Hypoxic training, which in turn is one of the methods adopted in sports training methods, especially in activities that depend on the aerobic system in its performance, which includes training with a lack of oxygen by reducing its molecular pressure, since this method targets functional organs and works temporary responses during training and permanent responses After training as an adaptation to these devices as a result of training in this way, the study aimed to identify the effect of hypoxic exercises using the training mask and the extent of the change in some biochemical indicators, in addition to that to identify the effect of these exercises on the indicator of energy expenditure and )VMA) and the achievement of the effectiveness of
... Show MoreThis study was conducted to detect the concentration of lead and cadmium in baby foods, (18) samples were examined, which are the most available from various local markets in the city of Baghdad (at a rate of (9) samples of baby food consisting of cereals and (9) samples of baby foods consisting of vegetables). All samples were examined using an atomic flame absorptiometry (AAS-7000), all results showed the presence of lead and cadmium and the highest concentration value of lead in baby foods consisting of cereals (1.0986) and cadmium in baby foods consisting of vegetables (0.0015) ppm. Lead exceeded 100% limitations and cadmium did not exceed that. The results reported on the risks of contamination, as the mean daily intake (g/kg/d) for
... Show MoreDiabetic retinopathy is an eye disease in diabetic patients due to damage to the small blood vessels in the retina due to high and low blood sugar levels. Accurate detection and classification of Diabetic Retinopathy is an important task in computer-aided diagnosis, especially when planning for diabetic retinopathy surgery. Therefore, this study aims to design an automated model based on deep learning, which helps ophthalmologists detect and classify diabetic retinopathy severity through fundus images. In this work, a deep convolutional neural network (CNN) with transfer learning and fine tunes has been proposed by using pre-trained networks known as Residual Network-50 (ResNet-50). The overall framework of the proposed
... Show MoreImitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co
... Show MoreBlogs have emerged as a powerful technology tool for English as a Foreign Language (EFL) classrooms. This literature review aims to provide an overview of the use of blogs as learning tools in EFL classrooms. The study examines the benefits and challenges of using blogs for language learning and the different types of blogs that can be used for language learning. It provides suggestions for teachers interested in using blogs as learning tools in their EFL classrooms. The findings suggest that blogs are a valuable and effective tool for language learning, particularly in promoting collaboration, communication, and motivation.
Witnessing human societies with the turn of the century atheist twenty huge revolution in information , the result of scientific and technological developments rapidly in space science and communications , and that made the whole world is like a small village not linked by road as it was in ancient times, through the rapid transportation as was the case a few years ago , thanks to the remote sensing devices that roam in space observant everything on the ground , that the information networks that overflowed the world a tremendous amount of information provided for each inhabitants of the earth , which made this information requirement for human life and human survival and well-being , as it has allowed that information to humans opportun
... Show MoreLearning a foreign language is a highly interactive process, and a belief that communicative activities foster a great amount of linguistic production provides language practice and opportunities for negotiation of meaning during communicative exchanges. Thus, this study examines what benefits learner-centered classroom setting offers compared with that of teacher–centered classroom, and how less proficient learners accomplish their tasks and activities with scaffolded help during interaction with the help of proficient classmates and under the guidance of a skilful person, i.e., the teacher. The subjects participating in this study are 30 Iraqi 4th year college students in the Department of English, College of Arts , Univer
... Show MoreThis research is a study of the difficulties of learning the Arabic language that faces Arabic language learners in the Kurdistan Region, by revealing its types and forms, which can be classified into two categories:
The first type has difficulties related to the educational system, the source of which is the Arabic language itself, the Arabic teacher or the learner studying the Arabic language or the educational curriculum, i.e. educational materials, or the educational process, i.e. the method used in teaching.
The second type: general difficulties related to the political aspect, the source of which is the policy of the Kurdistan Regional Government in marginalizing the Arabic language and replacing the forefront of th
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More