The research objectives, to build a measure of the level of tactical performance of volleyball players applying for the Iraqi Premier League for the 2018-2019 season. The nature of the research problem, then the researchers determined the research sample in the deliberate manner of the players of the Iraqi clubs for the Premier League (B, A). The researchers adopted the entire community as a sample for the research, and the number (156) players distributed over (13) clubs and divided the sample into (12)players an exploratory experiment player representing (the police club) and (100) player representing the construction sample and after a maximum period of two months has passed since applying the scale to the construction sample the researchers applied it to the rationing sample as it consisted of (144) players which is the same as the construction sample plus the rest of it The remaining number, which is (44) players, the researchers extracted the grades and the standard levels. The researchers reached several conclusions, the most important of which was: Building a measure of the level of linear performance by (36) items. The scale was also legalized in the final form, and the standard grades and levels were extracted for it. The researchers recommended using the current scale of volleyball coaches to identify the level of the sample in order to develop their own plans to improve or improve the level of planning performance. Building a measure of the level of the plan’s performance level of volleyball players for other samples and from dif erent age group
In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreThe majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution
... Show MoreAbstract The goal of current study was to identify the relationship between addiction of self-images (Selfie) and personality disorder of narcissus, and the difference of significance the relationship between addiction self-images (selfie) and personality disorder narcissus at students of Mustansiriya university, addiction self- images (selfie) defined: a photograph that one has taken of oneself, typically one taken with a smartphone or webcam and shared via social media, edit and down lowed to social networking sites, and over time, the replacement of normal life virtual world, which is accompanied by a lack of a sense of time, and the formation of repeated patterns increase the risk of social and personal problems. To achieve the goals
... Show MoreThis study aimed to find out the impact of work-life balance on employee satisfaction in five-star hotels in Amman, Jordan based on a descriptive analytical approach. The questionnaire of the survey was designed and distributed to a sample of participants in order to collect the necessary data for this study and they were analyzed later through the SPSS V22 program. The study population was the hotel sector in Jordan, while the study sample included the five-star hotels in the capital, Amman, and the sampling unit included the employees of the middle and lower levels of management in the five-star hotels in Amman. The study showed a number of results, including the existence of a good level of work-life balance by employees in top manage-me
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreA ventricular septal defect (VSD) is defined as a communication between the left and right ventricles or between the left ventricle and the right atrium. VSDs are amongst the most common abnormalities of the heart. They can be present in isolation or in association with other congenital cardiac abnormalities. This is study done with the aim to evaluate the types, size, associated CHD with ventricular septal defect in children and adolescent in two cardiac centers (Medical City Complex cardiac clinics, Ibn Al Nafaes teaching hospital) in Baghdad - Iraq
IR, MIR, UV – Visible spectra have been studied for Cobalt chloride molecule (CoCl2. 6H2O) compound, In wide range spectra (40000 – 410) cm-1 specially MIR range. Assignment were achieved for the fundamental vibrational bands of (CoCl2 . 6H2O ) to symmetry stretching ?1 (?^+) Anti – symmetry stretching ?3(?^+), these bands are non-degenerate , and the bending band is ?2(?) is doubly degenerate thought they have activity in IR and Raman , which explain the weakness in symmetry of this molecule, the fundamental bands for the molecule are centered at the following wave numbers (615, 685, 795, 1115, 1340, 1375, 1616.35, 2091, 2386, 2410, 3364) cm-1 which are corresponding to wave lengths (16260, 14598, 12578, 8968, 7462, 7272, 6186,
... Show More