The Video Assistant Referee (VAR) is a technology designed to review on- eld decisions through video footage in order to correct clear and critical refereeing errors. It enables the replay of key moments in slow motion to determine the correct naldecision,withcommunicationbetweenthevideoof cialsandtherefereeconductedviaheadset.Thesystem operates under the principle of "minimal interference, maximum bene t," intervening only in essential situations. This study aimedtoassessthecurrent implementationofVARintheIraqStarsFootballLeagueduringthe2023–2024season. To achieve this objective, the researchers employed a descriptive survey method involving a sample of 220 participants, including referees, coaches, players, assessors, academics, administrators, and media professionals. Data were collected via a 32-item questionnaire distributed across three dimensions: VAR referee training, bene ciaries of the system, and related tools and equipment. Analysis using SPSS revealed that the VAR system’s performance was rated as very good for its initial use in the league. The results support the feasibility of extending the experience to other divisions within Iraqi football. The researchers recommendedconductingtrainingcampsandcerti cationprogramsabroad,establishin partnershipswithinternationalfootballfederations,allowingteamcoachesasingleopportunitytorequestvideoreview, and creating an of cial digital platform managed by the Iraqi Football Association to explain how VAR works and minimize misinterpretations among stakeholders. and this achieves one of the sustainable development goals of the United Nations in Iraq which is (Quality Education)
The current, research, aims, to, verify, the relationship between talent development practices and organizational performance through a mediating role of creative organizational climate at the Institution of Industrial Development and Research- the Iraqi Industry Ministry. The descriptive and analytic approach was adopted as a research design. The research sample was represented by a number of managers and employees who work at the middle management level. The researchers used the questionnaire as the main method for collecting data to achieve the main research objective. It was distributed 162 questionnaires, of which 146 received; and then all of those were used on the final statistical analysis. The sample response-rate rate w
... Show MoreThe research aims to identify the role of organizational identity in improving work teams, and to suggest ways to deal with the outputs of work teams in a way that achieves the goals of the Baghdad Traffic Directorate as it is the subject of the application of the research, while the research community was represented by its officers, while the research sample was embodied in (General Director, Associate The Director General, the directors of Rusafa and Karkh traffic and their assistants, as well as the heads of the divisions and the officials of the departments) in it. The sample was (200) observations. The descriptive exploratory approach was devoted to conducting the research, relying on the questionnaire in data collection, as well as e
... Show MoreBackground: Acute appendicitis is the most common abdominal surgical emergency. The diagnosis of this condition is still essentially clinical and there is difficulty in the clinical diagnosis, especially among elderly, children and patients with a typical presentation, so early and accurate diagnosis of acute appendicitis is important to avoid its complications.Objectives: To evaluate the degree of accuracy of Alvarado scoring system in the diagnosis of acute appendicitis.Method: Two hundred patients were admitted to the Alkindy Teaching Hospital from January 2011 to april 2014- presented with symptoms and signs suggestive of acute appendicitis. After examination and investigations all patients were given a score according to Alvarado sc
... Show MoreThis research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen
This research aims to study the performance of operations to provide nursing services, which included dimensions (quality, timeliness, leadership skills, behavioral manifestations, relationships with others, problem-solving and decision-making, job performance) and its effects in nursing performance. The research to prove the value of the performance of service delivery processes dimensions by nursing staffs working in Iraqi hospitals, nursing and measuring performance. To find out the nature of nursing services, and a comparison between hospitals to measure the extent of the application dimensional among themselves, and that by relying on the dimensions of a global study, which was measu
... Show MoreAn approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More