Coaches and analysts face a significant challenge of inaccurate estimation when analyzing Men's 100 Meter Sprint Performance, particularly when there is limited data available. This necessitates the use of modern technologies to address the problem of inaccurate estimation. Unfortunately, current methods used to estimate Men's 100 Meter Sprint Performance indexes in Iraq are ineffective, highlighting the need to adopt new and advanced technologies that are fast, accurate, and flexible. Therefore, the objective of this study was to utilize an advanced method known as artificial neural networks to estimate four key indexes: Accelerate First of 10 meters, Speed Rate, Time First of 10 meters, and Reaction Time. The application of artificial neural networks in the sports industry in the Republic of Iraq is crucial to ensure successful players. In this study, an artificial neural network model was built to predict Men's 100 meter indexes. Several factors related to the construction of artificial neural networks were studied, including network architecture and internal factors and their impact on the performance of the models. As a result, four easy equations were developed to calculate the four key indexes. The findings of the study indicate that these networks can predict Men's 100 Meter indexes with a high degree of reliability 98.034% and accounting coefficients R = 0.9143.
Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show MoreIn general, the importance of cluster analysis is that one can evaluate elements by clustering multiple homogeneous data; the main objective of this analysis is to collect the elements of a single, homogeneous group into different divisions, depending on many variables. This method of analysis is used to reduce data, generate hypotheses and test them, as well as predict and match models. The research aims to evaluate the fuzzy cluster analysis, which is a special case of cluster analysis, as well as to compare the two methods—classical and fuzzy cluster analysis. The research topic has been allocated to the government and private hospitals. The sampling for this research was comprised of 288 patients being treated in 10 hospitals. As t
... Show MoreThis is a descriptive study that used the survey method, it’s aimed to identify the topics and frameworks of diplomatic and political issues covered by the news of the website of the Iraqi Ministry of Foreign Affairs, through the content analysis method applied on a sample selected in a systematic random manner for news published in the year 2021. The sample included (191) news equivalent to (20%) of the total study population of (942). The study reached some results, the most important of which were as follows: The political issue, in its general sense, grabbed the most prominent attention among the various issues and events focused on by Iraqi diplomacy: "international cooperation", "bilateral cooperation", and then "regional politic
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show MoreThe ligand 4-amino-N-(5-methylisoxazole-3-yl)-benzene-sulfonamide(L1) (as a chelating ligand) was treated with Pd(II),Pt (IV) and Au(III) ions in alcoholic medium in order to prepare a series of new metal complexes. Mixed ligand complexes of this primary ligand were prepared in alcoholic medium in presence of the co-ligand 4,4'-dimethyl-2,2'-bipyridyl(L2) with Cu(II) ,Pd(II) and Au(III) ions. The complexes were characterized in solid state using flame atomic absorption, elemental analysis C.H.N.S, FT-IR, UV-Vis Spectroscopy, conductivity and magnetic susceptibility measurements. The nature of some complexes formed in ethanolic solution has been studied following the molar ratio method, also stability constant was studied and the complexes f
... Show MoreBackground: Legionella pneumophila (L. pneumophila) is gram-negative bacterium, which causes Legionnaires’ disease as well as Pontiac fever. Objective: To determine the frequency of Legionella pneumophila in pneumonic patients, to determine the clinical utility of diagnosing Legionella pneumonia by urinary antigen testing (LPUAT) in terms of sensitivity and specificity, to compares the results obtained from patients by urinary antigen test with q Real Time PCR (RT PCR) using serum samples and to determine the frequency of serogroup 1 and other serogroups of L. pneumophila. Methods: A total of 100 pneumonic patients (community acquired pneumonia) were enrolled in this study during a period between October 2016 to April 2017; 92 sam
... Show MoreSulphated zirconia (SZ) is one of the most important solid acid catalysts was synthesize at different operating conditions, different calcination temperature and sulfonating time has been used. The prepared catalyst was distinguished by X-ray Diffraction (XRD), particle size and morphology of catalyst were checked by atomic force microscopy (AFM) and scanning electron microscopy (SEM) respectively, in addition to analysis by (DTA) Differential thermally and Energy Dispersive X-Ray (EDX). Finally, the N2 adsorption-desorption was used to measure the surface area (BET) and pore volume. High degree of tetragonal crystallinity was obtained 90 %, and surface area of 169 m2/g and pore volume of 0.39 cm3g-1 at 600°C calcination temperature for 3
... Show MoreTuberculosis status as the second leading causes of significant morbidity and mortality from an infectious disease worldwide, after human immunodeficiency virus (HIV). Sample collection was conducted at the Institute of Chest and Respiratory Diseases/Baghdad Medical City in Baghdad. The collection interval was from August to October 2014, 629 suspected TB patients were examined during this period. The results revealed among total 629 specimens, 56 (8.9%) of the specimens were positive by direct examination and 573 (91.1%) negative specimens by smear microscopy. Fifty six DNA samples were extracted from positive ZN smears of sputum specimens and 40 samples from healthy persons (as control) were subjected to molecular diagnosis by real tim
... Show MoreSurveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion