The reason for applying the project is for the development of some physiological variables and skill performance using a device for the first time applied in Iraq to a sample of badminton players, and this device has a patent on 7/2/2019. An experimental method is used for a sample of (12) players from (Al-Orthodoxy club). The experimental group is applied the proposal technique, while, the control group is instructed by the coach.The results of the research attribute to the role of the proposal exercises of fit light technology, thus, this technology has increased the attention and focusing of the sample and some physiological variables and smash shot skill. It has been concluded that the exercises using fit light technology is helped to improve their anaerobic abilities, also the exercises some physiological indicators. Furthermore, the exercises are helped to reduce the heart rate before and after the tension of the sample.
Rapid population growth and the development of industries result in an increase in solid waste. Glass, which represents a large proportion of solid waste, can be used in construction applications. The utilization of recycled glass waste in the asphalt mixture is considered an environmentally-friendly application. In this laboratory study, glass bottles were recycled by crushing, grinding, and sieving them into particles that pass through sieve No. 200 to be used as a partial replacement for the filler in the hot mixture asphalt of wearing course Type-A. The ratios (4, 4.3, 4.6, 4.9, 5.2,5.5) were used to determine the optimum asphalt content (OAC), and three ratios (30, 60, and 90) were used for the replacement of limestone powder filler to
... Show MoreIn this paper, we have been used the Hermite interpolation method to solve second order regular boundary value problems for singular ordinary differential equations. The suggest method applied after divided the domain into many subdomains then used Hermite interpolation on each subdomain, the solution of the equation is equal to summation of the solution in each subdomain. Finally, we gave many examples to illustrate the suggested method and its efficiency.
With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show MoreThe process of accurate localization of the basic components of human faces (i.e., eyebrows, eyes, nose, mouth, etc.) from images is an important step in face processing techniques like face tracking, facial expression recognition or face recognition. However, it is a challenging task due to the variations in scale, orientation, pose, facial expressions, partial occlusions and lighting conditions. In the current paper, a scheme includes the method of three-hierarchal stages for facial components extraction is presented; it works regardless of illumination variance. Adaptive linear contrast enhancement methods like gamma correction and contrast stretching are used to simulate the variance in light condition among images. As testing material
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show More