It is necessary to use the means of recovery and other means that help to get rid of the effects of fatigue, as the game of badminton and the effectiveness of running 800 meters fall within the mixed system with the superiority of the anaerobic system by more than the air system, so requires the development of energy systems In proportion to the time of the match for badminton players and their travels and high performance and ability to tolerate the high level of lactic acid in the muscles and blood and increase the pain associated with the fatigue that occurs during the performance. In light of the physical and physiological processes of these actions N it should seek through training programs to develop your endurance and wind energy systems and anaerobic together to perform and withstand voltage during the race and increase muscle efficiency in carrying lactic acid, which helps to delay the onset of fatigue and achieve better achievement.Because of the experience of the two researchers in the field of sports there are several factors affecting training, including the use of training methods, as each method has its characteristics that distinguish from the other, has been conducted several studies on some of these methods, And the accumulation of lactic acid in the muscles and blood is one of the most important variables affecting the game of flying badminton and ran 800 meters, and relying on those variables make the coach and athlete in the area of safety, whether during training or race, so the researchers decided to Conduct a study NH quickly hospitalization according to pregnancy training for some physiological and biochemical variables of the players and hostile aircraft 800 badminton.The aim of the research is to identify the speed of hospitalization according to the training load of some physiological and biochemical variables of the badminton and air maxi 800m youth, to identify the differences in the speed of hospitalization between the badminton players and the 800m youth.Methodology: The research sample was chosen in a deliberate way from the players of the team of the badminton youth (5) players, and the players of the team for 800 m, the number of (5) player, the tests used in the search first: pulse rate, fatigue equation, measure the concentration of lactic acid in Blood test after blood pressure, oxygen saturation ratio, biochemical tests, RBC test, Hb test, PCV test, Ca test. Tests were conducted for the variables investigated after the end of the training program. Interpretation of results.The three researchers concluded: For badminton players, the preference for muscle fatigue tests and the measurement of lactic acid in the physiological indicators Hb, P.C.V within the biochemical indicators.The three researchers recommend: the need to emphasize training programs and hospitalization during the periods of public and private preparation and competitions.
Abstract The aim of the current research is to identify the time perspective and the quality of academic life of Baghdad University students. The research also aims to identify the relationship between the time perspective and the academic quality of Baghdad University students and the extent to which the time perspective dimension of academic quality contributes to the identification of the difference between the time perspectives in terms of gender. Finally, the research aims to identify if there is a significant difference in the quality of academic life between males and females. The scales were applied to a number of (434) university male and female student. A one-sample t-test, a two-sample t-test, the analysis of the variation, the P
... Show MoreIn this paper we introduce a new type of functions called the generalized regular
continuous functions .These functions are weaker than regular continuous functions and
stronger than regular generalized continuous functions. Also, we study some
characterizations and basic properties of generalized regular continuous functions .Moreover
we study another types of generalized regular continuous functions and study the relation
among them
Today the NOMA has exponential growth in the use of Optical Visible Light Communication (OVLC) due to good features such as high spectral efficiency, low BER, and flexibility. Moreover, it creates a huge demand for electronic devices with high-speed processing and data rates, which leads to more FPGA power consumption. Therefore; it is a big challenge for scientists and researchers today to recover this problem by reducing the FPGA power and size of the devices. The subject matter of this article is producing an algorithm model to reduce the power consumption of (Field Programmable Gate Array) FPGA used in the design of the Non-Orthogonal Multiple Access (NOMA) techniques applied in (OVLC) systems combined with a blue laser. However, The po
... Show MoreThe energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.
Waste is one of the most important problems affecting the city’s environment and its urban landscape, which results from the activities and activities of man and the natural environment. Its sources have varied between residential, commercial, industrial, medical and hazardous, and its spread in cities, on roads and on abandoned open lands, has led to significant negative effects and risks to human health and the environment.
Therefore, there were serious attempts to deal with waste and follow sequential steps that formed a waste management system such as (collection, sorting, transport, then treatment and disposal). Preventing and reducing waste, then recycling and recovering by composting or burning, and ending with bu
... Show MoreThe importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Let M be an R-module, where R is a commutative ring with unity. A submodule N of M is called e-small (denoted by N e  M) if N + K = M, where K e  M implies K = M. We give many properties related with this type of submodules.