Preferred Language
Articles
/
BxYMBYcBVTCNdQwCBy4r
Shot boundary detection based on orthogonal polynomial
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Physical Education
The Contribution of Ball Launching and Ring Entrance Angle Variables in 3 points Jump Shot in Basketball
...Show More Authors

The research aimed at identifying the values of ball launch and ring entrance angle and relations among them as well as identifying the contribution of ball launch and angle variables in 3 point jump in basketball. The researchers hypothesized statistical relation between ball launch and entrance angle. They used the descriptive method on (10) basketball players best known for their 3 point jump shot. Each player is given (10) attempts and only attempts with a larger entrance angle in recorded. The results showed that the height of ball launch players an integral role in decreasing entrance angle as well as ball launch angle did not correlate with the entrance angle. Finally, ball launch variables have no effect or contribution on ball entr

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Engineering
Free Vibration Analysis of Laminated Composite plates with General Elastic Boundary Supports
...Show More Authors

In this investigation, Rayleigh–Ritz method is used to calculate the natural frequencies of rectangular isotropic and laminated symmetric and anti-symmetric cross and angle ply composite plate with general elastic supports along its edges. Each of the admissible functions here is composed of a trigonometric function and an arbitrary continuous function that is introduced to ensure the sufficient smoothness of the so-called residual displacement function at the edges. Perhaps more importantly, this study has developed a general approach for deriving a complete set of admissible functions that can be applied to various boundary conditions. Several numerical examples are studied to demonstrate the accuracy and convergence of the current s

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Engineering
Thermal Buckling Analysis of Laminated Composite plates with General Elastic Boundary Supports
...Show More Authors

In this study, the modified Rayleigh-Ritz method and Fourier series are used to determine the thermal buckling behavior of laminated composite thin plates with a general elastic boundary condition applied to in-plane uniform temperature distribution depending upon classical laminated plate theory(CLPT). A generalized procedure solution is developed for the Rayleigh-Ritz method combined with the synthetic spring technique. The transverse displacement of the orthotropic rectangular plates is not a different term as a new shape expansion of trigonometric series. In this solution approach, the plate transverse deflection and rotation due to bending are developed into principle Fourier series with a sufficient smoothness auxi

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Applied Mathematical Modelling
Identification of a multi-dimensional space-dependent heat source from boundary data
...Show More Authors

View Publication
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Apr 30 2017
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Solution of High Order Ordinary Boundary Value Problems Using Semi-Analytic Technique
...Show More Authors

The aim of this paper is to present a method for solving high order ordinary differential equations with two point's boundary condition, we propose semi-analytic technique using two-point oscillatory interpolation to construct polynomial solution. The original problem is concerned using two-point oscillatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, many examples are presented to demonstrate the applicability, accuracy and efficiency of the method by comparing with conventional methods.

View Publication
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving Linear Boundary Value Problem Using Shooting Continuous Explicit Runge-Kutta Method
...Show More Authors

  In this paper we shall generalize fifth explicit Runge-Kutta Feldberg(ERKF(5)) and Continuous explicit Runge-Kutta (CERK) method using shooting method to solve second order boundary value problem  which can be reduced to order one.These methods we shall call them as shooting Continuous Explicit Runge-Kutta method, the results are computed using matlab program.

View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
The Classical Continuous Optimal Control for Quaternary Nonlinear Parabolic Boundary Value Problems
...Show More Authors

In this paper, our purpose is to study the classical continuous optimal control (CCOC)  for quaternary nonlinear parabolic boundary value problems (QNLPBVPs). The existence and uniqueness theorem (EUTh) for the quaternary state vector solution (QSVS) of the weak form (WF) for the QNLPBVPs with a given quaternary classical continuous control vector (QCCCV) is stated and proved via the Galerkin Method (GM) and the first compactness theorem under suitable assumptions(ASSUMS). Furthermore, the continuity operator for the existence theorem of a QCCCV dominated by the QNLPBVPs is stated and proved under suitable conditions.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Apr 21 2023
Journal Name
Aip Conference Proceedings
Efficient computational methods for solving the nonlinear initial and boundary value problems
...Show More Authors

In this paper, three approximate methods namely the Bernoulli, the Bernstein, and the shifted Legendre polynomials operational matrices are presented to solve two important nonlinear ordinary differential equations that appeared in engineering and applied science. The Riccati and the Darcy-Brinkman-Forchheimer moment equations are solved and the approximate solutions are obtained. The methods are summarized by converting the nonlinear differential equations into a nonlinear system of algebraic equations that is solved using Mathematica®12. The efficiency of these methods was investigated by calculating the root mean square error (RMS) and the maximum error remainder (𝑀𝐸𝑅n) and it was found that the accuracy increases with increasi

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Apr 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solution of High Order Ordinary Boundary Value Problems Using Semi-Analytic Technique
...Show More Authors

  The aim of this paper is to present a method for solving high order ordinary differential equations with two point's boundary condition, we propose semi-analytic technique using two-point oscillatory interpolation to construct polynomial solution. The original problem is concerned using two-point oscillatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] .  Also, many examples are presented to demonstrate the applicability, accuracy and efficiency of the method by comparing with conventional methods.

View Publication
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (16)
Crossref (6)
Scopus Crossref