The game of volleyball, like all other sports, has been made by new amendments, the most important of which is the system of what is not the system of the free player in 1998, which gave added importance to the skills of receiving the transmission and defending the stadium being one of the important skills where the law allowed the free player to move and position in the back positions of the stadium Limited support mainly defensive skills. This is to make the state of stability and balance between defensive and offensive skills, which helps in the development of the game and make it exciting and enjoyable for players and fans. Therefore, the researchers decided to shed light by identifying the percentage of the contribution of the free player Albro by playing areas (1,5,6) and here lies the problem of research in identifying the role of the libero player and his contribution to the development of defensive skills (reception and defense of the field) during the match to create a state of balance and stability between attack and defense. Through the research procedures, which included conducting some personal interviews by the researchers with some coaches in the game of volleyball and academic specialists in the field of the game about the role and importance of The libero player in an attempt by the researchers to identify the most productive areas of the libero player and the best skills he has, as the research aims to identify the percentage of the contribution of some defensive skills to the libero player by play areas (1,5,6) As for the imposition of the research, there was a discrepancy between the percentage of the contribution of some defensive skills to the free player by play areas (1,5,6) and the researchers dealt with some similar studies related to the subject of the research The research methodology and field procedures were through the use of the researchers descriptive approach either The research community determined the teams participating in the Premier Volleyball League for the season (2022_2023) The second stage with the participation of 8 teams The research sample consisted of 8 players, namely the free player (libero) in the research sample Rafqa to the following (1,5,6) Ranking of playing centers according to the percentage of the contribution of the reception skill
This research was dealing with the aesthetic impact of encryption in form and content and aesthetic implications in the design of contemporary fabrics. That's where the design of the cloth is linked to the continuous development and continuous innovation and the pursuit of the all-new innovative designs and at the same time an unmarked Cryptographic with semantics and symbols reflect reality aesthetically pleasing and contains four chapters on the research :The first chapter discusses the research problem and its significance is the current quest ( encryption in form and content in contemporary designs fabrics and aesthetic implications ) in that it shows the importance of encryption in the design of fabrics and foundation design configu
... Show MoreBackground: A case-control study design revealeda relationship between the present of fluoride, and the reduction of dental caries and the increase prevalence and severity of dental fluorosis .The aim of this study was to assess the prevalence and severity of dental caries in relation to dental fluorosis among school children in Al-Muthana'a Governorate. Materials and methods: It was conducted among primary school students aged 12 years old, the age was taken according to the criteria of World Health Organization (1997) (1).The number of students was selected in each sector of control group according to number of schools in that sector .Sectors of control group which depend on water of river as source of drinking water. Case group which inc
... Show MoreAim: The Aim of the study is to compare between Er,Cr:YSGG 2780 nm laser and carbide fissure bur in root-end resection regarding the morphological variations, temperature changes and the duration of resection process.
Settings and Design: 5 W, 25 Hz, 50% water, 80% air,25.47 J/cm2 .
Material and method: twenty-one extracted single rooted teeth endodontically were treated, twenty teeth were obturated and divided into two groups according to method of resection. Group 1 root-end resected using cross cut carbide bur while group 2 root-end resected using laser with MGG6 sapphire tip of 600 μm diameter. Temperature on external root surface and duration of resection were recor
... Show MoreMy research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr
... Show MoreBackground: Prolapsed intervertebral disc is an important and common cause of low backache. MRI has now become universally accepted investigation for prolapsed intervertebral disc. We, however, regularly come across situations, when MRI shows diffuse disc bulges, even at multiple levels, which cannot be correlated clinically and when such cases are operated, no significant disc prolapse is found resulting in negative exploration. Objective: To evaluate the role of M.R.I. finding not only for diagnosis of disc herniation at lumbar region but also for localization the level of herniation Methods: A prospective study on seventy five symptomatic low backache and MRI confirmed prolapsed intervertebral disc patients at lumbo-sacral region were op
... Show MoreThe research (Virtual Reality Technology and its Uses in Industrial Product Design) is interested in the virtual reality technology used in the industrial product design and consequently knowing the functions achieved in the industrial product according to the data of that technology which participates in activating the mental and imaginary image of the user which show the parameters of the technical transformation of that product. The terms used in the research have been defined to guide the reader. The second chapter, the theoretical framework consisted of three sections the first is concerned with technology in the industrial design. The second is concerned with the virtual environment and the virtual reality. The thirds chapter consi
... Show MoreMixed convection heat transfer in a vertical concentric annulus packed with a metallic porous media and heated at a constant heat flux is experimentally investigated with water as the working fluid. A series of experiments have been carried out with a Rayleigh number range from Ra=122418.92 to 372579.31 and Reynolds number that based on the particles diameter of Red=14.62, 19.48 and 24.36. Under steady state condition, the measured data were collected and analyzed. Results show that the wall surface temperatures are affected by the imposed heat flux variation and Reynolds number variation. The variation of the local heat transfer coefficient and the mean Nusselt number are presented and analyzed. An empirical
... Show MoreVehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina
... Show More