The aim of this study was to identify the effectiveness of using generative learning model in learning kinetic series on rings and horizontal bar in artistic gymnastics for men ,Also, the two groups were better in learning the two series of movements on the rings and horizontal bar . The experimental method was used to design two parallel groups with pretested and posttest .The sample included third graders at the College of Physical Education and Sports Sciences - University of Baghdad ,The third class (d) was chosen to represent the control group that applied the curriculum in the college, with (12) students per group. After conducting the tribal tests, the main experiment was carried out for (8) weeks at the rate of two units per week divided into (4) weeks to learn the kinetic chain on the rings and (4) weeks learning the kinetic chain on the device of mind and after the completion of the experiment was carried out remote tests, used the statistical package of social sciences (spss) Results The research included (T. test) of the corresponding samples and (T. test) for asymmetric samples. A number of conclusions were reached, the most important of which were the following: - The generative learning model of the applied learning applied to the experimental group and the method applied to the control group had an effect Was effective in learning the kinetic chain under study, but at varying rates was in favor of the generative learning model.
Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the ene
... Show MoreAn experimental and theoretical study has been done to investigate the thermal performance of different types of air solar collectors, In this work air solar collector with a dimensions of (120 cm x90 cm x12 cm) , was tested under climate condition of Baghdad city with a (43° tilt angel) by using the absorber plate (1.45 mm thickness, 115 cm height x 84 cm width), which was manufactured from iron painted with a black matt.
The experimental test deals with five types of absorber:-
Conventional smooth flat plate absorber , Finned absorber , Corrugated absorber plate, Iron wire mesh on absorber And matrix of porous media on absorber .
The hourly and average efficiency of the collectors
... Show MoreOne of the most important virulence factors in Pseudomonas aeruginosa is biofilm formation, as it works as a barrier for entering antibiotics into the bacterial cell. Different environmental and nutritional conditions were used to optimize biofilm formation using microtitre plate assay by P. aeruginosa. The low nutrient level of the medium represented by tryptic soy broth (TSB) was better in biofilm formation than the high nutrient level of the medium with Luria Broth (LB). The optimized condition for biofilm production at room temperature (25 °C) is better than at host temperature (37 °C). Moreover, the staining with 0.1% crystal violet and reading the biofilm with wavelength 360 are considered essential factors in
... Show MoreThe current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show MoreThe research depth and dimensions of the problem of environmental pollution resulting from the combustion of fuel used in electric power generators, especially in the summer and you are the national electric power supplied by almost non-existent state where this problem is a local phenomenon that has serious dimensions to human health, as well as the possibility of using a the tax system tools of b (environmental taxes) to reduce these pollutants, so the search is aimed at the types of gases emitted from burning fuel electric generators operating in the province of Baghdad and then measure the amount of environmental pollution as well as compared to the amount of some of these gases, which is more risk to humans with permitted by the Wor
... Show MoreThis work introduces a new electrode geometry for making holes with high aspect ratios on AISI 304 using an electrical discharge drilling (EDD) process. In addition to commercially available cylindrical hollow electrodes, an elliptical electrode geometry has been designed, manufactured, and implemented. The principal aim was to improve the removal of debris formed during the erosion process that adversely affects the aspect ratio, dimensional accuracy, and surface integrity. The results were compared and discussed to evaluate the effectiveness of electrode geometry on the machining performance of EDD process with respect to the material removal rate (MRR,) the electrode wear rate (EWR), and the tool wear ratio (TWR). Dimensional features an
... Show MoreSteganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreTechnology is one of the important influences in the development of professions in general and the profession of tax auditing and examination in particular because of the importance of this section in the General Tax Authority because of the service it provides is auditing the financial accounts provided to the department by the taxpayers to ensure the correctness of revenue and the achievement of tax justice. Where the research aims at the importance of using electronic accounting information systems in developing the work of the Tax Audit and Examination Department, to reduce the difficulties that the department may be using using manual systems, which is the need for time and effort to accomplish it, and to develop methods and procedu
... Show More