يهدف البحث الى أعداد بعض تمرينات الاساسية لسلاح الشيش بأستخدام المرايا في تطوير قدرة مستوى تعلم الطالبات في المبارزة ومعرفة الفروق بين المجموعتين التجريبي والضابطة بتأثير استخدام المرايا في مستوى اداء بعض مهارات سلاح الشيش لطالبات المرحلة الثالثة , وقد أستخدمت الباحثتان المنهج التجريبي على عينة من طالبات المرحلة الثالثة , وقد بلغ عددهم (45) طالبة , وقد خرجت الباحثتين بعدة أستنتاجات وهي:- - أن المنهاج التعليمي
... Show MoreThe goal of the study is to discover the best model for forecasting the exchange rate of the US dollar against the Iraqi dinar by analyzing time series using the Box Jenkis approach, which is one of the most significant subjects in the statistical sciences employed in the analysis. The exchange rate of the dollar is considered one of the most important determinants of the relative level of the health of the country's economy. It is considered the most watched, analyzed and manipulated measure by the government. There are factors affecting in determining the exchange rate, the most important of which are the amount of money, interest rate and local inflation global balance of payments. The data for the research that represents the exchange r
... Show MoreThe use of foam electrodes as a cathode has proven its efficiency in wastewater treatment. In this study, methyl orange (MO) was treated by Electro-Fenton technology (EFT) using a copper foam (Cf) as a cathode. EFT was an advanced strategy for MO degradation, which accomplished excellent degradation efficiency (%ReMO) exceeded 98% over 35 min treatment period at prime conditions using 0.124 mM of iron salts (FeSO4.7H2O), 0.3 LPM of air flow, 0.2 mA/cm2 of current density (CD), and initial pH of 3.0. The outcomes showed that the air flow rate had the main impact on the %ReMO. Furthermore, the contribution of anodic oxidation (AO) to dye removal was investigated to distinguish its role relative to the EFT mechanism, revealing that the MO degr
... Show MoreIn this study, the fission track registration technique with the CR-39 detector are using to determination the uranium concentrations for seventeen samples of teeth distributed in four districts in Baghdad City .Five samples taken from both Al-Durra District and Al-Jadiriyia District, Four samples taken from Al-Karrda (Alaatar street) Taken four samples and three samples taken from Al-Zuafrania and by 0.5gm in weight and 1.5 mm in thickness. The uranium concentrations in teeth samples measured by using fission tracks registration in (CR-39) track detector that caused by the bombardment of (U) with thermal neutrons from (241 Am-Be) neutron source that has flux of (5 ×103 n cm-2 s-1). The concen
... Show MoreThe removal of heavy metal ions from wastewater by ion exchange resins ( zeolite and purolite C105), was investigated. The adsorption process, which is pH dependent, shows maximum removal of metal ions at pH 6 and 7 for zeolite and purolite C105 for initial metal ion
concentrations of 50-250 mg/l, with resin dose of 0.25-3 g. The maximum ion exchange capacity was found to be 9.74, 9.23 and 9.71 mg/g for Cu2+, Pb2+, and Ni2+ on zeolite respectively, while on purolite C105 the maximum ion exchange capacity was found to be 9.64 ,8.73 and 9.39 for Cu2+, Pb2+, and Ni2+ respectively. The maximum removal was 97-98% for Cu2+ and Ni2+ and 92- 93% for Pb2+ on zeolite, while it was 93-94% for Cu2+, 96-97% for Ni2+, and 87-88% for Pb2+ on puroli
This study seeks to shed light on the aspects of visual pollution and its impact on the aesthetics of the town of Al-Eizariya known to suffer from the phenomenon. In order to identify the real causes of the problem which develops in various forms and patterns, threatening not only the aesthetic appearance of the towns, but also causes the emergence of new problems and phenomena that will have negative repercussions on the population. The researcher uses the analytical descriptive method to analyze the phenomenon of visual pollution in terms of reality, development, manifestations and spread and uses photos which document the visual pollution and its impact on the aesthetics of the known. The study concluded the existence of a strong rela
... Show MoreThe intellectual and religious characteristics were an influential presence in the same Andalusian poet, especially among the poets of Beni El-Ahmar because they are part of the heritage of poets, and that is to push them towards the glory of this heritage and to take care of it and benefit from its inclusion, inspiration and similarity.
That this inflection on the poetic heritage is justified by the poets of the sons of the Red were inclined to preserve the inherited values, especially as it was related to their poetry, especially that the Andalusian poet did not find embarrassment in the inspiration of heritage and emerged when he mentioned the homes and the ruins and the camel and the journey, although the community Andalusian
... Show MoreIn a common language based on interpretation and diagnosis in the symbols and signs, the subject of Sufism and artistic semiotics is manifested in the construction and intensity of the reading of the text and the dismantling of its intellectual systems.
The emergence of Sufism in its religious features and the spiritual revelations related to the divine love of life in absolute reality, And images and language in a stream of intellectual and artistic unique and harmonious communicates with the subject of the themes of the Arab literature and its implications, but it is separated by a special entity signals and symbols related to the mysticism and worship.
The unleashing of the imagination and the diagnosis,
Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More