Introduction: Knowledge management plays a crucial role in students’ ability to acquire, organize, retrieve, and apply information, impacting academic performance. In sports sciences, especially in combat sports like boxing, effective knowledge management supports both theoretical understanding and practical skill application. Despite exposure to boxing through training and media, students’ academic performance remains inconsistent. Objective: This study examines the relationship between knowledge management and cognitive achievement among second-year students in the College of Physical Education and Sport Sciences at the University of Basrah. It evaluates how students manage knowledge and its impact on their retention and application of boxing-related concepts. Methodology: The study utilized the Knowledge Management Scale (KMS) and Cognitive Achievement Scale (CAS) to assess knowledge management and academic performance. Statistical analysis, including correlation, was used to assess the relationship between these variables. A sample of 120 students participated in the study. Results: A significant positive correlation (r = 0.564, p < 0.01) was found between knowledge management and cognitive achievement. Most students (42.1%) demonstrated average levels of both knowledge management and academic performance, indicating a need for improved knowledge management techniques. Discussion: The study highlights the importance of integrating structured knowledge management strategies, such as mental mapping and digital tools, into sports education to enhance cognitive and practical skills. Conclusion: Enhancing knowledge management strategies in boxing education can bridge the gap between theoretical knowledge and practical application, improving both cognitive and skill-based performance in sports sciences.
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreAbstract
The current study was conducted to assess the effect of advancing age on total serum IgE level in asthmatic patients. To this purpose, 90 asthmatic patients and 30 healthy individuals ( control group ) were enrolled. Asthmatic patients were categorized into four groups. Group A consisted of asthmatic patients (9) whose age was more than 20 and up to 30 y. Group B contained asthmatics (13) of age more than 30 and up to 40 y. Group C comprised those (23) of more than 40 and up to 50 y. Group D consisted asthmatic patients (45) of age more than 50 y. Total serum IgE level significantly changed in group D patients when compared with those of
There are significant differences between the pre and post-tests in favor of the post-test in the tests) stroke volume (S.V), cardiac thrust (C.O.P), left ventricular volume, maximum oxygen consumption Vo2max), which indicates the effect of the proposed training approach.There are significant differences between the pre and post-tests in favor of the post-test in the achievement level test with air rifle shooting for young female shooters, which indicates the effect of the proposed training curriculum.There are no significant differences between the pre and post-tests in the tests (heart rate (HR) before exercise, heart rate (HR) after exercise, systolic blood pressure rate before exercise, systolic blood pressure rate after exercis
... Show MoreThis research deals with the poetic image of poets of the eighth century poetic, where they embodied the features of the religious life in which they live, and their impact on the Koranic text in the reflection of the image on their poems, where it becomes clear the ability of the poet at that stage to clarify the aesthetic components of the poetic text; Investigations, singled out the first topic: the analogy, and the second metaphorical picture, and the third: the picture.
Social protection meets different aspects of the needs of vulnerable groups, such as the economic, health, education, and family relations and ties in the Iraqi society. This is because vulnerable groups have suffered from social and economic influences that have negative implications on the social reality as a whole. Poverty is a case in point, which paved the way to frequent setbacks that have led to social structure instability. Accordingly, the present study aims to examine the role and effect of the Net of Social Protection Program in equally distributing social protection to curb or mitigate any negative consequnces that might happen to the poor segments and vulnerable people, who are succeptible to shocks, such as: the orphans, un
... Show MoreThe current research aims to identify the level of impact of strategic improvisation as an independent variable on organizational health. The dependent variable in the Department of Health of Dhi Qar to reach appropriate mechanisms in order to reach appropriate mechanisms and recommendations proposed to contribute to the achievement of organizational health in the Department of Health of Dhi Qar (the research department) and based on the importance of the subject of research in government institutions and the important and service role of the Department of Health of Dhi Qar in the Iraqi society. The descriptive analytical approach was adopted in the completion of the research based on the opinions of the leaders in the surveyed depa
... Show MoreTotal quality management considers one of the modern scientific entrances which practiced by productivity service organizations alike to provide appropriate quality required outputs according to the needs and desires of customers manage , enable the organization seeking to continue and grow in light of the increasing competition from the satisfy and provide the appropriate total quality management requirements whenever led to face risks that they may have in a manner in which they can be addressed and find ways to avoid them in the future when repeated. &n
... Show MoreThe aim of this research is to find out the influence of Daniel's model on the skills of the twenty-first century among the students of the scientific-fifth grade at the secondary and preparatory government morning schools for the academic year 2022- 2023. Two groups were chosen out of five groups for the fifth-scientific grade, one of which represents the experimental group that is taught by the Daniel model, and the other is the control group that is taught in the traditional method. The equivalence of the two research groups was verified with a set of variables. As for the research tool, a scale was developed by the researchers for the skills of the twenty-first century, in which they adopted the framework of the Partnership Organizat
... Show MoreIn regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement
... Show More