creating unique exercises utilizing a teaching approach that works with the research sample, determining how special exercises affect the development of torso flexibility, and determining how special exercises affect the development of bow ability. Activate the search The results of the pre- and post-tests for the control and experimental research groups show a statistically significant association that is favoring the post-test in the development of bow skill performance Using the experimental technique, the researcher set up one group and gave them two tests (pre and post) based on scientific theories that made sense for the topic at hand. Forty adolescent wrestlers from the Adhamiya Club in the Baghdad Governorate were recognized by the researcher. The researcher selected, at a ratio of 20, an age group consisting of only those between the ages of 12 and 14. 50% are wrestlers of the research's initial population. In terms of gathering data, the researcher employed the intended approach—the stretcher. Because the created educational technique is simple to use and produces accurate numerical results, the researchers came to the conclusion that it has demonstrated its potential to increase the flexibility of the thoracic muscles. The study suggests that sports clubs incorporate instructional techniques into their training programs.
DAIRMD Professor Hayder R. Al-Hamamy, **Professor Adil A. Noaimi, **Dr. Ihsan A. Al-Turfy, IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2015
An efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has
... Show MoreIn this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.
The use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th
... Show MoreDue to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula
... Show MoreThe transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the
... Show MoreBackground: Saliva is one of the most important etiological host factors in relation to dental caries. It affects the carious process by its organic and inorganic constituents; in addition to its physiological functions as (flow rate, pH and buffer capacity). The aims of this study were to determine the concentrations of major elements (calcium and phosphorus) and trace elements (ferrous iron, nickel, chromium and aluminum) in saliva among a group of adolescent girls, and to explore the relation of these elements, flow rate and pH with dental caries. Material & Methods: The study group consisted of 25 girls with an age of 13-15 years old. Dental caries was diagnosed by both clinical and radiographical examinations following the criteria of
... Show More