The tests that measure special strength defined by speed contributes a great deal in evaluating the players' weaknesses and strengths so as to aid coaches judge their players according to scientific and objective measurements. The problem of the study lies in answering the following question : is there a test that measures legs' vertical strength defined by speed especially for youth basketball players? The aim of the research was to construct and standardize a test for measuring legs' vertical strength defined by speed in youth basketball. The subjects of the study were 74 youth basketball players from Baghdad. The researchers concluded that the test measures leg's vertical strength defined by speed for youth basketball players as well as it sets the criteria for these tests. Finally the researchers recommended using this test for measuring leg's vertical strength defined by speed in the evaluation process in addition to the criteria of this research as a reference for selecting youth basketball players. Finally the researchers recommended making similar researches using other physical variables not studied in this research.
A total of 243 serum samples were tested for the presence of
Chlamydia antibodies by ind irect immunofluorescent antibody test.Ninety
nine females were suffering from abortions, 64 were infertile and other 80 were none aborted women. The incidence of Ch lamydia were (15%,
9.4%) and (3.8%) in abortion, infertile and non aborted group,
respecti vely. The results also showed a difference in prevalence rate between the age groups. The highest incidence was found in the age group 20-39 &
... Show MoreIt is very difficult to obtain the value of a rock strength along the wellbore. The value of Rock strength utilizing to perform different analysis, for example, preventing failure of the wellbore, deciding a completion design and, control the production of sand. In this study, utilizing sonic log data from (Bu-50) and (BU-47) wells at Buzurgan oil field. Five formations have been studied (Mishrif, Sadia, Middle lower Kirkuk, Upper Kirkuk, and Jaddala) Firstly, calculated unconfined compressive strength (UCS) for each formation, using a sonic log method. Then, the derived confined compressive rock strengthens from (UCS) by entering the effect of bore and hydrostatic pressure for each formation. Evaluations th
... Show MoreSalmonella enteritidis one of more important as epidemiological bacteria between other salmonella types. It is very important pathologically that cause food poising and gastrointestinal tract infections. This study includes some of immunological changes that appear by ELISA test and antibiotic sensitivity test against these bacteria in mice. ELISA test results appears high immunological response happen after 3 days of inoculation, mean titration readings beginning 0.198 and the maximum mean titration after 15 days of inoculation 1.538 and begin to decrease after this time slowly to remain about 0.297 after 40 days of inoculation. An antibiotics sensitivity test result appears, this bacteria sensitive to Chloramphenicol, Ceftriaxone,
... Show MoreAutism is considered as one of the most developmental problems in the world that interfere with children growth and affect their social ,emotional and cognitive development child with autism used to be normal in his growth but in his development parents started to notice that their child characterize by loneliness and withdrawal himself from the surrounding world with some mannerism behaviors these characteristics used to be manifested children during the 1st three year of their life . It appears, one in every 500 birth (The American International Institution for child health 1997. and it would be less in females than makes at 1/4 percent .
Aim is to b
... Show MoreConvolutional Neural Networks (CNN) have high performance in the fields of object recognition and classification. The strength of CNNs comes from the fact that they are able to extract information from raw-pixel content and learn features automatically. Feature extraction and classification algorithms can be either hand-crafted or Deep Learning (DL) based. DL detection approaches can be either two stages (region proposal approaches) detector or a single stage (non-region proposal approach) detector. Region proposal-based techniques include R-CNN, Fast RCNN, and Faster RCNN. Non-region proposal-based techniques include Single Shot Detector (SSD) and You Only Look Once (YOLO). We are going to compare the speed and accuracy of Faster RCNN,
... Show MoreSMNs like Facebook, YouTube, Twitter, WhatsApp,..etc. are among the most popular sites on the Internet. These sites can provide a powerful means of sharing, organizing, finding information and knowledge. The popularity of these sites provides an opportunity to measure the use them in knowledge sharing, which needs a special scale, but unfortunately, there is no special scale for that. Thus, this study supposes to use SCT as a scale to measure the use of SMNs in electronic knowledge sharing due to it has been used to measure knowledge sharing with its traditional form. This study can help the decision-makers to use these SMNs to share the academics’ knowledge in educational institutes to the communi
... Show MoreAbstract :
The aim of the study is to diagnose the level and nature of the relationship between cognitive interactions, cognitive ignorance and the achievement of strategic excellence). The aim of this is to explore theoretical philosophy and intellectual implications of these variables, and, then test the correlation and impact relationships and their feasibility in the application environment, which was formed from the seven directorates in the Ministry of Education. The sample of the study was determined by the directors, their assistants, and the department directors. The sample number is (130). The importance of the study is to come out with a philosophical basis for the nature of the variables, based on an app
... Show More
Linear Feedback Shift Register (LFSR) systems are used widely in stream cipher systems field. Any system of LFSR's which wauldn't be attacked must first construct the system of linear equations of the LFSR unit. In this paper methods are developed to construct a system of linear/nonlinear equations of key generator (a LFSR's system) where the effect of combining (Boolean) function of LFSR is obvious. Before solving the system of linear/nonlinear equations by using one of the known classical methods, we have to test the uniqueness of the solution. Finding the solution to these systems mean finding the initial values of the LFSR's of the generator. Two known generators are used to test and apply the ideas of the paper,
... Show More