing shooting accuracy among young basketball players. Initially, baseline shooting accuracy was assessed through tests conducted prior to a three-week intervention involving mental games. A follow-up test revealed a significant improvement in participants' shooting accuracy following the intervention. Given the noticeable differences in the new shooting scores compared to the initial assessments, a second set of pre-intervention tests was conducted. These tests reaffirmed the significant enhancement in shooting accuracy, substantiating the hypothesis that mental games positively affect performance. The findings highlight the importance of these intervention programs
... Show MoreBackground: Developing Goalkeeper’s performance is imperative to defence the goal. As the Football match’s nature needs implementning the skill with strength, and speed. so, the Goalkeeper demands special physical abilities that enabling him the ball blocking skill masterly. Objetive: The study aimed to identify the effect of developing some special physical abilities on the goalkeeper’s performance level while blocking executed balls from the penalty mark in football using plyometric training. Methodology: The experimental approach (continuous training that divided into two phases: General preparation, and Special preparation stage) was adopted for one experimental group by pre/post-measurements. The research sample was delib
... Show MoreThin films of Magnetite have been deposited on Galvanized Steel (G-S) alloy using RF-reactive magnetron sputtering technique and protection efficiency of the corrosion of G-S. A Three-Electrodes Cell was used in saline water (3.5 % NaCl) solution at different temperatures (298, 308, 318 & 328K) using potentiostatic techniques with. Electrochemical Impedance Spectroscopy (EIS) and fitting impedance data via Frequency Response Analysis (FRA) were applied to G-S alloy with Fe3O4 and tested in 3.5 % NaCl solution at 298K.Results taken from Nyquist and Bode plots were analyzed using software provided with the instrument. The results obtained show that the rate of corrosion of G.S alloy increased with increasing the temperatures from 298 t
... Show MoreThe optical properties for the components CuIn(SexTe1-x)2 thin films with both values of selenium content (x) [0.4 and 0.6] are studied. The films have been prepared by the vacuum thermal evaporation method with thickness of (250±5nm) on glass substrates. From the transmittance and absorbance spectra within the range of wavelength (400-900)nm, we determined the forbidden optical energy gap (Egopt) and the constant (B). From the studyingthe relation between absorption coefficient (α) photon energy, we determined the tails width inside the energy gap.
The results showed that the optical transition is direct; we also found that the optical energy gap increases with annealing temperature and selenium content (x). However, the width of l
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More