Shooting skill in basketball is one of the most important offensive skills and the final stage of the team's attack and the culmination of all skills in which points are scored, including the skill of peaceful shooting. The research aims to prepare competitive exercises and understand the impact of competitive exercises on developing coordination and balance for basketball players under 18 years old. The researcher used the experimental method with the single experimental group approach, including the research community of female athletes in the public directorates of education in Baghdad, totaling (6) directorates and (72) players. The research sample was selected intentionally, consisting of female athletes in the sports activity of the Directorate of Education in Baghdad / Al-Karkh First, totaling (12) players, with a percentage of 67.16%. The researcher concluded that competitive exercises have an impact on developing coordination, balance, and peaceful shooting skills for female players, showing differences in all research variables of coordination, balance, and the development of peaceful shooting skills. The researcher recommends the necessity of benefiting from prepared exercises in training units after proving their role in development and emphasizing that basketball coaches should use competitive exercises in line with the specific performance of basketball during games.
The subject of social capital is of great importance, as it provides an analytical framework for researchers interested in understanding the impact of the Internet on many dimensions of human and social life. And because social networking sites have infiltrated societies and produced new variables at the level of human and social communication, this study came to examine the relationship between the use of the social networking site Facebook and the accumulation of social capital among a sample of University of Algeria 3 students, by researching the variables of intensity of use and patterns of use as independent variables and their relationship to social capital. The results of the field study revealed a strong relationship between the
... Show MoreThis Paper assesses the knowledge management system (KMS) requirements at Al-Ameed University concerning ISO 30401:2022. Specifically, the research aims to ascertain the degree to which international standards have been complied with and gaps that have been identified. A case study was conducted using field observations, interviews, and checklists to assess the institution's compliance with the KMS framework. The level of implementation and documentation of knowledge management processes was assessed using a seven-point scale. The findings reveal that Al-Ameed University has severe gaps in knowledge creation, sharing, and support for knowledge management in terms of strategic leadership. While certain elements like availability of r
... Show MoreThis study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th
... Show Moreأن السياسة النقدية في العراق لم تشهد تحسناً كبيراً في دورها المطلوب
منها، وهذا يعود الى جملة من التغيرات على أدائها ودورها في التأثير على المتغيرات الأقتصادية المهمة، اذ حصلت ظروف صعبة على المستوى السياسي والأقتصادي اسهمت في أضعاف دورها في العراق. فالحروب العسكرية الثلاثة في وقت قياسي دمرت البنى التحتية للأقتصاد العراقي، وأخرت عملية التنمية الأقتصادية والبشرية لعدة عقود بسبب الأستنزاف الكبير للمو
Background: Health information systems in most countries are inadequate in providing the needed management support and the current health information systems are therefore widely seen as management obstacles rather than as tools,Objectives: the current study is an attempt to assess the behavioral and organizational determinants of health information system performance in Iraq.Methods: A cross-sectional study was conducted by interviewed a total of 189 respondents selected from six Iraqi governorates. The Organizational and Behavioral Assessment Tool was used to measure the behavioral and organizational determinants of health information system performance, it is one of the PRISM package tools that are used to assess the health informatio
... Show MoreThe current study used extracts from the aloe vera (AV) plant and the hibiscus sabdariffa flower to make Ag-ZnO nanoparticles (NPs) and Ag-ZnO nanocomposites (NCs). Ag/ZnO NCs were compared to Ag NPs and ZnO NPs. They exhibited unique properties against bacteria and fungi that aren't present in either of the individual parts. The Ag-ZnO NCs from AV showed the best performance against E. coli, with an inhibition zone of up to 27 mm, compared to the other samples. The maximum absorbance peaks were observed at 431 nm and 410 nm for Ag NPs, at 374 nm and 377 nm for ZnO NPs and at 384 nm and 391 nm for Ag-ZnO NCs using AV leaf extract and hibiscus sabdariffa flower extract, respectively. Using field emission-scanning electron microscopes (FE-
... Show More
This paper analyses the relationship between selected macroeconomic variables and gross domestic product (GDP) in Saudi Arabia for the period 1993-2019. Specifically, it measures the effects of interest rate, oil price, inflation rate, budget deficit and money supply on the GDP of Saudi Arabia. The method employs in this paper is based on a descriptive analysis approach and ARDL model through the Bounds testing approach to cointegration. The results of the research reveal that the budget deficit, oil price and money supply have positive significant effects on GDP, while other variables have no effects on GDP and turned out to be insignificant. The findings suggest that both fiscal and monetary policies should be fo
... Show Moreيهدف البحث الحالي الى استكشاف علاقات التفاعل والتاثير بين الاحتكام للمكانة والتوجه للفردية– الجماعية والدمج التنظيمي مستنداً على مزج اختلاف القيم الشخصية مع افكار نظرية الهوية الاجتماعية لبلورة نموذج البحث. وفي ضوء هذا تم صياغة عدد من الفرضيات التي توضح علاقات التفاعل ما بين ابعاد الاحتكام للمكانة والتوجه للفردية– الجماعية للتنبؤ بوجود الدمج التنظيمي. جمعت البيانات باستخدام استمارة الاستبيان ووزع
... Show MoreIndium oxide In2O3 thin films fabricated using thermal evaporation of indium metal in vacuum on a glass substrate at 25oC using array mask, after deposition the indium films have been subjected to thermal oxidation at temperature 400 °C for 1h. The results of prepared Indium oxide reveal the oxidation method as a strong effect on the morphology and optical properties of the samples as fabricated. The band gap (Eg) of In2O3 films at 400 °C is 2.7 eV. Then, SEM and XRD measurements are also used to investigate the morphology and structure of the indium oxide In2O3 thin films. The antimicrobial activity of indium oxide In2O3 thin films was assessed against gram-negative bacterium using inhibition zone of bacteria which improved higher ina
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More