Preferred Language
Articles
/
PxgScpgBVTCNdQwCAr31
Decision-making and its relationship to spiking and blocking performance in volleyball for emerging players
...Show More Authors

The game of volleyball is one of the competitive team games that took the lead in terms of its spread in the world, and the game of volleyball relies on basic skills as an important base on which this game is built to advance in the level of performance Performance and among these skills the skill of spiking and blocking wall, the research aims to identify the extent of the relationship of decision-making to the performance of spiking and blocking in volleyball for junior players. The sample was chosen from volleyball players for the Junior Specialized School of Sulaikh Sports Club / Baghdad Governorate for the season 2020 The researcher used the descriptive approach, and the research community was composed of (101) players. The two researchers prepared a decision-making scale consisting of 22 items. Percentages were calculated, the arithmetic average and hypothesis were calculated. The reliability coefficient was found using the half-segmentation method and Alpha Cronbach to know the test stability and correlation coefficient. Pearson Validity Discrimination of Paragraphs and the t-test In light of the results of the research, conclusions were reached, where the critical thinking of the players was found to have a positive relationship in the skills of hitting and crushing wall. The researcher also recommends conducting more research on decision-making skills in other variables in the game of volleyball.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Efficient computational methods for solving the nonlinear initial and boundary value problems
...Show More Authors

Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Psychological Burnout for Teachers of Kindergarten Public and Private (A Contrastive Study)
...Show More Authors

The psychological burnout is considered one of dangerous phenomenon’s which appeared in the 70s of the 20th century and suffered by most of the society classes. It is a term which the wide uses and various meaning like emotional, mental, and physical exhaustion and chronic weak exhaustion. The presented research aims t identify the psychological burnout as for the Kindergarten teacher and the differences significance according to the variations (Kindergarten type: private or govern mental). The research sample contains 400 female teachers divided to 170 governmental Kindergarten teachers and 230 private Kindergarten teachers. The researcher prepared a measurement method to measure the psychological burnout for those teachers after

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 21 2021
Journal Name
Jmerd
stress and strain analysis for the prosthetic hand design actuated by links
...Show More Authors

Prosthetic hands are compensatory devices for the hand amputees as a result of injury, various accidents or birth deformities, types of prosthetic hand vary depending on the mechanism they operate and how they perform. There are common types in use that are characterized by their complex mechanisms, which are difficult for the amputee to use or exclude use because of their high cost, therefore the aim of this research is to design an artificial hand that is suitable in terms of simplicity of use and low cost and similar to a natural hand with regard to dimensions and shape that operated in the mechanism of links. This research involves Stress and strain analysis of the prosthetic hand and its fingers that modelled from (Petg CR)

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Engineering
The Influence of the Preparation and Stability of Nanofluids for Heat Transfer
...Show More Authors

Recently the use of nanofluids represents very important materials. They are used in different branches like medicine, engineering, power, heat transfer, etc. The stability of nanofluids is an important factor to improve the performance of nanofluids with good results. In this research two types of nanoparticles, TiO2 (titanium oxide) and γ-Al2O3 (gamma aluminum oxide) were used with base fluid water. Two-step method were used to prepare the nanofluids. One concentration 0.003 vol. %, the nanoparticles were examined. Scanning Electron Microscopy (SEM), Atomic Force Microscopy (AFM) and X-ray diffraction (XRD) were used to accomplish these tests. The stability of the two types of nanofluids is measured by

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Al-nahrain University Science
A Lexical and Syntax Checker Tool for the Hyper Text Markup Language
...Show More Authors

View Publication
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Results In Engineering
Low-cost autonomous car level 2: Design and implementation for conventional vehicles
...Show More Authors

View Publication
Scopus (33)
Crossref (34)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Time and finance optimization model for multiple construction projects using genetic algorithm
...Show More Authors
Abstract<p>Construction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time w</p> ... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2025
Journal Name
South African Journal Of Chemical Engineering
Electrocoagulation process for cobalt removal from industrial wastewater: Optimization and kinetic study
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (10)
Crossref