The sport of polo, the game of kings and sultans, is one of the traditional sports that has defied time throughout its long history. It has preserved its historical roots and been able to adapt to contemporary requirements, societal transformations, and temporal and spatial variables. It has moved from an aristocratic sport practiced as a form of entertainment to a professional competitive sport. It attracts many players and millions of viewers, so it is a living model of how sports develop and transform from a local tradition into global sports with organized rules managed by international institutions and with many championships worldwide. Through this, the research objectives were formulated, including exploring sports' origins. Polo in the royal court, and studying the development of the sport of polo throughout its historical eras. To shed light on the institutions, clubs, and personalities contributing to the spread and development of the sport of polo globally, the historical approach was relied upon for its suitability and the nature of the problem. The most prominent conclusions were that the origins of the game of polo go back to Persia. Historical records have proven that it appeared in the sixth century BC, and it was called Chavgun. The establishment of the International Polo Federation in 1982 played a pivotal role in the history of the sport of polo through its contribution to enhancing the image and status of the sport of polo globally
The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show MoreThe message of our Prophet Muhammad (peace and blessings of Allaah be upon him) was the most complete of the messages, and the conclusion of the messages and completed by the mercy of this nation. Al-Khalal al-Baghdadi al-Hanbali (may Allaah have mercy on him) was a scholar who updated his writings. And The Nha Brhnha and became an independent and arranged doctrine Such a world of Galilee Hambali must show his character and his knowledge and its impact on the Islamic arena.
Wireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th
... Show MoreIntroduction: Cutaneous leishmaniasis (CL) is a common protozoan disease in Iraq characterized by localized ulcers, primarily on exposed skin. This study aimed to investigate the hematological parameters of infected patients using a complete blood count (CBC) in the endemic area of Diyala Governorate, northeast of Baghdad. This has been studied in newly diagnosed, untreated individuals and patients receiving sodium antimony gluconate. Methodology: Hematological screening was performed on blood samples from 161 patients with microscopically diagnosed cutaneous leishmaniasis before and after treatment. Anti-Leishmania IgG was also assessed by ELISA in seropositive and seronegative subjects. Results: The newly diagnosed, untreated pati
... Show MoreVisualization of water flow around different bluff bodies at different Reynolds number ranging (1505 - 2492) was realized by designing and building a test rig which contains an open channel capable to ensure water velocity range (4-8cm/s) in this channel. Hydrogen bubbles generated from the ionized water using DC power supply are visualized by a light source and photographed by a digital camera. Flow pattern around a circular disk of (3.6cm) diameter and (3mm) thickness, a sphere of (3.8cm) diameter and a cylinder of
(3.2cm) diameter and (10cm) length are studied qualitatively. Parameters of the vortex ring generated in the wake region of the disk and the separation angle of water stream lines from the surface of the sphere are plott
My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr
... Show MoreThe Electric Discharge (EDM) method is a novel thermoelectric manufacturing technique in which materials are removed by a controlled spark erosion process between two electrodes immersed in a dielectric medium. Because of the difficulties of EDM, determining the optimum cutting parameters to improve cutting performance is extremely tough. As a result, optimizing operating parameters is a critical processing step, particularly for non-traditional machining process like EDM. Adequate selection of processing parameters for the EDM process does not provide ideal conditions, due to the unpredictable processing time required for a given function. Models of Multiple Regression and Genetic Algorithm are considered as effective methods for determ
... Show More