Swimming has now become the focus of attention of specialists, which has led to the search for the best methods and various methods of training, which rely heavily on scientific research and studies, through the use of proper planning and a comprehensive scientific and practical vision in the preparation and training process for this game. Some studies have proven that The use of training methods has a positive role in the athletic training of the swimmer, provided that these methods are used in the correct way according to the scientific principles of training and with the loads and stresses that serve the specialized activity, i.e. the swimming distance. The study aimed at the follow 1- Preparing exercises using elastic ropes 2- Knowing the effect of elastic rope exercises to develop special endurance and achieve 200m swimming Free. An experimental design with a tightly controlled heart and post test was used for the pre and post tests, and the research sample was chosen by the intentional method. Conclusions The researchers put forward a set of the following recommendations, which must be emphasized when training with the help of the means under consideration, the most important of which 1- It is necessary to introduce swimming coaches to the importance of how to use training methods and how to properly use them in the water enviro 2-Emphasis must be placed on providing tools and training means that are consistent with the age and gender of swimmers and the specificity of free swimming when used in training.
Background: A great dental and biomedical interest had been paid to silver nanoparticles because of their antimicrobial activity. Objective: To evaluate the antimicrobial and cytotoxic activity of a newly developed Nano-silver fluoride that was synthesized from moringa oleifera leaf extract against S. mutants. Material and method: The green synthesis method was used to prepare Nano-silver fluoride from moringa oleifera leaf extract. The minimum inhibitory concentration and the minimum bactericidal concentration were evaluated using brain heart infusion plates, while the cytotoxicity was evaluated by the hemolytic activity. Results: Nano-silver fluoride had a bactericidal and bacteriostatic effect (MIC was 60 ppm a
... Show MoreBackground: Plaque retention during fixed orthodontic therapy is an important cause of developing enamel demineralization. The purpose of this study was to evaluate the effect of different brackets types on the count of Streptococcus Mutans in orthodontic patients using conventional fluoridated toothpaste. Materials and Methods: Plaque samples were collected from maxillary 1st premolar teeth of twenty right handed patients (using split mouth technique) before bonding, after 48 hrs of bonding using tooth brush only, and after 2 weeks of using fluoridated toothpaste. Stainless steel bracket was bonded on right first premolar while the left one was bonded with sapphire bracket. The calculation of the Streptococcus Mutans count was done usin
... Show MoreBackground: Fixed orthodontic appliances impede the maintenance of oral hygiene and result in plaque accumulation leads to enamel demineralization caused by acids produced by bacteria. Studies on plaque control strategies in orthodontic populations are limited. This might be caused by difficulties in the quantitative evaluation of dental plaque because the teeth have various levels of bracket coverage, and different tooth sizes and malocclusions, making the traditional categorical indices complex. The present study aims to evaluate the effect of different hygiene protocols on plaque quantity on bands with different attachments. Materials and method: Twenty patients had four bands within the orthodontic appliance. Then randomly divided into
... Show MoreThe research aims to know the influence of the intellectual capital on the internal control system in a sample of General Inspection Offices in Iraq. The research includes a sample of individuals who are working in these offices total sample (46) individuals distributed according to functional levels (General Inspector, Deputy Inspector General, and Director) , The data and information were collected by using questionnaire, which is done for this purpose, as well as personal interviews in order to reach to the results that achieve the aim of this research , Two hypotheses were formed , the first hypothesis consists of (4) secondary hypothesis , All these hypotheses were tested by using statistical tools such as (percentages, freq
... Show MoreThe purpose of this study was to investigate the effect of a Cognitive- Behavioral Training Program in reducing Problems Solving among a sample of education university College Students, the study sample consisted of (50) students were randomly assigned to two groups: experimental, and control; (25) students per group, the results of (ANOVA) revealed that there were significant differences at (p < 0.05) between experimental and control group in Problems Solving level, while there were significant differences between both groups in achievement. The researchers recommended further studies on the other variables which after training students on the method of solving problems and techniques to reduce stress.<
... Show MoreThe research aims to enhance the level of evaluation of the performance of banking transactions control policies and procedures. The research is based on the following hypothesis: efficient transactions control policies and procedures contribute enhancing financial reporting, by assessing non-application gap of those policies and procedures in a manner that helps to prevent, discover, and correct material misstatements. The researchers designed an examination list that includes the control policies and procedures related to the transactions, as a guide to the bank audit program prepared by the Federal Financial Supervision Bureau. The research methodology is
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show More