The purpose of this study is to develop and assess the effectiveness of exercises using heavy and hanging ropes for handball players, focusing on enhancing specific physical abilities and shooting accuracy. The research addresses the gap in training methodologies by comparing the effects of heavy rope exercises versus hanging rope exercises. An experimental design was used in two equal groups, besides pre-testing and post-testing. The study involved 16 players from the School of Handball for the season 2022–2023. The sample included 14 players, who were then randomly divided into two experimental groups of 7 each. The first group performed heavy rope exercises, while hanging rope exercises were included in the plan of the second group. The results showed that the first experimental group performs better than the second in all tests of physical qualities and motor skills precision tests. Specifically, the first group showed a 15% increase in arm strength (t-value = 4.08, p < 0.001), a 7.7% improvement in leg strength (t-value = 5.63, p < 0.002), and a 48.4% enhancement in shooting accuracy (t-value = 4.21, p < 0.000). The findings indicate that the physical and skills-based requirements of handball players are better developed through heavy rope exercises. This research has serious implications for sports training, as it indicates that physical programs that incorporate heavy rope exercises can be used to efficiently improve players’ abilities in these sports. Such types of exercises not only boost physical capabilities—they prove to be applicable in real games, thus being a meaningful contribution to handball training.
Flow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relativel
... Show More<p>Vehicular ad-hoc networks (VANET) suffer from dynamic network environment and topological instability that caused by high mobility feature and varying vehicles density. Emerging 5G mobile technologies offer new opportunities to design improved VANET architecture for future intelligent transportation system. However, current software defined networking (SDN) based handover schemes face poor handover performance in VANET environment with notable issues in connection establishment and ongoing communication sessions. These poor connectivity and inflexibility challenges appear at high vehicles speed and high data rate services. Therefore, this paper proposes a flexible handover solution for VANET networks by integrating SDN and
... Show MorePenetrating cardiac injuries caused by nail guns are exceedingly rare but often life-threatening, with reports showing an increasing trend. We described the case of an adolescent male who sustained accidental cardiac penetration by an iron nail while performing carpentry work. Rapid referral to a specialized cardiac center enabled timely surgical intervention, illustrating the pivotal role of early recognition, expedited transfer, and expert management in optimizing outcomes. This case also highlights the grave risks associated with the employment of minors in hazardous occupational settings, where exposure to unsafe environments may lead to catastrophic consequences.
Feature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall
... Show MoreProgression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon
... Show MoreThis work includes the synthesis of new ester compounds containing two 1,3,4-oxadiazole rings, 15a-c and 16a-c. This was done over seven steps, starting with p-acetamido-phenol 1 and 2-mercaptobenzoimidazole 2. The structure of the products was determined using FT-IR, 1H NMR, and mass spectroscopy. The evaluation of the antimicrobial activities of some prepared compounds was achieved against four types of bacteria (two types of gram-positive bacteria; Staphylococcus aureus and Bacillus subtilis, and two types of gram-negative bacteria, Pseudomonas aeruginosa and E. Coli), as well as against one types of fungus (C. albino). The results show moderate activit against the study bacteria, and the theoretical analysis of the toxi
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show More