أهمية البحث اعداد تدريبات الهيت في تطوير القوة الانفجارية وفقا لمؤشر معدل النبض التي تتطلب تكيف الأداء البدني للوصول إلى كفاءة عالية لدى لاعبي الريشة الطائرة. يهدف البحث اعداد تدريبات الهيت في تطوير القوة الانفجارية وفقا لمؤشر معدل النبض لدى لاعبي الريشة الطائرة وكانت مشكلة البحث إن تنوع لأساليب التدريبية واختلاف تأثيراتها يجعلان لاعبي الريشة الطائرة بحاجة إلى إعداد بدني يتناسب مع إمكانياتهم وقدراتهم البدنية ، ومن خلال خبرة الباحث الميدانية لاحظ وجود هبوط في مستوى الاداء اثناء اللعب حيث ارتى الباحث الوقوف عن هذا الهبوط والوقوف على نقاط الضعف الواضحة من القوة العضلية مع تكيف مؤشر معدل النبض التي لم يأخذ دوره وحجمه الحقيقين في عملية التدريب ضمن البرنامج المعدة من قبل المدربين وبأساليبها المختلفة مما ولد ضعفا وتأثيرا في مستوى الأداء لذا ارتأى الباحث دراسة هذه المشكلة للوصول الى نتائج إيجابية حيث استخدم الباحث المنهج التجريبي بتصميم المجموعتين التجريبية والضابطة ذات الاختبار القبلي والبعدي لملائمته طبيعة البحث. مجالات البحث هي المجال البشري لاعبي نادي المحاويل للموسم الرياضي 2024. والمجال الزماني المدة من السبت الموافق بتاريخ 6/1 /2024 الى يوم السبت الموافق بتاريخ 9/ 3 /2024. والمجال المكاني: القاعة الرياضية في النادي المذكور وتم تحديد مجتمع البحث من لاعبي الريشة الطائرة لفئة الشباب للموسم الرياضي2024 وبعدد 12 لاعب، واختيرت منهم عينة البحث بالطريقة العمدية (ن= 10) والتي مثلت نسبة مئوية قدرها (83.33%) وقسمت العينة الى مجموعتين تجريبية وضابطة (ن = 5 لكل مجموعة)، وكانت اجراءات التجانس والتكافؤ للعينة كما تبين في الجدولين 1، 2 اظهرت نتائج تحليل البيانات الإحصائية بين المجموعتين التجريبية والضابطة في الاختبارات البعدية وجود فروق دالة احصائياً في متغيرات البحث لصالح المجموعة التجريبية ، ويرى الباحث إن سبب التطور في نتائج الاختبارين البدنيين للذراعين والرجلين وتكيف معدل النبض في المجموعة التجريبية في الاختبار البعدي إلى فاعلية البرنامج المعد باستخدام تدريبات الهيت الذي عمل على تطوير القوة الانفجارية لعضلات الطرفين العلوي والسفلي واظهرت النتائج الى تفوق ملحوظ بين القياس القبلي والبعدي لتدريبات الهيت في تطوير القوة الانفجارية للمجموعة التجريبية ولصالح القياس البعدي أوصى الباحث الاهتمام بتدريبات الهيت في تطوير بعض القدرات البدنية لدى لاعبي الريشة الطائرة. يخدم البحث الهدف 3 من اهداف التنمية المستدامة (ضمان حياة صحية وتعزيز الرفاهية للجميع في جميع الأعمار). وهذا ما يحقق احد اهداف التنمية المستدامة للامم المتحدة في العراق (الصحة الجيدة).
Many isolated rural communities are located in regions where there is an abundant and reliable supply of solar energy, but where the distance to the nearest power station is many tens or even hundreds of kilometre. It is therefore mainly in these areas that rural electrification is now being provided by PV generators. since Stand-Alone PV generator can offer the most cost-effective and reliable option for providing power needed in remote places. Accordingly these isolated rural canters are fitted with PV for lighting, a refrigerator, a television and socket to supply kitchen appliances
The physical behavior for the energy distribution function (EDF) of the reactant particles depending upon the gases (fuel) temperature are completely described by a physical model covering the global formulas controlling the EDF profile. Results about the energy distribution for the reactant system indicate a standard EDF, in which it’s arrive a steady state form shape and intern lead to fix the optimum selected temperature.
Background: Health professionals have a crucial role in promotion, support and management of breastfeeding. To be effective in this effort, the clinician should focus on the issue from the preconception stage through pregnancy and delivery, and continue in subsequent infant care. Aim of the study: to assess the effectiveness of the UNICEF/WHO 40-hour of breast feeding training through the assess breastfeeding knowledge and attitudes of the health profession staff before and after training course.
In this paper, an estimate has been made for parameters and the reliability function for Transmuted power function (TPF) distribution through using some estimation methods as proposed new technique for white, percentile, least square, weighted least square and modification moment methods. A simulation was used to generate random data that follow the (TPF) distribution on three experiments (E1 , E2 , E3) of the real values of the parameters, and with sample size (n=10,25,50 and 100) and iteration samples (N=1000), and taking reliability times (0< t < 0) . Comparisons have been made between the obtained results from the estimators using mean square error (MSE). The results showed the
... Show MoreAutonomous motion planning is important area of robotics research. This type of planning relieves human operator from tedious job of motion planning. This reduces the possibility of human error and increase efficiency of whole process.
This research presents a new algorithm to plan path for autonomous mobile robot based on image processing techniques by using wireless camera that provides the desired image for the unknown environment . The proposed algorithm is applied on this image to obtain a optimal path for the robot. It is based on the observation and analysis of the obstacles that lying in the straight path between the start and the goal point by detecting these obstacles, analyzing and studying their shapes, positions and
... Show MoreOnline examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth
... Show MoreAs the prices of the fuel and power had fluctuated many times in the last decade and new policies appeared and signed by most of the world countries to eliminate global warming and environmental impact on the earth surface and humanity exciting, an urgent need appeared to develop the renewable energy harnessing technologies on the short-term and long-term and one of these promising technologies are the vertical axis wind turbines, and mostly the combined types. The purpose of the present work is to combine a cavity type Savonius with straight bladed Darrieus to eliminate the poor self-starting ability for Darrieus type and low performance for Savonius type and for this purpose, a three-bladed Darrieus type with symmetric
... Show MoreThis paper presents a hybrid energy resources (HER) system consisting of solar PV, storage, and utility grid. It is a challenge in real time to extract maximum power point (MPP) from the PV solar under variations of the irradiance strength. This work addresses challenges in identifying global MPP, dynamic algorithm behavior, tracking speed, adaptability to changing conditions, and accuracy. Shallow Neural Networks using the deep learning NARMA-L2 controller have been proposed. It is modeled to predict the reference voltage under different irradiance. The dynamic PV solar and nonlinearity have been trained to track the maximum power drawn from the PV solar systems in real time.
Moreover, the proposed controller i
... Show MoreThe time spent in drilling ahead is usually a significant portion of total well cost. Drilling is an expensive operation including the cost of equipment and material used during the penetration of rock plus crew efforts in order to finish the well without serious problems. Knowing the rate of penetration should help in speculation of the cost and lead to optimize drilling outgoings. Ten wells in the Nasiriya oil field have been selected based on the availability of the data. Dynamic elastic properties of Mishrif formation in the selected wells were determined by using Interactive Petrophysics (IP V3.5) software based on the las files and log record provided. The average rate of penetration and average dynamic elastic propert
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the