ھدف البحث الـــــى : ١ -إعداد تدریبات القوة الارتدادیة في وسطین متباینین على بعض المؤشرات الفسیولوجیة لتطویر القوة الانفجاریة ودقة مھارتي الأرسال والضرب الساحق بالكرة الطائرة . ٢ -التعرف على تأثیر تدریبات القوة الارتدادیة في وسطین متباینین على بعض المؤشرات الفسیولوجیة لتطویر القوة الانفجاریة.. ٣ -التعرف على تأثیر تدریبات القوة الارتدادیة في وسطین متباینین على دقة مھارتي الأرسال والضرب الساحق بالكرة الطائرة ٤ -التعرف على الفروق بین المجموعتین التجریبیتین في الاختبارات البعدیة على بعض المؤشرات الفسیولوجیة لتطویر القوة الانفجاریة و ودقة مھارتي الأرسال الضرب الساحق بالكرة الطائرة. تمثل منھج البحث : بالمنھج التجریبي ذو المجموعتین المتكافئتین ذات الاختبارین القبلي والبعدي. وعینة البحث ھم لاعبو المدرسة التخصصیة بالكرة الطائرة بغداد \ الكرخ وعددھم ١٢ تم تقسیمھم الى مجموعتین كل مجموعة ( لاعبا ٦ (لاعبین تمثل ً المجموعة الأولى (٦ (لاعبین للتدریب في الیابسة والمجموعة الثانیة (٦ (لاعبین في الوسط المائي . وتمثل المنھج المستخدم بالبحث لمدة (٣٨ (وحدة تدریبیة إذ تم أعداد مجموعة تمرینات للقوة الارتدادیة في الوسط المائي والیابسة . واستنتجت الباحثة ما یأتي : للتدریبات الارتدادیة المستخدمة على الیابسة لھا تأثیر إیجابي في القوة الانفجاریة للمجموعة التجریبیة الأولى . للتدریبات الارتدادیة في الوسط المائي تأثیر إیجابي في القوة الانفجاریة للمجموعة التجریبیة الثانیة . للتدریبات الارتدادیة تأثیر ایجابي على بعض المؤشرات الفسیولوجیة
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreAW Ali T, Journal of the Faculty of Medicine, 2015 - Cited by 3
The aim of t his p aper is t o const ruct t he (k,r)-caps in t he p rojective 3-sp ace PG(3,p ) over Galois field GF(4). We found t hat t he maximum comp let e (k,2)-cap which is called an ovaloid, exist s in PG(3,4) when k = 13. Moreover t he maximum (k,3)-cap s, (k,4)-cap s and (k,5)-caps.
Software-Defined Networking (SDN) has evolved network management by detaching the control plane from the data forwarding plane, resulting in unparalleled flexibility and efficiency in network administration. However, the heterogeneity of traffic in SDN presents issues in achieving Quality of Service (QoS) demands and efficiently managing network resources. SDN traffic flows are often divided into elephant flows (EFs) and mice flows (MFs). EFs, which are distinguished by their huge packet sizes and long durations, account for a small amount of total traffic but require disproportionate network resources, thus causing congestion and delays for smaller MFs. MFs, on the other hand, have a short lifetime and are latency-sensitive, but they accou
... Show MoreBackground: Although they are not life threatening, dental caries and periodontal disease are the most predominant and widely spread oral diseases throughout the world. Another most common dental problem seen in children is dental trauma. The aims of the study included the investigation of the prevalence and severity of dental caries, gingivitis and dental plaque in relation to gender, furthermore, the prevalence and severity of the traumatized anterior teeth were assessed. Materials and Methods: This oral health survey was conducted among primary school children aged 9 years old in Al-Diwaniyah city in Iraq. The total sample composed of 600 child (320 males and 280 females) selected randomly from different school in Al-Diwaniyah city. Dia
... Show MoreTo ensure fault tolerance and distributed management, distributed protocols are employed as one of the major architectural concepts underlying the Internet. However, inefficiency, instability and fragility could be potentially overcome with the help of the novel networking architecture called software-defined networking (SDN). The main property of this architecture is the separation of the control and data planes. To reduce congestion and thus improve latency and throughput, there must be homogeneous distribution of the traffic load over the different network paths. This paper presents a smart flow steering agent (SFSA) for data flow routing based on current network conditions. To enhance throughput and minimize latency, the SFSA distrib
... Show More