Evolution has become a feature of this era because of the speed that makes it open multiple horizons and many to identify everything that is new in different areas and also characterized by the competitive position of emotional attitudes changing depending on the positions of winning and defeat, and the use of training methods are the most important pillars of the game of wrestling, The methods contribute to raising the level of the wrestler and refining his physical and skill potential. The problem of the research is that the shooting exercises from above the chest are very important in Roman wrestling and can be terminated by the player. Through very personal interviews for coaches and concluded that there is a weakness in the level of flexibility which is its index is the failure of wrestlers in the performance of these skills, so he called the researcher to design work and some training aids to address this problem. The aim of the study was to prepare specific exercises using training methods suitable for the sample of the research, to identify the effect of the special exercises in developing the special flexibility, to identify the effect of the special exercises in developing the abduction performance. The researcher imposed a statistically significant relationship between the results of the tribal and remote tests of the control and experimental research groups in the development of the skills of kidnapping for the ages of (14-15) years. In favor of the post-test, the researcher used the experimental method. , And in the data collection side, the researcher used the means designed, experimenting with these tests on the exploratory sample, and then applying them to the application sample. After processing the results and presenting them in the tables, the researcher reached the objectives of the research, The training is designed to prove its capabilities in developing special flexibility. The researcher recommends the introduction of the proposed training methods within the training curricula of the national teams and sports clubs, which showed positive and effective results in the development of special flexibility and performance development of some shooting exercises from above the month and thus improve the level of performance .
Autism Spectrum Disorder, also known as ASD, is a neurodevelopmental disease that impairs speech, social interaction, and behavior. Machine learning is a field of artificial intelligence that focuses on creating algorithms that can learn patterns and make ASD classification based on input data. The results of using machine learning algorithms to categorize ASD have been inconsistent. More research is needed to improve the accuracy of the classification of ASD. To address this, deep learning such as 1D CNN has been proposed as an alternative for the classification of ASD detection. The proposed techniques are evaluated on publicly available three different ASD datasets (children, Adults, and adolescents). Results strongly suggest that 1D
... Show MoreKE Sharquie, AA Noaimi, AG Al-Ghazzi, 2010 - Cited by 2
In this paper, two parameters for the Exponential distribution were estimated using the
Bayesian estimation method under three different loss functions: the Squared error loss function,
the Precautionary loss function, and the Entropy loss function. The Exponential distribution prior
and Gamma distribution have been assumed as the priors of the scale γ and location δ parameters
respectively. In Bayesian estimation, Maximum likelihood estimators have been used as the initial
estimators, and the Tierney-Kadane approximation has been used effectively. Based on the MonteCarlo
simulation method, those estimators were compared depending on the mean squared errors (MSEs).The results showed that the Bayesian esti
Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MorePKE Sharquie MD, PDPAA Noaimi MD, DDV, FDSM Al-Ogaily MD, IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2015
Spatial Intelligence is a mental ability to understand and solve real-world problems. These visual-spatial representations are fundamental in learning various "STEM" topics, like digital drawing, art presentations, creating graphical representations, 2D designs. Opportunity to interact with real and/or virtual objects. It is a good opportunity in applying new techniques such as the augmenter, which is able to clarify mathematical tables, concepts and generalizations greatly to the visualization, understanding and mastery of concepts mathematically. The purpose of the research is to investigate impact of using AR technology in developing spatial intelligence for secondary school students, Baghdad. The quasi-experimental design was us
... Show MoreIn this study, a new technique is considered for solving linear fractional Volterra-Fredholm integro-differential equations (LFVFIDE's) with fractional derivative qualified in the Caputo sense. The method is established in three types of Lagrange polynomials (LP’s), Original Lagrange polynomial (OLP), Barycentric Lagrange polynomial (BLP), and Modified Lagrange polynomial (MLP). General Algorithm is suggested and examples are included to get the best effectiveness, and implementation of these types. Also, as special case fractional differential equation is taken to evaluate the validity of the proposed method. Finally, a comparison between the proposed method and other methods are taken to present the effectiveness of the proposal meth
... Show MoreTo evaluate and improve the efficiency of photovoltaic solar modules connected with linear pipes for water supply, a three-dimensional numerical simulation is created and simulated via commercial software (Ansys-Fluent). The optimization utilizes the principles of the 1st and 2nd laws of thermodynamics by employing the Response Surface Method (RSM). Various design parameters, including the coolant inlet velocity, tube diameter, panel dimensions, and solar radiation intensity, are systematically varied to investigate their impacts on energetic and exergitic efficiencies and destroyed exergy. The relationship between the design parameters and the system responses is validated through the development of a predictive model. Both single and mult
... Show MoreMulti-walled carbon nanotubes (MWCNTs) were functionalized by hexylamine (HA) in a promising, cost-effective, rapid and microwave-assisted approach. In order to decrease defects and remove acid-treatment stage, functionalization of MWCNTs with HA was carried out in the presence of diazonium reaction. Surface functionality groups and morphology of chemically-functionalized MWCNTS were characterized by FTIR, Raman spectroscopy, thermogravimetric analysis (DTG), and transmission electron microscopy (TEM). To reach a promising dispersibility in oil media, MWCNTs were functionalized with HA. While the cylindrical structures of MWCNTs were remained reasonably intact, characterization results consistently confirmed the sidewall-functionalization o
... Show MoreFlying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conduct
... Show More