It research and descriptive sample of players Handball number (21) player (Club Husseiniya) The research aims to identify the relationship between certain components of blood and immunological speed the transition has been a test speed the transition in addition to the withdrawal of a blood sample after (5-10) minutes on the test to identify the nature of the correlation between speed and some transitional immune blood Mkonaght. The importance of research in identifying the relationship element speed in the game where one of the key elements in this game and some blood components immune where there is little of the studies, which focused on the nature of the relationship between exercise and immune blood, especially in a game of handball, especially eating a speed that the main pillar her.Through statistical treatments reached correlated significantly positive between the performance speed transition and level of some blood components and immunological included (Alaionoval, Alentrovil, Almufosaat, and total white blood cells) and place researcher number of recommendations included conducting similar studies on other types of white blood cells and capabilities various other physical addition to conducting studies to identify the effect of blood components by type of immune effectiveness (Individual) (Vrgih), in addition to conducting such a research class males compared to women in terms of the nature of the vulnerability
Epithelial mesenchymal transition (EMT) is a process comprising cellular and molecular events which result in cells shifting from an epithelial to a mesenchymal phenotype. Periodontitis is a destructive chronic disease of the periodontium initiated in response to a dysbiotic microbiome, and dominated by Gram-negative bacteria in the subgingival niches accompanied by an aberrant immune response in susceptible subjects. Both EMT and periodontitis share common risk factors and drivers, including Gram-negative bacteria, excess inflammatory cytokine production, smoking, oxidative stress and diabetes mellitus. In addition, periodontitis is characterized by down-regulation of key epithelial markers such as E-cadherin together with up-regulation of
... Show MoreA strong sign language recognition system can break down the barriers that separate hearing and speaking members of society from speechless members. A novel fast recognition system with low computational cost for digital American Sign Language (ASL) is introduced in this research. Different image processing techniques are used to optimize and extract the shape of the hand fingers in each sign. The feature extraction stage includes a determination of the optimal threshold based on statistical bases and then recognizing the gap area in the zero sign and calculating the heights of each finger in the other digits. The classification stage depends on the gap area in the zero signs and the number of opened fingers in the other signs as well as
... Show MoreThis research aims to study the methods of reduction of dimensions that overcome the problem curse of dimensionality when traditional methods fail to provide a good estimation of the parameters So this problem must be dealt with directly . Two methods were used to solve the problem of high dimensional data, The first method is the non-classical method Slice inverse regression ( SIR ) method and the proposed weight standard Sir (WSIR) method and principal components (PCA) which is the general method used in reducing dimensions, (SIR ) and (PCA) is based on the work of linear combinations of a subset of the original explanatory variables, which may suffer from the problem of heterogeneity and the problem of linear
... Show MoreThe study aims detection teaching modalities adopted relationship in Jerash University exactly the classroom, and to achieve the goal of the study was to develop a questionnaire consisting of (39) items, and was achieving validity and reliability have, then sent to a sample of professors made up the university from (122) university professor of the total (172) professor, and they study population.
Study found a relationship between the teaching methods of the four their strategies with classroom management, and as a result the overall average level, while Hspt critical thinking at the highest correlation with classroom discipline management relationship strategy, while the relatio
... Show MoreThe ligand [Potassium (E)-(4-(((2-((1-(3-aminophenyl) ethylidene) amino)-4-oxo-1,4- dihydropteridin-6-yl) methyl) amino)benzoyl)-L-glutamate] was prepared from the condensation reaction of folic acid with (3-aminoacetophenone) through Schiff reaction to give a new Schiff base ligand [H2L]. The ligand [H2L] was characterized by elemental analysis CHN, atomic absorption (A.A), (FT-I.R.), (U.V.-Vis), TLC, E.S. mass (for spectroscopes), molar conductance, and melting point. The new Schiff base ligand [H2L], reacts with Mn(II), Co(II), Ni(II), Cu(II), Cr(III) and Cd(II) metal ions and (2-aminophenol), (metal : derivative ligand : 2-aminophenol) to give a series of new mixed complexes in the general formula:- K3[M2(HL)(HA)2], (where M=Mn(II) and
... Show MoreThis work involves the preparation of the ligand [KL] :- ÂÂÂÂÂÂ
K[4-(N-(5-methylisoxazol-3-yl) sulfamyl) phenylcarbamodithioate] from the reaction of sulfamethoxazole with Carbon disulfide in the presence of potassium hydroxide under reflux (4 hours) using methanol as asolvent. The prepared ligand was characterized using FT-IR, UV-Vis, 1H,13C–NMR spectroscopy, molar conductivity and melting point, Complexes for the above ligand [KL] with some bivalent transition and non-transition metals (Mn +2, Co+2 , Ni+2 ,
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreThree-dimensional (3D) image and medical image processing, which are considered big data analysis, have attracted significant attention during the last few years. To this end, efficient 3D object recognition techniques could be beneficial to such image and medical image processing. However, to date, most of the proposed methods for 3D object recognition experience major challenges in terms of high computational complexity. This is attributed to the fact that the computational complexity and execution time are increased when the dimensions of the object are increased, which is the case in 3D object recognition. Therefore, finding an efficient method for obtaining high recognition accuracy with low computational complexity is essentia
... Show More