The accuracy of the skillful performance of the front and back dimensions of badminton in volleyball, occurs through the investment of complex exercises (physical skills) in a single performance and its characteristics that give the correct movement behavior and speed to the accuracy of the performance of the strokes as well as the identification of changes in some physiological indicators of By using these compound exercises. The research problem lies: I found a weakness in the accuracy of the performance of the front and back dimensions strike and diagnosed this through the tests that it conducted on the players to identify and know the problem, and attributed this weakness to a weakness in the necessary physical and skill abilities and t
... Show MoreBased on the theoretical ideas of E. Cassirer, a methodology is developed and an analysis of the painting work by J. Saleem, a representative of modern Iraqi painting, is carried out. While comparing the artistic programme of J. Saleem and the views of E. Cassirer, the methodological potential of the theory of the symbol for the art criticism analysis of the regional painting is clarified. Comparative analysis with the inclusion of the works of B. Buffet, B. Turetsky, J. Miro helps to see the multiple meanings of the same cultural symbol in thematically similar works of different years, created in different socio-cultural circumstances. The article shows that for regions with a shorter history (France, Russia, Spain, etc.), which have lo
... Show MoreAbstract Lateral Epicondylitis (LE) which has been referred to as the Tennis Elbow as well is a lesion affecting common tendinous origins of wrist extensors due to chronic overuse injury that results in damaging common extensor tendons which join forearm extensor muscles to humerus. The aim of the present evidence-based clinical statement is reviewing scientific evidences for efficacy of a variety of the rehabilitation methods, chronic lateral epicondylitis management. It is focused upon treating chronic lateral epicondylitis and the latest developments in physiotherapy area for managing chronic lateral epicondylitis. Due to the fact that primary physical impairments in the LE are decreased is the strength of the grip, fundamentally due to
... Show MoreGroupwise non-rigid image alignment is a difficult non-linear optimization problem involving many parameters and often large datasets. Previous methods have explored various metrics and optimization strategies. Good results have been previously achieved with simple metrics, requiring complex optimization, often with many unintuitive parameters that require careful tuning for each dataset. In this chapter, the problem is restructured to use a simpler, iterative optimization algorithm, with very few free parameters. The warps are refined using an iterative Levenberg-Marquardt minimization to the mean, based on updating the locations of a small number of points and incorporating a stiffness constraint. This optimization approach is eff
... Show MoreObjective(s): The study aims at examining the role of technical information used in nursing education, such as "the
Internet, e-mail services, video, audio conferencing and other "in the College of Nursing at the University of Baghdad.
Methodology: A descriptive and analytical study which was using the examination approach was conducted on a
non-probability sample (purposive sample) of (42) members of the faculty of the College of Nursing at the University
of Baghdad. A questionnaire was constructed for the purpose of the study. It was consisted of two parts; the first part
which included the demographic characteristics of faculty members (such as age, sex,
qualification, scientific title, and the scientific department
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show More