The reason for applying the project is for the development of some physiological variables and skill performance using a device for the first time applied in Iraq to a sample of badminton players, and this device has a patent on 7/2/2019. An experimental method is used for a sample of (12) players from (Al-Orthodoxy club). The experimental group is applied the proposal technique, while, the control group is instructed by the coach.The results of the research attribute to the role of the proposal exercises of fit light technology, thus, this technology has increased the attention and focusing of the sample and some physiological variables and smash shot skill. It has been concluded that the exercises using fit light technology is helped to improve their anaerobic abilities, also the exercises some physiological indicators. Furthermore, the exercises are helped to reduce the heart rate before and after the tension of the sample.
The present work is to investigate the feasibility of removal vanadium (V) and nickel (Ni) from Iraqi heavy gas oil using activated bentonite. Different operating parameters such as the degree of bentonite activation, activated bentonite loading, and operating time was investigated on the effect of heavy metal removal efficiency. Experimental results of adsorption test show that Langmuir isotherm predicts well the experimental data and the maximum bentonite uptake of vanadium was 30 mg/g. The bentonite activated with 50 wt% H2SO4 shows a (75%) removal for both Ni and V. Results indicated that within approximately 5 hrs, the vanadium removal efficiencies were 33, 45, and 60% at vanadium loadings of 1
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreThe study aims to reveal the degree of application of the alternative evaluation strategy in social studies in public education in the Kingdom of Saudi Arabia. It also aims to identify the opinions of experts on how to implement this. The study adopted the mixed methodology, which represented in the descriptive-analytical method, and qualitative methods through the grounded theory. The study used two tools namely: a questionnaire for assessments of social studies teachers and semi-structured interview questions. The results of the study showed a medium degree of appreciation for the application of alternative evaluation strategies by social studies teachers in general education with an average of (2.28). The results also showed that ther
... Show MoreHigh frequencies of multidrug resistant organisms were observed worldwide in intensive care units which is a warning as to use the only few effective antimicrobials wisely to reduce selective pressure on sensitive strains.
The aim of the current study is to asses the compliance of the currently followed antibiotic prescribing pattern in the intensive care unit in an Iraqi hospital with the international guidelines.A cross-sectional study was done in the intensive care unit (ICU) of the Surgical Specialties Hospital, Medical City in Bagdad from the 30th of November 2011 to the 5th of May 2012.Patients were followed until they were discharged or died to see any change in condition, response to drugs, devices u
... Show MoreHuman witnessed over the centuries many of the important issues faced by the international community was centered on human rights in general and the persecution of refugees, especially according to many forms may be directly or indirectly leaves behind economic crises, social and humanitarian push world countries to rethink the mechanisms and the feasibility of developing agreements and laws and the role of international and regional organizations to protect peoplerefugeestatus.
The current research aims to know the complementary use of the paper book and the digital book by defining the paper book and the digital book and knowing the methods and methods of obtaining each of them and indicating the extent of their use and for what purpose and knowing the difficulties that researchers face in using each of them and which is better using the paper book or the digital book in preparing research Studies and for no reason. The research relied on the descriptive approach and the questionnaire as a tool for data collection, and it was distributed to professors and students of Iraqi universities. The research sample reached (219) individuals and reached a set of results, the most important of which are: Preference for the
... Show MoreIn this research, a factorial experiment (4*4) was studied, applied in a completely random block design, with a size of observations, where the design of experiments is used to study the effect of transactions on experimental units and thus obtain data representing experiment observations that The difference in the application of these transactions under different environmental and experimental conditions It causes noise that affects the observation value and thus an increase in the mean square error of the experiment, and to reduce this noise, multiple wavelet reduction was used as a filter for the observations by suggesting an improved threshold that takes into account the different transformation levels based on the logarithm of the b
... Show MoreThe aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).
This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreThe current research aims to reveal the strength of education and the direction of the relationship between the formal thinking and learning methods of Kindergarten department students. To achieve this objective, the researcher developed a scale of formal thinking according to the theory of (Inhelder & Piaget 1958) consisting of (25) items in the form of declarative phrases derived from the analysis of formal thinking skills based on a professional situation that students are expected to interact with in a professional way. The research sample consisted of (100) female students selected randomly who were divided into four groups based on the academic stages, the results revealed that The level of formal thinking of the main sample is
... Show More