The tactical side in application of offensive plans in basketball did not take a large in scientific research because it always change because it related in mental ability of players and for the condition of the game and researchers notice that from their followed a lot of games for Duhok basketball club in Iraq league. There is a problem that connected in games results it clears in weakness in application of offensive plans in all kind (man to man & zone defense & side ball plans & under basketball and half court). The goal of study concentrate by designing a sheet for som offensive plans for study and analysis to Duhok club on Asian Championship 2011 at the base the sample contained (Iraq Duhok & application science Jordan & Lebanon sport & Al Itihad Saudi & smart Jelas from Philippine & Tiger Maliysia). From several conclusions cleared the failure attempts were more than success attempts for offensive plans (side ball in and under basketball in and man to man offensive) in (241) attempts and it percentage frequently (144) (59.75%) _ (97) (40.25%).
This study concerned with phytochemical investigation and methods of extraction and separation of active constituents from Valeriana officinalis plant cultivated in Iraq. Due to the large number of active constituents in Valeriana officinalis, it was necessary to make analytical study of its constituents to determine the chemical nature of these constituents and then determine the main classes (terpenes and iridoids) using chemical reagents specific for each class. Different organic solvents like ethanol (70%) used in soxhlet apparatus and hexane, ethyl acetate and methanol were used separately to extract the main active constituents by maceration. Through comparison between these solvents using thin layer chromatograph
... Show MoreThe main aim of this research study is to point out the vital importance of high-quality exterior audits to limit discretionary accounting, as it could distort a company’s commercial results. The research introduces a well-founded hypothesis on the preventive powers of high-quality audits, as it can act as a strong exterior control. The research focuses on testing the complex relationship between earnings management and investors’ behavior within the public-listed companies from the food industry. The research gathers credible annual comprehensive data from thirty-five publicly-listed firms from the United States. It encompasses the twenty years prior to 2024, as it includes the twenty years prior to 2024. Additionally, the gathered dat
... Show MoreEnterobius vermicularis infection is considered as one of the important causes of anaemia and malnutrition among children. This topic has recently received an increased amount of attention. The objective of this study is to evaluate the demographical, anthropometrical, nutritional, and haematological status of E. vermicularis infection among children. This study was conducted in Al Diwaniyah province, south of Iraq, for the period of October 2020 to the end of January 2021. The study included 122 children from both genders (males, n= 61, and females, n=61) and their ages ranged between 1 and 14 years. Nutritional status, body mass index (BMI), BMI percentile, and weight- for- age Z score were evaluated for some particip
... Show MoreSoil invertebrates community an important role as part of essential food chain and responsible for the decomposition in the soil, helps soil aeration , nutrients recycling and increase agricultural production by providing the essential elements necessary for photosynthesis and energy flow in ecosystems.The aim of the present study was to investigate the soil invertebrates community in one of the date palms plantation in Aljaderia district South of Baghdad, , and their relationships with some physical and chemical properties of the soil , as Five randomly distributed replicates of soil samples were collected monthly. Invertebrates samples were sorted from the soil with two methods, direct method to isolate large invertebrates and indirec
... Show MoreThe subject of the strategic vision is of great importance to all companies because they live in an environment of rapid change in various areas of life. Supports the performance of its operations in a better way, towards appropriate strategic growth and achieving success. The research aims to determine the level of interest of the researched company in the research variables (strategic vision and growth strategy), and the importance of the research came in being an attempt to provide the theoretical and scientific foundations for the research variables (strategic vision and growth strategy). As for the research method, it was relied on the descriptive analytical method, relying on the questionnaire as a means of obtaining data from the
... Show MoreThe study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups: a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess
... Show MoreAR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show More