The current world seeks to supply the most of the fruits of human knowledge and tries hard to search for the most important scientific facts, programs, means and advanced devices in various fields, including the sports field, and among these means is the use of various and advanced training devices and programs for the purpose of achieving the desired goal, which is to reach the desired level, the basketball game is one of the sports that need high technology in training according to scientifically studied principles because it is one of the games that relate to the abundance of its variables, composition and speed of change, all of which require a technical and high training depth and the players ’possession of different physical characteristics mixed in physical and skill performance. The study aims to :- Preparing suggested exercises in the opposite hierarchical training method.- Identify the effect of the opposite hierarchical training course to develop explosive power, characterized by speed, and some functional variables for basketball players.The researchers used the experimental approach with equal control and experimental groups with a cardiac and post-test, the sample of the research was the basketball youth, who numbered 12, and prepared exercises were applied using the hierarchical opposite training, as the curriculum lasted for (8) weeks and at (3) training units per week. The data were processed statistically and the researchers concluded the following. It was found that the use of the opposite hierarchical training method effectively contributed to the development of explosive power, characterized by speed, and some functional variables for basketball players.
This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.
The research starts from a fundamental problem about how top management team can realize the uncertainty. Strategic conversation has been introduced as a way for top management team to deal with uncertainties. Within the current research model, the strategic conversation was considered as an independent variable and uncertainty as dependent variable. The researcher used the survey method by distributed a questionnaire in the Administration and Economics College, University of Baghdad. Samples are 40 faculty participant of scientific committee members were distributed in seven scientific departments. The data were statistically analyzed by mean and the standard deviation. The hypotheses were tested through the use of correlation and regressi
... Show MoreAttack stream cipher system , using cipher text only , depends on the characteristics of plain teKt language and the randomness of the key , that used in encryption , without having detailed k.nuwh:dgt:: uf cipher algorithm by benefiting from the balance between O's and I' in the key to reduce the probability of key space.
Background: The efficacy of educational strategies is crucial for nursing students to competently perform pediatric procedures like nasogastric tube insertion. Specific Background: This study evaluates the effectiveness of simulation, blended, and self-directed learning strategies in enhancing these skills among nursing students. Knowledge Gap: Previous research lacks a comprehensive comparison of these strategies' impacts on skill development in pediatric nursing contexts. Aims: The study aims to assess the effectiveness of different educational strategies on nursing students' ability to perform pediatric nasogastric tube insertions. Methods: A pre-experimental design was employed at the College of Nursing, University of Baghdad, i
... Show MoreIn this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains
Anger is one of the problems of scientific importance that psychologists and education scientists are interested in, especially societies and educational environments, because if a child’s anger continues to develop into violence, then it becomes an unusual behavior, and an indication of the child's lack of adaptation to his family and his environment (Moses, 2013: 4) &n
... Show MoreSingle long spiral tube column pressure swing adsorption (PSA) unit, 25 mm diameter, and 6 m length was constructed to study the separation of water from ethanol at azeotropic concentration of 95 wt%. The first three meters of the column length acted as a vaporizer and the remaining length acted as an adsorber filled by commercial 3A zeolite. The effect of pressure, temperature and feed flow rate on the product ethanol purity, process recovery and productivity were studied. The results showed that ethanol purity increased with temperature and pressure and decreased with feed flow rate. The purity decreased with increasing productivity. The purity range was 98.9 % to 99.6 %, the recovery range was 0.82 to 0.92 and the productivity range w
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show More