يهدف البحث عن الاساليب والعوامل التي ترفع من قدرات اللاعبين البدنية و المهارية للتواصل مع التطور المطلوب حيث وجد ان هناك حاجة ملحة لتطوير الهجوم السريع الفردي وذلك لضعف و تذبذب الاداء الفني بكرة اليد تحتاج في المباراة الخاصة السرعة الانتقالية التي ترتكز عليها صفة السرعة دون الهبوط بالمستوى المطلوب لتحقيق ثمرة جهد هذا الاداء بأداء تصويبه في مرمى الفريق الخصم لمحصلة هذا الاداء المميز يتطلب ان يكون كل لاعب من اعضاء الفريق متوافر فيه القدرات البدنية بالشكل المطلوب فاللاعب الذي يكون ادائه البدني متميزا يكون ادائه المهاري متميزا ايضا وبناء على ذلك جاءت هذه الدراسة لتشخيص نوع العلاقة ما بين القدرات البدنية الخاصة التحرك الدفاعي و الانطلاق للهجوم السريع الفردي و بكرة اليد هدف البحث الى التعرف على العلاقة ما بين القدرات البدنية و علاقتها بالانطلاق الدفاعي للهجوم السريع الفردي بكرة اليد . استخدم الباحثون المنهج الوصفي على عينة من لاعبات فريق الكلية و البالغ عددهم (4 الاعبة) تم اجراء الاختبارات على عينة البحث للسرعة الانتقالية و القوة المميزة بالسرعة للذراعين و الرجلين و الانطلاق الدفاعي للهجوم السريع الفردي و قد خرج الباحثون بنتائج من أهمها مستوى انجاز اختبار السرعة الانتقالية والقوة المميزة بالسرعة للذراعين والرجلين للاعبات بشكل مؤشر حقيقي لظهور نوع العلاقة قبل المعالجات الاحصائية و مستوى انجاز الانطلاق الدفاعي للهجوم السريع الفردي ايضا كان مؤشرا واضح على ان العلاقة سوف تكون بمقدار الانجاز المتحقق من خلال تأدية اللاعبات المهارات الحركية و المحافظة على مستواها طول فترة الاداء .
The mysterious letters, the philosophy of existence and the meaning of these letters in the Qur'an is one of the mysterious issues that has always occupied the minds of Interpreters. Each Interpreter has tried to provide his own interpretation and understanding of these mysterious letters. Since these letters are part of the surah of the Qur'an and at the same time, the appearance of these letters, unlike other verses, does not indicate meaning, the commentators have approached these verses with their preconceptions. In this article, an attempt has been made to investigate the role of pre-interpreters of descriptors in a descriptive and analytical method in finding the meaning of syllables. However, each of them has tried to interpret th
... Show MoreIn this paper, a theoretical study of the energy spectra and the heat capacity of one electron quantum dot with Gaussian Confinement in an external magnetic field are presented. Using the exact diagonalization technique, the Hamiltonian of the Gaussian Quantum Dot (GQD) including the electron spin is solved. All the elements in the energy matrix are found in closed form. The eigenenergies of the electron were displayed as a function of magnetic field, Gaussian confinement potential depth and quantum dot size. Explanations to the behavior of the quantum dot heat capacity curve, as a function of external applied magnetic field and temperature, are presented.
An efficient modification and a novel technique combining the homotopy concept with Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced in this paper . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.
This article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.
In this paper, the problem of resource allocation at Al-Raji Company for soft drinks and juices was studied. The company produces several types of tasks to produce juices and soft drinks, which need machines to accomplish these tasks, as it has 6 machines that want to allocate to 4 different tasks to accomplish these tasks. The machines assigned to each task are subject to failure, as these machines are repaired to participate again in the production process. From past records of the company, the probability of failure machines at each task was calculated depending on company data information. Also, the time required for each machine to complete each task was recorded. The aim of this paper is to determine the minimum expected ti
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreThis study was conducted to investigate thyroid function and Anti-Müllerian hormone (AMH) in (Chronic kidney disease) CKD patients by evaluating their levels in CKD patients, 50 patients were diagnosed to have CKD stage-5, their ages ranged between 20-50 years (25 males and 25 females) who attended the Nephrology and Transplant Center in Medical City of Baghdad- Iraq, they were recruited from April 2018 to July 2018 and were enrolled into the study. The control group consisted of 20 healthy individuals, their ages ranged between 20-48 years (10 males and 10 females). The study showed non-significant (p>0.05) increase in AMH level in CKD patients compared to the control group. On the other hand, TSH was recorded a highly significant (
... Show MoreAbstract:
The distribution or retention of profits is the third decision among financial management decisions in terms of priority, whether at the level of theory or practice, as the issue of distribution or retention is multi-party in terms of influence and impact, as determining the optimal percentage for each component is still the subject of intellectual debate because these decisions are linked to the future of the organization and several considerations, The research focus on the nature of the policies followed by the Iraqi banking sector As the sample chosen by the intentional sampling method was represented by the Commercial Bank of
... Show MorePraise be to God, prayer, and peace be upon the Messenger of Allah and his God and his companions. The field of the judiciary to prove or invalidate some cases in the field of proof of descent and attachment to the plaintiff or exile, and other legal and judicial issues, especially in this era where the spread of previously unknown evidence, such as DNA, which was discovered in 1953, and the genetic fingerprint discovered 1984, blood analysis and a Saliva, sweat, poetry, etc. in the field of forensic evidence, in forensic medicine or medical expertise, it can be used to identify the killer, or verify his identity, using all the evidence in the scene, such as a point of blood or sweat, and the like So, as well as to prove the lineage is u
... Show MoreNeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among