Each sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volleyball players. This weakness may be attributed to the weakness or variation in the physical abilities of volleyball players Therefore, the two researchers decided to develop physical exercises according to the phosphogenic energy system, considering the volleyball game within the ATP-CP system)) Adenosine Triphosphate and Creatine Phosphate to prepare for physical performance within the game and to know the effect of these exercises on the performance of the skill of sending with volleyball
This study was based on the determination of aphid species that infested Chrysanthemum sp. (Asterales, Asteraceae) in the middle of Iraq; five aphid species belong to subfamily Aphidinae were recorded: Aphis fabae Scopoli, 1763, Aphis gossypii Glover, 1877, Coloradoa rufomaculata (Wilson, 1908), Macrosiphoniella sanborni (Gillette, 1908) and Myzus persicae (Sulzer, 1776). A. gossypii was the most dominant species throughout the study period while M. persicae is the lesser species.
A summary of the main taxonomic characters is presented here and a pictorial key which was designed to separate aphi
... Show MoreThe purpose of this study is to diagnose factors that effect Thi-Qar behavioral intention to use internet. A sample of (127) internet users of university staff was taken in the study and were analyzed by using path analyze . The study concluded that there is a set of affecting correlation. It was founded that exogenous variables (gender, income, perceived fun, perceived usefulness, Image, and ease of use) has significant effect on endogenous (behavioral intention) . The result of analysis indicated that image hopeful gained users comes first, ease of use secondly, perceived fan and perceived usefulness on (dependent variables (daily internet usage and diversity of internet usage. Implication of these result are discussed . the st
... Show MoreThe amicus curiae is one of the judicial procedures adopted in many judicial and legal systems around the world, under which a person who is not a party to the case, and without having a personal and direct interest in it, intervenes to draw the court’s attention to many factual and legal aspects
This paper deals with social responsibility visible to the media and the role they play in spreading the culture of environmental protection, and make research on a sample of the University of Baghdad consisting students from 150 students, male and female were distributed questionnaire form on the sample to obtain the required information has been questionnaire included axes distributed questions achieve the objectives of the search, and after the form data were analyzed using statistical program spss results show that the visual media and its role in spreading the culture of environmental protection form averages arithmetic high, indicating a rise in the influence of th
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreThe aim of the research was to prepare Pilates exercises using the barrel ladder apparatus and to identify the effect of Pilates exercises on agility, coordination, and motor sequences of third-year female students in artistic gymnastics. The researcher adopted the experimental method to achieve the objectives of the study and to verify its hypotheses, as it is suitable for the nature and problem of the research. In selecting the research population, the researcher carefully chose the sample using a purposive method, clarifying its elements and constituent units. The research population consisted of third-year female students at the College of Physical Education and Sports Sciences for Women / University of Baghdad, with a total of 20 stud
... Show MoreBackground: To evaluate the bony supports of the teeth adjacent to the area of cleft in patient with unilateral cleft lip and palate and to compare these measurements with the measurements of the same teeth in non-cleft side by using CBCT. Materials and methods: The CBCT scans of 30 patients having cleft lip( unilateral) and palate(unilateral), were analyzed and the measurements of the alveolar bony support for teeth that are adjacent to the cleft area were measured with those teeth located on opposite side (non- clef) side. For each tooth, the measurements will taken for the distance between the( cementoenamel junction) (CEJ) and the bony crest (AC) at the( buccal area) was measured and the thickness of the buccal plate At zero, one, tw
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More