It is necessary to use the means of recovery and other means that help to get rid of the effects of fatigue, as the game of badminton and the effectiveness of running 800 meters fall within the mixed system with the superiority of the anaerobic system by more than the air system, so requires the development of energy systems In proportion to the time of the match for badminton players and their travels and high performance and ability to tolerate the high level of lactic acid in the muscles and blood and increase the pain associated with the fatigue that occurs during the performance. In light of the physical and physiological processes of these actions N it should seek through training programs to develop your endurance and wind energy systems and anaerobic together to perform and withstand voltage during the race and increase muscle efficiency in carrying lactic acid, which helps to delay the onset of fatigue and achieve better achievement.Because of the experience of the two researchers in the field of sports there are several factors affecting training, including the use of training methods, as each method has its characteristics that distinguish from the other, has been conducted several studies on some of these methods, And the accumulation of lactic acid in the muscles and blood is one of the most important variables affecting the game of flying badminton and ran 800 meters, and relying on those variables make the coach and athlete in the area of safety, whether during training or race, so the researchers decided to Conduct a study NH quickly hospitalization according to pregnancy training for some physiological and biochemical variables of the players and hostile aircraft 800 badminton.The aim of the research is to identify the speed of hospitalization according to the training load of some physiological and biochemical variables of the badminton and air maxi 800m youth, to identify the differences in the speed of hospitalization between the badminton players and the 800m youth.Methodology: The research sample was chosen in a deliberate way from the players of the team of the badminton youth (5) players, and the players of the team for 800 m, the number of (5) player, the tests used in the search first: pulse rate, fatigue equation, measure the concentration of lactic acid in Blood test after blood pressure, oxygen saturation ratio, biochemical tests, RBC test, Hb test, PCV test, Ca test. Tests were conducted for the variables investigated after the end of the training program. Interpretation of results.The three researchers concluded: For badminton players, the preference for muscle fatigue tests and the measurement of lactic acid in the physiological indicators Hb, P.C.V within the biochemical indicators.The three researchers recommend: the need to emphasize training programs and hospitalization during the periods of public and private preparation and competitions.
الكتابة عن الأندلس بعد تسليم مدينة غرناطة يحمل في ثناياه ألم كبير، لأن الأندلسيين عاشوا تجربة إنسانية قاسية سببها الأساس غياب التسامح الديني والعدالة الاجتماعية، الأمر الذي دفعهم للثورة مطالبين بحقوقهم التي نصت عليها معاهدة تسليم المدينة. فقد عاش أولئك حياة صعبة ، فكانوا صورة للصراع بين حضارتين الإسلامية والغربية ، ويمكن تلمس ذلك الصراع من خلال دراسة ثوراتهم ضد السلطة الحاكمة التي يبدو من تتبع أح
... Show MoreHollow core photonic bandgap fibers provide a new geometry for the realization and enhancement of many nonlinear optical effects. Such fibers offer novel guidance and dispersion properties that provide an advantage over conventional fibers for various applications. Dispersion, which expresses the variation with wavelength of the guided-mode group velocity, is one of the most important properties of optical fibers. Photonic crystal fibers (PCFs) offer much larger flexibility than conventional fibers with respect to tailoring of the dispersion curve. This is partly due to the large refractive-index contrast available in the silica/air microstructures, and partly due to the possibility of making complex refractive-index structure over the fibe
... Show MoreAbstract The aim of the current research is to identify the time perspective and the quality of academic life of Baghdad University students. The research also aims to identify the relationship between the time perspective and the academic quality of Baghdad University students and the extent to which the time perspective dimension of academic quality contributes to the identification of the difference between the time perspectives in terms of gender. Finally, the research aims to identify if there is a significant difference in the quality of academic life between males and females. The scales were applied to a number of (434) university male and female student. A one-sample t-test, a two-sample t-test, the analysis of the variation, the P
... Show MoreIn this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given
Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation. Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Today the NOMA has exponential growth in the use of Optical Visible Light Communication (OVLC) due to good features such as high spectral efficiency, low BER, and flexibility. Moreover, it creates a huge demand for electronic devices with high-speed processing and data rates, which leads to more FPGA power consumption. Therefore; it is a big challenge for scientists and researchers today to recover this problem by reducing the FPGA power and size of the devices. The subject matter of this article is producing an algorithm model to reduce the power consumption of (Field Programmable Gate Array) FPGA used in the design of the Non-Orthogonal Multiple Access (NOMA) techniques applied in (OVLC) systems combined with a blue laser. However, The po
... Show MoreThe present work investigates the effect of; superficial air velocities of: 1, 3, and 6 cm/s for two types of perforated distributor on hydrodynamic characteristic in a gas-liquid dispersion column of; air-water, and airaqueous-n-propanol solution. Bubble distribution, gas holdup, and power consumption are parameters take in consideration. Experimental work was carried out in perspex column of 8.5 cm inside diameter and 1.5 m height. Two types of bubble generator (perforated plate) were fixed at the bottom of the column; plate A (99 holes of 0.5 mm diameter and free area of 0.34%), plate B (20 holes of 1.5 mm diameter and free area of 0.62%). Photographic technique was used to measure the bubble parameters. The experimental results were
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreLet R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes