Abstract: The aim of the research identify the effect of using the five-finger strategy in learning a movement chain on the balance beam apparatus for students in the third stage in the College of Physical Education and Sports Science, as well as to identify which groups (experimental and controlling) are better in learning the kinematic chain on the balance beam device, has been used The experimental approach is to design the experimental and control groups with pre-and post-test. The research sample was represented by third-graders, as the third division (j) was chosen by lot to represent the experimental group, and a division Third (i) to represent the control group, after which (10) students from each division were tested by lot to represent the two groups, then the pre-test was performed, then the main experiment was carried out for a period of (8) weeks by two educational units per week, as the kinetic chain skills were taught, which included three skills, namely, the individual rise, the balance, the front rolling skill, and the Arabic landing skill. After completing the experiment, the result was a post-test, and the statistical package for social sciences was used SPSS to address search results, it included the mean, standard deviation, and T.test for corresponding samples and T.test for asymmetric samples, and a set of conclusions were reached, the most important of them: The five-finger strategy and the traditional method have made a noticeable development in the kinetic chain learning, but the five-finger strategy has outperformed the traditional method of positive influence.
Fear, harvesting, hunting cooperation, and antipredator behavior are all important subjects in ecology. As a result, a modified Leslie-Gower prey-predator model containing these biological aspects is mathematically constructed, when the predation processes are described using the Beddington-DeAngelis type of functional response. The solution's positivity and boundedness are studied. The qualitative characteristics of the model are explored, including stability, persistence, and bifurcation analysis. To verify the gained theoretical findings and comprehend the consequences of modifying the system's parameters on their dynamical behavior, a detailed numerical investigation is carried out using MATLAB and Mathematica. It is discovered that the
... Show MorePolyhydroxyalkanoates (PHAs) have gained much attention as biodegradable polymers, many efforts are being made to minimize the cost of PHAs by finding cheap carbon source depending on the type of microorganism and fermentation conditions. The aims of this study were to evaluate the effects of different glucose concentrations and other important conditions on the PHA production by Bacillus cereus isolated from soil. Polyhydroxyalkanoates PHAs accumulated by soil microorganisms were examined by screening the isolated bacteria using Sudan B Black and Nile Blue staining process. A Gram positive strain was identified using the 16s rRNA gene, deposited in the NCBI GenBank sequence database. Different growth conditions (favorite glucose concentrat
... Show MoreThe present study was conducted to determine the optimum conditions required for lipase enzyme activity extracted from germinated sunflower seeds, including temperature, pH, agitation, time of incubation, enzyme concentration, substrate type, and concentrations of mineral salts and EDTA. Optimum pH, temperature and time of incubation required for lipase stability were also determined. The results showede optimum lipase activity (3.251U/ml) wasund at 30 ÌŠC and pH 7 after 20 minutes of incubation when using 1 ml lipase enzyme with 0.02 ml of CaCl2 (10 mM) at 100 rpm of agitation and in the presence of olive oil as the substrate for enzyme reaction. EDTA appeared to have inhibitory effects, while Ca+2 and Mg+2 have stimulatory effec
... Show MoreThe study aimed to measure the phsycological tolerance and self-efficacy among the students of Baghdad university and knon the significant differences in psychological tolerance and self-efficacy according to the variables (Gender-Specialization)and the interaction between themas well as the study aimed to identify the strength and direction of the relationship between psychological tolerance and self-efficacy of the study sampleincluded asample of the current study(370) students from grades four ,the researcher used the measure of psychological tolerance and self-efficacy prepared by the researcher ,and the results showed that college students Generally have adegree of psychological tolerance and that there are statistically sig
... Show MoreThe dictionary meaning of the word is a linguistic category of the thing in a specific way . it is also a brief description of it .The main function of the concept lies in the total scientific reflection of the things where as the main function of the meaning is a brief reference to a certain content (extralinguistic ) which shows human knowledge . The meaning is (a storage unit ) of knowledge of the world ,but this does not give the extra linguistic meaning which the old words have . Hence, additional cultural ,ethnic,communicative
and genetic information is needed.
All the old words which are brought into us
... Show MoreThis article describes how to predict different types of multiple reflections in pre-track seismic data. The characteristics of multiple reflections can be expressed as a combination of the characteristics of primary reflections. Multiple velocities always come in lower magnitude than the primaries, this is the base for separating them during Normal Move Out correction. The muting procedure is applied in Time-Velocity analysis domain. Semblance plot is used to diagnose multiples availability and judgment for muting dimensions. This processing procedure is used to eliminate internal multiples from real 2D seismic data from southern Iraq in two stages. The first is conventional Normal Move Out correction and velocity auto picking and
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreSuccess in selecting the best among the sources of supply is one of the most important factors in the efficiency of the procurement activity in the company, because the proper selection of the source of the supply significantly affect the achievement of what is desired by the factors of quality, quantity, price and service, and the ability of the competent supplier to meet everything associated with this Factors of commitments, hereby supporting the procurement function's efforts to fully discharge its responsibilities, and in view of adopting of Al-Furat company quality management system by applying the standards of ISO (9001: 2015) and purpose of getting the on-demand benefits from the application of international standards reg
... Show More
