This research is an attempt to develop exercise with weights to strengthen some of the striking muscles in the shoulder and arm and to develop the accuracy of the smash and rectum skills. The importance of this paper lies in the study of moments of force to achieve the ability to control muscular work and to explore the impact of physical and skill exercises with weights to develop moments of force for some muscles. The experimental method on a sample of players, selected according to the intentional method, including ( 9) advanced players representing Air Force Club participating in the Premier League for season 2011-2012. It is concluded that the exercises proposed have their effective impact on developing the variables of moments force for some of the active and striking muscles of the shoulder and arm joint as well as the accuracy of the smash and rectum skills. It is highly recommended that emphasis be laid on the use of weight exercises according to the theory of moments depending on optimum resistance in determining the intensity of the exercises.
The Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modifie
... Show Moreתקציר :
המחקר הזה הוא ניסיון לשפוך אור על נושא מרכזי וחשוב בחייהם של היהודים, "הממד הדתי" אצל היהודים, מחקרי הנקרא "הממד הדתי בסיפור העברי המודרני" גם מתייחס להשפעת התרבות הדתית של המספר והחוג המשפחתי שחי בו, ואיך שיקף המספר את כל הדברים האלה ביצירותיו הסיפורית .
המספר בוחר במילים ובמונחים בעלי משמעויות דתיות או מביא את הסיפור הזה אשר קרוב אל נושא הסיפור ההולך באותה מגמה .גם כן השפעת התיאולג
... Show MoreMobile advertising has become the product of an influential actor in the creation of design ideas that attract the recipient, according to the needs of the society and the interactions of the technological technical age, what the technologies of the mock programs do and what corresponds to the expectations of the recipient, and what the design methods achieve of synchronization and sound in which all The research has found ways to address the most exciting and important snapshots and focus on diversity and diversity, formality, image and color, and what the optical degrees and chromatography achieve sought to attract attention, which contributes from the point of view of the researchers in the field of accuracy, clarity, attention and co
... Show MoreThis study was conducted with the aim to extract and purify a polyphenolic compound “ Resveratrol†from the skin of black grapes Vitis vinifera cultivated in Iraq. The purified resveratrol is obtained after ethanolic extraction with 80% v/v solution for fresh grape skin, followed by acid hydrolysis with 10% HCl solution then the aglycon moiety was taken with organic solvent
( chloroform). Using silica gel G60 packed glass column chromatography with mobile phase benzene: methanol: acetic acid 20:4:1 a
... Show MoreNonmissile penetrating traumatic brain injuries (pTBIs) are low-velocity injuries which can be caused by a variety of inflicting tools and represent a rare entity in children. Poor outcome has been attributed with an initial admission Glasgow Coma Scale (GCS) of <5, asymmetrical pupil size, and specific initial computed tomography scan findings including brainstem injury.
We report a case of an 11-year-old boy who presented to our ER with a GCS of 6 after being assaulted on his head by a 30 cm length metallic tent hook penetrating his forehead reaching down to the central skull bas
Manipulation is a discursive concept which plays a key role in political discourse by which politicians can impose some impact on their recipients through using linguistic features, most prominent of which are personal pronouns (Van Dijk, 1995). The aim of this study is to investigate how politicians utilize the personal pronouns, namely; We and I and their possessive forms as a tool of manipulating the audience's mind based on Van Dijk's "ideological square" which shows positive-self representation and negative-other representation (Van Dijk,1998:p.69). To this end, American President Donald Trump's 2020 State of the Union speech was chosen to be the data of analysis. Only (8)
... Show MoreThe aim of t his p aper is t o const ruct t he (k,r)-caps in t he p rojective 3-sp ace PG(3,p ) over Galois field GF(4). We found t hat t he maximum comp let e (k,2)-cap which is called an ovaloid, exist s in PG(3,4) when k = 13. Moreover t he maximum (k,3)-cap s, (k,4)-cap s and (k,5)-caps.
Background :Thalassemia is an autosomal
disease of the haemoglobin. Two types of
thalassemia are recognized: thalassemia major
and thalassemia intermedia.
The most serious cardiac complication in
thalassemia major is due to multiple blood
transfusions rather than the disease itself, which
is due to iron overload.
Cardiomyopathy is the most common cardiac
defect that occurs with iron overload. Pricarditis,
congestive heart failure and arrhythmias are due
to hemosidrosis and chronic aneamia.
Aim of the study: to demonstrate the prevalence
and types of electrocardiographic changes among
thalassemic patients with aged over ten years old.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More