ABSTRACT Purpose: The determination of standard scores and levels for some mental skills by researchers is of great importance, especially if it matches the target research sample, Method: as the researchers used the descriptive approach in the survey method, and the researchers chose the sample of youth players for clubs for the season (2022-2021), numbering (127) players, and the researchers identified the scale and procedures and applied it to the research sample, Results: obtained the results that were processed, extracted grades and standard levels, and then interpreted them and obtained conclusions, Conclusion: the most important of which are: The standard levels of mental skills reached the results of the sample studied within the level confined between (very good, good, average, acceptable and poor). The number of players in the level (average) was greater than the number of players in the other levels of the results of the research scale and then recommended the researchers: Work on the use of training programs accompanying psychological programs that will develop the psychological, physical, skill and tactical side by side. The need to conduct other studies on similar samples using axes of mental skills different from the axes of this study
Information and communication technology has a significant influence on employee procedures. Businesses are investing in e-CRM technologies, yet it is difficult to assess the performance of their e-CRM platforms. The DeLone and McLean Information Systems Success framework can be modified to the current e-CRM assessment difficulties. The new framework's different aspects provide a concise framework for organizing the e-CRM key metrics identified in this study. The purpose of this study is to apply and verify that the Updated DeLone and McLean IS Model can be employed to explain e-CRM adoption among employees, along with the extended Updated DeLone and McLean Model with its five output factors, namely system quality, service quality,
... Show MoreSliver / Sliver chloride is as old used from human but the sliver / sliver chloride nanoparticles have only recently been recogenized. They have used in medicin and agiculture. In the present study have been investigation the effecte biosynthesis Sliver / Sliver chloride nanoparticles as antibacterial by demonstrated that Ag / AgCl NPs arrest the growth of many bacterial: S.typhimurium, k. pneumonia. S. aureus, L.monocytogenes, B. Anthracis, E. coli, C. frundi, S. Pneumonia, P. Aeruginosa. The elements compestion and crystallization panal of biosynthesized nanoparticles were chracterazated by FTIR, XRD and SEM. From XRD, It is confirmed the synthesized nanoparticles contain Sliver / Sliver chloride elements. Synthesized Ag / AgCl NPs showed
... Show MoreThe reservoir characterization and rock typing is a significant tool in performance and prediction of the reservoirs and understanding reservoir architecture, the present work is reservoir characterization and quality Analysis of Carbonate Rock-Types, Yamama carbonate reservoir within southern Iraq has been chosen. Yamama Formation has been affected by different digenesis processes, which impacted on the reservoir quality, where high positively affected were: dissolution and fractures have been improving porosity and permeability, and destructive affected were cementation and compaction, destroyed the porosity and permeability. Depositional reservoir rock types characterization has been identified de
Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More