<em>The aim of the research is to set a set of BioKinematic variables for the step of crossing barriers (3–6–9) in a 110-meter barrier for young runners. The researchers concluded the study by interpreting and discussing the results that the most important variables must be relied upon when training and selecting runners that got the best saturation on their factors: 1-The first factor which refers to the total distance of the plan to pass the third barrier + the total distance of the plan to pass the ninth barrier + the total distance Plan to cross the sixth barrier. 2-The second factor which refers to the total vertical speed before passing the third barrier + the total vertical speed before the sixth barrier + the total vertical speed before the ninth barrier. 3- The third factor which refers to the time for the total vertical distance before the third barrier + the time for the total vertical distance before the sixth barrier + the time for the total vertical distance before the ninth barrier. 4- The fourth factor which refers to the angular velocity in the first basement of the third barrier + the angular velocity in the first basement of the sixth barrier + the angular velocity in the first basement of the ninth barrier.</em> <strong><em>Type of Paper--- </em></strong><em>Review</em> <em> </em>
In the present work, a study is carried out to remove chromium (III) from aqueous solution by: activated charcoal, attapulgite and date palm leaflet powder (pinnae). The effect of various parameters such as contact time, and temperature has been studied. The isotherm equilibrium data were well fitted by Freundlich and Langmuir isotherm models. The adsorption capacity of chromium (III) that was observed by activated charcoal, attapulgite and date palm leaflet powder (pinnae) increased with the rise of temperature when the concentrations of Cr (III) were 600, 700 and 100mg/L respectively. The greatest adsorption capacity ofactivated charcoal, attapulgite and date palm leaflet powder (pinnae) at 10°C was 7.51, 5.39 and 0.77mg.gˉ¹ respective
... Show MoreThis study presents a detailed morphology and taxonomic study of Polysiphonia subtilissima collected from Abdul Rehman Goth, Karachi coast, Pakistan. Polysiphonia is a filamentous heterotrichous red algae, characterized by its branching structures and attachment mechanisms. P. subtilissima is notable for its broad salinity tolerance and wide distribution across marine and freshwater ecosystems. This research provides an in-depth examination of the internal and external structures of P. subtilissima, contributing to its systematic study and documenting its first recorded occurrence in Pakistani coastal areas, bordering the northern Arabian Sea. The findings enhance the understanding of the species taxonomy and its ecological role in
... Show MoreMicrowave heating is caused by the ability of the materials to absorb microwave energy and convert it to heat. The aim of this study is to know the difference that will occur when heat treating the high strength aluminum alloys AA7075-T73 in a microwave furnace within different mediums (dry and acidic solution) at different times (30 and 60) minutes, on mechanical properties and fatigue life. The experimental results of microwave furnace heat energy showed that there were variations in the mechanical properties (ultimate stress, yielding stress, fatigue strength, fatigue life and hardness) with the variation in mediums and duration times when compared with samples without treatment. The ultimate stress, yielding stress and fatigue streng
... Show MoreAbstract In the current contribution, a novel binuclear nickel(II) and zinc(II) complexes were prepared from a hexadentate ligand prepared via condensation of 3,3'-Bipyridine-6,6'-dicarbaldehyde , 2-amino-5-chlorobenzaldehyde and 2-Aminophenol .The symmetric ligand (H2DTPE) and its metal complexes were illustrated utilizing various techniques of physicochemical containing magnetic moment, analytical analysis and spectroscopy of mass, IR, 13C and 1H NMR, TGA and UV-Vis. The particles of MO Nanoscale were created from the labeled complex applying the ways of pyrolysis and utilizing methods of XRD, FT-IR, and FE-SEM, that specified close compatibility with the typical pattern for nanoparticles of NiO, ZnO and appeared the reasonable size in
... Show MoreThe azo ligand obtained from the diazotization reaction of 2-aminobenzothiazole and 4- nitroaniline yielded a novel series of complexes with Co(II), Ni(II), Cu(II), and Zn(II) ions. The complexes were investigated using spectral techniques such as UV-Vis, FT-IR, 1H and 13C NMR spectroscopic analyses, LC-MS and atomic absorption spectrometry, electrical conductivity, and magnetic susceptibility. The molar ratio of the synthesized compounds was determined using the ligand exchange ratio, which revealed the metal-ligand ratios in the isolated complexes were 1:2. The synthesized complexes were tested for antimicrobial activity against S. aureus, E. coli, C. albicans, and C. tropicalis bacterial species. Additionally, their binding affinities we
... Show MoreIn this study, manganese dioxide (MnO₂) nanoparticles (NPs) were synthesized via the hydrothermal method and utilized for the adsorption of Janus green dye (JG) from aqueous solutions. The effects of MnO₂ NPs on kinetics and diffusion were also analyzed. The synthesized NPs were characterized by scanning electron microscopy (SEM), X-ray diffraction (XRD), energy-dispersive X-ray analysis (EDX), and Fourier-transform infrared spectroscopy (FT-IR), with XRD confirming the nanoparticle size of 6.23 nm. The adsorption kinetics were investigated using three models: pseudo-first-order (PFO), pseudo-second-order (PSO), and the intraparticle diffusion model. The PSO model provided the best fit (R² = 0.999), indicating that the adsorpti
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More