The research aim to the usage educational method for jump shooting and it effect on speed strength in basketball for the specialist students in College Sport of Dayla University, which used the following statistic treatment (The T.test for compatible specimens), so after statistic treatment which appears theres a tow moral differences in speed strength and jump shooting tests results to (legs & arms) for the before and after tests, and after that the conclusions we positive and the second the special drills effect immaterial speed strength to legs and arms, so the tow researches recommended to looking after the best for educational methods that used in our sport colleges in Iraq.
Background: Improved glucose level control with insulin injections have allowed for the diabetic population to live longer and healthier lives. Unfortunately diabetes remains a worldwide epidemic disease with multiple health implications. Specifically, its effects upon fracture healing are compromised in diabetics with as high as 87% recovery delay relative to “healthy†counterparts. Current medical treatments for bone injuries have been largely focused on replacing the lost bone with allogenic or autogenous bone grafts, beta-tricalcium phosphate (β -TCP), a ceramic alloplast, has interconnected system of micropores, has been widely used as a biologically safe osteoconductive bone substitute. The aim of this study was histol
... Show MoreZinc is one of the essential trace elements, it plays a key role in many biochemical and functional processes. It is less harmful than many other minerals, in the case of exposure to high doses of zinc, poisoning occurs, and this poisoning may mostly result from the accidental ingestion of household products containing zinc or nutritional supplements, this study was conducted to find out the effects of zinc on the concentration of amino acid. A total of 30 adult white mouse males were taken and divided into three groups; the first group (control) of 10 mice taken with distilled water for 30 days, the second group includes 10 mice that were dose with Zn drug concentration of 50 mg/kg/day for 30 days, the third group includes 10 mice that wer
... Show MoreThe corrosion behavior of carbon steel at different Temperatures and in water containing different sodium chloride
concentrations under 3 bar pressure has been investigated using weight loss method . The carbon steel specimens were
immersed in water containing (100,400,700,1000PPM) of NaCl solution and under temperature was increased from
(90-120ºC) under pressures of 3 bar. The results of this investigation indicated that corrosion rate increased with NaCl
concentrations and Temperature.
The research aimed to identify the effect of educational complexes use among the students of the first year students in Quran modernists curriculum department of Quran sciences and Islamic education . The research consisted of ( 60 ) male and female members , ( 30 ) represented the experimental group and ( 30 ) represented the controlled group . the group were randomly selected . for the prepared an achievement test included thirteen questions . Results were processed by using descriptive and statistical analyses to answer the questions of the study . also the researchers used suitable and typical and dual difference analysis . in the results , the researchers recommended a number of recommendations
The aim of the research is to investigate potential effects of the finance industry and block-chain to general business of financing in particular, as well as its shortcomings and difficulties. To answer the research questions, the researcher used the objective narrative-analytical descriptive approach and included a qualitative analysis of Blockchain technology. The process of Blockchain technology based on their industries, the authors were selected based on their reputation in the Blockchain field. The research found that Blockchain can improve the efficiency of the banking industry's various sections. It has the ability to upgrade and transfer wages across borders, financial reporting and compliance, as well as trade finance
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More