مستخلص البحث أهمية البحث عن طريق إعداد برنامج تدريبي يعتمد هذه الطريقة التدريبية في تطوير التحمل الخاص عن طريق العمل على بناء مستوى جيد من التحمل الخاص لدى اللاعبين الشباب في مرحلة الإعداد الخاص, تحقيق نتائج جيدة على مستوى أداء الواجبات المهارية والخططية المطلوبة منه في أثناء زمن المباراة, حيث ارتأت الباحثة من خلال إعداد برنامج تدريبي إلى رفع مستوى (التحمل الخاص) لدى لاعبي كرة القدم وبالتالي يمكنها أن تساعد على استمرار تطبيق الأداء المهاري للاعبين بشكل جيد من بداية زمن المباراة حتى نهايتها, واستخدم الباحث التجريبي بالاختبار القبلي والبعدي للمجموعتين التجريبية والضابطة لملائمته لطبيعة البحث, وتم تحديد مجتمع البحث لاعبي نادي الكرخ الرياضي للشباب بكرة القدم للموسم الرياضي 2021, والبالغ عددهم (24لاعب)، اذ تم اختيار عينة البحث بأسلوب الحصر الشامل وقسمت العينة الى مجموعتين التجريبية والمجموعة الضابطة وبواقع ( 12 لاعب) لكل مجموعة وتم تطبيق تـمرينات الـلعب بمساحـات مختلفـة في تطوير التحمل الخاص ولمدة ثمانية أسابيع وبواقع ثلاث وحدات تدريبة في الأسبوع الواحد واستخدم الباحث الحقيبة الاحصائية (spss) وتوصل الباحث إلى أهم الاستنتاجات تـمرينات الـلعب بمساحـات مختلفـة في تطوير التحمل الخاص في دقة أداء بعض المهارات الأساسية للاعبي كرة القدم الشباب الكلمات المفتاحية : تـمرينات الـلعب بمساحـات مختلفـة , التحمل الخاص, كرة القدم
The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show MoreThis research includes the application of non-parametric methods in estimating the conditional survival function represented in a method (Turnbull) and (Generalization Turnbull's) using data for Interval censored of breast cancer and two types of treatment, Chemotherapy and radiation therapy and age is continuous variable, The algorithm of estimators was applied through using (MATLAB) and then the use average Mean Square Error (MSE) as amusement to the estimates and the results showed (generalization of Turnbull's) In estimating the conditional survival function and for both treatments ,The estimated survival of the patients does not show very large differences
... Show Moreيهدف البحث الى التعرف على اثر استراتيجية نجمتين وامنية في تحصيل مادة الكيمياء عند طلاب الصف الثاني المتوسطولتحقيق هدف البحث تم اتباع المنهج التجريبي ذو الضبط الجزئي وتم تحديد مجتمع البحث بطلاب الصف الثاني المتوسط لجميع المدارس الثانموية والمتوسط التابعة لمديرية تربية الكرخ الثانية وتم اخنيار احد هذه المداس بصورة قصدية لتطبيق تجربة ابلبحث الحالي
The aim of this research is to make a new investigation of a scientific thesis in Arabic Morphology in which an allusion occurred in relation to its real author and its title, there is alot of dropping and flaw when it was first applied due to depending on one written transcript
Material Requirements Planning System (MRP) is considered as one of the planning and controlling of production and inventory systems which is used to prepare plan of the final production requirements and its parts of subcomponents raw materials and the time at which it was needed for the purpose of preparing orders of production and purchase.
The problem of the present work is represented in the general company of electrical industrialization adoption of traditional methods and personal experience of the process of the products and\or purchase quantity and inventory quantities and limiting the required time for acquiring the required quantities of the materials and parts used in the finish product of the
... Show MoreAbstract:
Purpose\The researcher paper aims to determine the impact of information technology on the job performance, for Iraq private ban as through the use of technology dimensions of job performance.
The aim of this research: this study aims to discuss the importance of information technology and its role in achieving job performance and its impact on the Iraq banking sector design/ methodology/ approach used entrance design/methodology/approach- pilot, the questionnaire was used to collect data in order to develop a model to measure reliably and correctly to the variables of information technology and job performance, and hypotheses were tested through the use of some statisti
... Show MoreStarting from the term (forbidden montage) initiated by the French critic (Andre Bazin) as a method of processing the movies that depend on (mise en scene) achieved by the action of the camera and its ability to photograph and employ the depth of the field, in addition to the possibility of free movement without interruption in the filming environment in order to avoid montage as much as possible (the montage that distorts focus and distracts attention and moves away from realism, which is the most important theoretical pillar of Bazin in photography). The pursuit was behind a cinema that depicts its topics in one integrated snapshot with all its details thus approximating reality without any interference of montage. Our study sta
... Show MoreSince the advent of the sunrise of the immortal message, Islamic legislation has always established justice and the right guidance, and has prevented any perversion, injustice or corruption, with a divine system that called in its course the characteristics of the legislation on its general basis and its ability to develop, progressivity, and paving the way with a collective approach, accompanied by the worldly and moral punishment. When the corrupters went too far, reformers were delayed and values were missed; Mankind has been afflicted with the scourge of injustice and loss, and has lost sight of the approach that the Creator of the world has given to the people of the world, for what would guide them in their affairs sooner and later
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More