The current world seeks to supply the most of the fruits of human knowledge and tries hard to search for the most important scientific facts, programs, means and advanced devices in various fields, including the sports field, and among these means is the use of various and advanced training devices and programs for the purpose of achieving the desired goal, which is to reach the desired level, the basketball game is one of the sports that need high technology in training according to scientifically studied principles because it is one of the games that relate to the abundance of its variables, composition and speed of change, all of which require a technical and high training depth and the players ’possession of different physical characteristics mixed in physical and skill performance. The study aims to :- Preparing suggested exercises in the opposite hierarchical training method.- Identify the effect of the opposite hierarchical training course to develop explosive power, characterized by speed, and some functional variables for basketball players.The researchers used the experimental approach with equal control and experimental groups with a cardiac and post-test, the sample of the research was the basketball youth, who numbered 12, and prepared exercises were applied using the hierarchical opposite training, as the curriculum lasted for (8) weeks and at (3) training units per week. The data were processed statistically and the researchers concluded the following. It was found that the use of the opposite hierarchical training method effectively contributed to the development of explosive power, characterized by speed, and some functional variables for basketball players.
This research aimed at identifying the factors that affecting in the recruitment of a teaching staff for the Massive Open Online Courses (MOOCs) in university teaching at the University of Khartoum. The descriptive method was followed. The questionnaire was used as a tool for data collection,, which was distributed directly to a sample of (181) respondent of the teaching staff members of the senate at University of Khartoum from those who were attend at the senate meeting No. (409) which was held on 22 August 2016 Of (272). The researcher followed for the distribution the chance method, where each questionnaire was distributed to each of a teaching staff from different faculties at the University of Khartoum, according to his willingness
... Show MoreThe research amid to find out the extent of Iraqi oil companies commitment to implement internal control procedures in accordance with the updated COSO framework. As the research problem was represented in the fact that many of the internal control procedures applied in the Iraqi oil companies are incompatible with most modern international frameworks for internal control, including the integrated COSO framework, issued by the Committee of Sponsoring Organizations of the Tradeway Committee. The research followed the quantitative approach to handling and analysing data by designing a checklist to represent the research tool for collecting data. The study population was represented in the Iraqi oil companies, while the study sample
... Show MoreKeys for 22 species representing 10 genera of Thripidae were provided collection of
samples carried out during 1999-2001 in different localities in the middle of Iraq. Of them
four species are described as new to science, Frankliniella megacephala sp. nov; Retithrips
bagdadensis sp. nov; Chirothrips imperatus sp. nov; Taeniothrips tigridis sp. nov; Another
fourteen species are recorded for the first time in Iraq; Thrips meridionalis (Pri.);
Microcephalothrips abdominils (Crawford Scolothrips sexmaculatus (Pergande),);Scolothrips
pallidus (Beach); Scritothrips mangiferae Pri.; Frankliniella tritici Bagnall; Frankliniella
schultzie Trybom; Frankliniella unicolor Morgan; Retithrips aegypticus Marchal; Retithrips
java
Abstract
The objective of the research is to identify the role of innovative leadership in achieving the dimensions of administrative empowerment in the company for the public of food industries. The various variables have shown the importance of innovative leadership to achieve the dimensions of administrative empowerment in both international and local companies. Administrative Empowerment "In order to answer this question, a virtual model was developed to reflect the relationship and impact between innovative leadership and administrative empowerment. The research was based on the analytical descriptive approach. the research community, The company represented the general company for food industries, retrie
... Show MoreA revolution called information revolution has recently invaded the world. It is Currently considered one of the most important properties of development to the countries of the world The criteria provided by computers such as accuracy, speed, time saving Storage and restore have led them to be widely used in economy, industry, agriculture, communications, etc., as well as being the major finder of reengineering the operations of innovation. The use of computers in the preparation of budgets will lead to achieve accuracy. Since, the operation draws upon the statistic and quantity estimations about budget items, the computerized balance sheet may save time and effort of preparing mathematical equations annually. According to the problem o
... Show MoreThis study is attempt to improve thermal isolation through measuring thermal conductivity composite of on polyester resin with fillers of (TiO2, ZnO, Acrylonitril, wood flour Coconut (Wf). The grain size of the fillers is 200 µm. The number of samples is (16) in addition to the virgin sample; these samples are prepared by cast molding method for polyester with filler volume fractions (5%, 10%, 15% and 20%). Shore hardness tests were used to measure the hardness and Lee disk method for thermal conductivity. The experimental results showed that the (20% ZnO) sample has the maximum value of thermal conductivity where (20% w.f) has minimum thermal conductivity .on the other hand (15% ZnO) sample give the maximum value of hardness where (20% w
... Show MoreThe philosopher and social psychologist Erich Fromm (1900-1980), in his book "Escape from Freedom" highlighted the distinction between the "I" of the authoritarian personality and the "I" of the destructive personality based on their stance towards "the other." The former (the authoritarian self) relies on a submissive, enslaving formula, where the "I" is the master/dominator/controller/strong, while "the other" is the servant/submissive/controlled/weak, essential for perpetuating this formula. In contrast, the latter (the destructive self) relies on an annihilating, negating formula, where the "I" is existence/killer/destroyer/pe
... Show MoreElectro coagulation treatment was used for zinc removal from electroplating wastewater of the State Company for Electrical Industries . This wastewater, here consists zinc ions with maximum concentration in solution of 90 ppm .
The parameters that influenced the wastewater treatment are: current density in the range 1-1.4 mA/cm2, pH in the range 5-10, temperature in the range 25-45°C and time in the range 10-180 minute.
The research is a laboratory experimental type using batch system for electrical process with direct current. The cell comprised of aluminum electrode as anode and stainless steel electrode as cathode. Thirty experiments and one hundred fifty sample lab tests were carried out in this research
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More