The development taking place on the sports field at the general level and in the game of football at the private level, being the most popular game in the world, has reached very advanced stages. The use of modern aids and technology has contributed greatly to this development from the collective and individual aspects, as the goalkeeper is the most important position in the team, the use of devices gave objective readings about the goalkeeper’s ability in terms of skill and physical aspects, as the importance of the research lies in designing an electronic device to measure the degree of bending of the knee angle because of its great importance in developing the skill of catching and dimensions of the high ball for football goalkeepers. The researchers chose a sample under the age of 15 years. Being an emerging age group, we consolidate the correct motor program for the skill to reach the best performance. The research aimed to prepare exercises using the device designed to develop the skill of catching and clearance the high ball, and also to identify the rate of development of the aforementioned skill. The research assumed that there were statistically significant differences in favor of the post-test results. The research sample was determined practically by (4) goalkeepers for the Iraqi Al-Zawra'a Club, where the researchers used the experimental approach, which is the approach that suits the nature of the research. The researchers concluded that the use of assistive means and electronic devices, including the designed device, contributed significantly to developing the skill of catching and clearance of the high ball through the exercises
Most of today’s techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and the
computational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conversion as a preprocessing for the compression phases YCbCr and RGB, where the resultant compressed sequence is selectively encrypted using randomly generated combined secret key.
The results showed a significant reduct
The risk of significant concern is resistance to antibiotics for public health. The alternative treatment of metallic nanoparticles (NPs), such as heavy metals, effects on antibiotic resistance bacteria with different types of antibiotics of - impossible to treat using noval eco-friendly synthesis technique nanoparticles copper oxide (CuO NPs) preparation from S. epidermidis showed remarkable antimicrobial activity against S.aureus Minimum inhibitory concentra range (16,32,64,256,512) µg/ml via well diffusion method in vitro, discover those concentrations effected in those bacteria and the best concentration is 64 µg/ml, characterization CuO NPs to prove this included atomic force microscope, UV, X-ray Diffraction and TEM, and ant
... Show MoreThis article presents a polynomial-based image compression scheme, which consists of using the color model (YUV) to represent color contents and using two-dimensional polynomial coding (first-order) with variable block size according to correlation between neighbor pixels. The residual part of the polynomial for all bands is analyzed into two parts, most important (big) part, and least important (small) parts. Due to the significant subjective importance of the big group; lossless compression (based on Run-Length spatial coding) is used to represent it. Furthermore, a lossy compression system scheme is utilized to approximately represent the small group; it is based on an error-limited adaptive coding system and using the transform codin
... Show MoreTo improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading
... Show MoreAbstract Introduction: MMP3 plays a crucial role in the process of bone erosion in the pathomechanism of rheumatoid arthritis (RA). It acts by removing the outer osteoid layer, which allows the osteoclasts to tightly connect and carry out the subsequent damage to the underlying bone. MMP3 can trigger the production of other MMPs like MMP-1, MMP-7, and MMP-9, it plays a pivotal role in the remodeling of connective tissues. Aim of the study: to assess the influence of MMP-3 serum levels and single-nucleotide polymorphisms of rs679620 in the rheumatoid arthritis patients' group in comparison to the control group. Subjects: eighty eight samples, 45 rheumatoid arthritis patients after being referred by their treating physician for regular RA
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreDisease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature
... Show More