Futsal and blind football are group games of a competitive nature due to their excitement, excitement, fun, and aesthetic goals with charming artistic touches. This explains the public's passion for these two games, whether healthy people or blind people play them, to expand their vision and knowledge. About these two games, a historical approach is presented about their origins, development, and how they became globally recognized competitive sports with unified rules and world championships at various levels. Studying the origin and global spread of both futsal and blind football and identifying the most prominent developments in the rules and tools for futsal and blind football. The most important findings were that both futsal and football for the blind had professional foundations and arose as a result of societal needs and circumstances. It is necessary to conduct historical studies of different sports to provide a comprehensive understanding and knowledge of how sports developed.
Purpose: The present study seeks to examine various history stages in which undergone by the concept of scenarios, and development of this concept to integration with the strategic management practices:
Methodology: The current study relied on a literature review and approach in providing total picture of different stages undergone by this concept.
The main results: the scenarios did not reach maturity in their quest for integration with strategic management, and still need a great effort for the maturation of this thought in the framework of strategic management, and through it can contribute in creating important knowledge evolution.
Originality and value: providing a contemporary model linking the roots of this concept and cu
Has been studied both processes Almetzaz and extortion of a substance Alklanda Maysan different amounts of Alcaúlan Guy 70% alcohol solution using the method when the wavelength
Allah legislated marriage and made it dwelling, fellowship and mercy between
the two couples, Prophet Moh'd (peace of Allah and blessing be upon him) ordered a
husband to look after his wife, treat her with full charity and make love with here
every kindly. On the other hand, he ordered a wife to obey her husband and respect
him deeply, nevertheless, some obstacles may sometimes be appeared within the life
of their marriage, this may be caused by either a husband or a wife. This problem is
called lifely disobedience (AL-Noshooz).
In the other words, this means that a wife begins to hate her husband, refuse his orders
and not obey him.
In brief, they hate each other which leads to some marks appear in their
m
The research endeavors to harness the benefits stemming from the integration of constraint theory into construction project management, with the primary goal of mitigating project completion delays. Additionally, it employs fuzzy analysis to determine the relative significance of fundamental constraints within projects by assigning them appropriate weights. The research problem primarily revolves around two key issues. Firstly, the persistent utilization of outdated methodologies and a heavy reliance on workforce experience without embracing modern computerized technologies. Secondly, the recurring problem of project delivery delays. Construction projects typically encompass five fundamental constraint types: cost restrictions, tim
... Show MoreThis study investigates the effectiveness of mental games in enhancing shooting accuracy among young basketball players. Initially, baseline shooting accuracy was assessed through tests conducted prior to a three-week intervention involving mental games. A follow-up test revealed a significant improvement in participants' shooting accuracy following the intervention. Given the noticeable differences in the new shooting scores compared to the initial assessments, a second set of pre-intervention tests was conducted. These tests reaffirmed the significant enhancement in shooting accuracy, substantiating the hypothesis that mental games positively affect performance. The findings highlight the importance of these intervention programs
... Show Morethe contemporary Arab scholars deal with semiotics as an approach that helps them understand the texts, its meaning, and its structural functionalism . that’s why every now and then we find some
studies and researches using semiotics as an approach in study and comparatives, some of them even used the semiotic approach in analyzing old and new texts, while others think that semiotic holds and important place in critical approaches .
even though some of them considers semiotic just a trend of fashion this really didn’t lessen the value of semiotic as a scientific and procedural approach in literary and media studies as well as in analyzing literary and journalistic texts. for this reason it is considered as an important approa
There are many questions that have been presented and asked in order to know who the Lady Sharifa bint Al-Imam (peace be upon her) is? And then adopting the opinions that confirm or deny the existence of Mrs. Sharifa or the place of her death, and how did it happen? As well as the question, where is the shrine of Sharifa, daughter of Imam Hassan? Who are the daughters of Imam Hassan? Did she have a grave previously, and when was the trace of this tomb known
With the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the