Objective This study aimed to compare the biomechanics of three-point shooting between elite Iraqi basketball players and international players, in order to identify key biomechanical differences that may impact shooting performance. Methods A total of 80 male basketball players participated in the study (40 elite Iraqi players and 40 international elite players). Kinematic data were collected using advanced motion analysis systems, force plates, and high-speed video analysis. The measured variables included joint angles, angular velocity, release speed, ball release angle, and ground reaction forces during three-point shooting. Each player performed 20 consecutive shots under controlled conditions. Group comparisons were conducted using statistical analysis. Results Significant differences in biomechanical parameters were found between the groups. Iraqi players exhibited lower knee and hip angles at release, reduced shoulder angular velocity, and slower ball release speed. Consequently, their effective shooting percentage was notably lower (58.5%) compared to the international group (70.2%). Ground reaction forces were also reduced among the Iraqi players, indicating possible deficits in lower limb strength and power. Conclusion Biomechanical limitations in joint angles, release velocity, and ground reaction forces appear to contribute to the reduced shooting accuracy observed in Iraqi players. Targeted strength and conditioning programs, combined with biomechanical feedback technologies, are recommended to improve performance and reduce the gap between Iraqi and international players.
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThe article provides a comparative analysis of comparisons in Russian and Arabic, aimed at identifying their structural, typological, and functional-pragmatic features. The study is based on a systematic approach to the analysis of linguistic means of expressing comparisons in two differ- ent linguistic cultures. The article analyzes the main structural components of comparisons, their classification, and their cognitive and aesthetic functions. The results of the study demonstrate the deep cultural conditioning of comparative constructions and their important role in representing the specific features of the respective linguistic cultures.
The aim of the research is to identify the percentage of success and failure of some compound offensive skills in joiner basketball. It was evident that development only occurred though the mastery of the basic single offence skills as well as the ability to perform compound skills accurately and consistently. Not paying enough attention to compound skills leads evidentially to weakness in the athlete's level that in turn leads to mistakes in performance. Six joiner games of the best four teams in Baghdad were filmed and analyzed. The results of analyzing the compound offence skills were as follows: There was some weakness in the athletes' ability in using compound offence skills specially receiving, dribbling and following through that
... Show MoreThis research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show MoreBackground: Periodontal diseases are inflammatory diseases affecting the supporting tissues of the teeth. One of the leading environmental factors that are closely related not only to the risk but also to the prognosis of periodontitis is smoking. This study aimed to evaluate the influence of smoking on periodontal health status and to measure the levels of matrix metalloproteinase-9 in smokers and nonsmokers chronic periodontitis patients, also it aimed to test the correlation between the levels of matrix metalloproteinase-9 and the clinical periodontal parameters. Materials and Methods: Five milliliters samples of un-stimulated whole saliva and full-mouth clinical periodontal recordings (plaque index, gingival index, bleeding on probing,
... Show MoreAbstract
The basic aim of this research is to study the interactional effect of investing information technology on the relationship between value added intellectual capital and financial performance as literature review suggested on the theoretical level, including previous studies, with the deduction of its trends strongly predicted by research hypotheses and their content associated with the investment in intellectual capital after information technology tools being employed in this direction to improve the financial performance of the studied companies at the levels of both industrial and service sectors, a non-random sample was chosen included (40) forty Iraqi Joint-Stoc
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreMulti-nationalities companies are the main companies in the progressed
countries that improve the current technology and, thus, become the main source of it.
These companies, in the first place, aim to increase the profits of its
investments to satisfy stock holders in the original countries to which these companies
belong.
It is a mean to interfere in the economic of countries especially the growing
ones and exploit their important natural resources. Since this research focus on the
dangers of these companies, mechanism of its work and its dangers on the most
important natural resources of our country which is oil; therefore, the research
confirm that this important natural treasure must be under an Iraqi cont
The laws of the three religions tend to extend the rules and foundations of coexistence, and this is achieved in achieving the values and principles that these laws have nourished in all societies.
Our research deals with a major problem that has broken out in our societies, namely (disturbing the balance of values and behavioral standard between people), and perhaps one of the greatest causes of the problem is to move away from the correct divine discourse and sound approach, as well as corruption of common sense and the violation of its rules and found principles in the hearts of people.