تعد لعبة كرة السلة من الألعاب الرياضية التي تحتاج متطلبات بدنية ووظيفية خاصة بها، وذلك من خلال الانتقال داخل الملعب بالكرة أو بدونها والسبل للتخلص من ملاحقة الخصم أثناء الدفاع وكيفية المناورة أثناء الهجوم مع إجادة التصويب بكافة أنواعه داخل الملعب، ومن هنا تكونت مشكلة البحث في كيفية تطوير تلك العوامل الوظيفية والتي لها الأثر في الارتقاء بمستوى أداء اللاعب أثناء اللعب، وعن طريق استخدام الباحثان لطريقة جهاز ا
... Show MoreInherent fluctuations in the availability of energy from renewables, particularly solar, remain a substantial impediment to their widespread deployment worldwide. Employing phase-change materials (PCMs) as media, saving energy for later consumption, offers a promising solution for overcoming the problem. However, the heat conductivities of most PCMs are limited, which severely limits the energy storage potential of these materials. This study suggests employing circular fins with staggered distribution to achieve improved thermal response rates of PCM in a vertical triple-tube heat exchanger involving two opposite flow streams of the heat-transfer fluid (HTF). Since heat diffusion is not the same at various portions of the PCM unit,
... Show MoreAbstract
Business organizations are using the technological innovations like cloud computing (CC) as a developmental platform in order to improve the performance of their information systems. In that context, our paper discusses know-how in employing the public and private CC to serve as platforms to develop the evaluation system of annual employees' performance (ESAEP) at Iraqi universities. Therefore, we ask the paper question which is “Is it possible to adopt the innovative solutions of ICTs (Like: public and private CC) for finding the developmental vision about management information systems at business organizations?”. In addition, the paper aim
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreVideo copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show MoreBelgium is one of the countries that headed towards federalism through a peaceful transition, and over a few decades the country has witnessed deep transformations in its institutions, from a unified and central state in the early nineteenth century to a federal union, regional operations began since 1970 up and constitutionally established its diversity Linguistic and regional, the so -called "state reforms" have been implemented, which led to the emergence of political repercussions. The country has suffered about two decades ago, which caused many national governments that are considered to be among the Luxor in the modern political history of Belgium, However, institutional reforms to achieve the stability of the political system began,
... Show MoreWA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show MoreIraq is changing from the centralized system of governance to the decentralized system, which assumes devolution of more authorities to the local governments of Iraqi provinces and cities. This puts a responsibility on the academics to produce more research work on the best framework for this change, to ensure the best results. The main objective of this research is to suggest a policy for the decentralized transformation in domain of Urban and Regional Planning in Iraq. A suggested program for the transformation is involved in the paper as well, with analysis for the new relationships between different levels of planning authorities depending on democracy. In addition, a description for planning process flows from bottom to top.