Preferred Language
Articles
/
CRhm2ZUBVTCNdQwC3H_K
Development Artificial Neural Network (ANN) computing model to analyses men's 100¬meter sprint performance trends
...Show More Authors

Coaches and analysts face a significant challenge of inaccurate estimation when analyzing Men's 100 Meter Sprint Performance, particularly when there is limited data available. This necessitates the use of modern technologies to address the problem of inaccurate estimation. Unfortunately, current methods used to estimate Men's 100 Meter Sprint Performance indexes in Iraq are ineffective, highlighting the need to adopt new and advanced technologies that are fast, accurate, and flexible. Therefore, the objective of this study was to utilize an advanced method known as artificial neural networks to estimate four key indexes: Accelerate First of 10 meters, Speed Rate, Time First of 10 meters, and Reaction Time. The application of artificial neural networks in the sports industry in the Republic of Iraq is crucial to ensure successful players. In this study, an artificial neural network model was built to predict Men's 100 meter indexes. Several factors related to the construction of artificial neural networks were studied, including network architecture and internal factors and their impact on the performance of the models. As a result, four easy equations were developed to calculate the four key indexes. The findings of the study indicate that these networks can predict Men's 100 Meter indexes with a high degree of reliability 98.034% and accounting coefficients R = 0.9143.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 22 2025
Journal Name
Misan Journal Of Academic Studies
Some of Parametric and Non Parametric Estimations for Circular Regression Model via Simulation
...Show More Authors

Circular data (circular sightings) are periodic data and are measured on the unit's circle by radian or grades. They are fundamentally different from those linear data compatible with the mathematical representation of the usual linear regression model due to their cyclical nature. Circular data originate in a wide variety of fields of scientific, medical, economic and social life. One of the most important statistical methods that represents this data, and there are several methods of estimating angular regression, including teachers and non-educationalists, so the letter included the use of three models of angular regression, two of which are teaching models and one of which is a model of educators. ) (DM) (MLE) and circular shrinkage mod

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Semi Parametric Logistic Regression Model with the Outputs Representing Trapezoidal Intuitionistic Fuzzy Number
...Show More Authors

In this paper, the fuzzy logic and the trapezoidal fuzzy intuitionistic number were presented, as well as some properties of the trapezoidal fuzzy intuitionistic number and semi- parametric logistic regression model when using the trapezoidal fuzzy intuitionistic number. The output variable represents the dependent variable sometimes cannot be determined in only two cases (response, non-response)or (success, failure) and more than two responses, especially in medical studies; therefore so, use a semi parametric logistic regression model with the output variable (dependent variable) representing a trapezoidal fuzzy intuitionistic number.

the model was estimated on simulati

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 21 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
Delay in eco-epidemiological prey-predator model with predation fear and hunting cooperation
...Show More Authors

It is recognized that organisms live and interact in groups, exposing them to various elements like disease, fear, hunting cooperation, and others. As a result, in this paper, we adopted the construction of a mathematical model that describes the interaction of the prey with the predator when there is an infectious disease, as well as the predator community's characteristic of cooperation in hunting, which generates great fear in the prey community. Furthermore, the presence of an incubation period for the disease provides a delay in disease transmission from diseased predators to healthy predators. This research aims to examine the proposed mathematical model's solution behavior to better understand these elements' impact on an eco-epidemi

... Show More
View Publication
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Tue Apr 04 2023
Journal Name
Journal Of Techniques
Comparison Between the Kernel Functions Used in Estimating the Fuzzy Regression Discontinuous Model
...Show More Authors

Some experiments need to know the extent of their usefulness to continue providing them or not. This is done through the fuzzy regression discontinuous model, where the Epanechnikov Kernel and Triangular Kernel were used to estimate the model by generating data from the Monte Carlo experiment and comparing the results obtained. It was found that the. Epanechnikov Kernel has a least mean squared error.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 30 2025
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Oxidation desulfurization of model oil using carbon composite derived from peach stone waste
...Show More Authors

     In this study, oxidative desulfurization of dibenzothiophene (DBT) with H2O2 as an oxidant was studied, whereas the catalyst used was zirconium oxide supported on Activated carbon (AC). Zirconium oxide (ZrO2) was impregnated over prepared activated carbon (AC) and characterized by various techniques such as XRD, FTIR, BET, SEM, and EDX. This composite was used as a heterogeneous catalyst for oxidation desulfurization of simulated oil. The results of this study showed that ZrO2/AC composite exhibited significant catalytic activity and stability, effectively lowering sulfur content under mild conditions. Factors such as reaction temperature (30, 40, 50, 60°C), time (5, 10, 15,20,30,60, 80 100 min), catalyst dose (0.3, 0.5,

... Show More
View Publication
Crossref
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of e-learning standards in auditing in auditing the performance of customer capita: applied research
...Show More Authors

                  In light of the corona pandemic, educational institutions have moved to learning and teaching via the Internet and e-learning ,and this is considered a turning  point in course of higher education in Iraq in particular and education in general, which generated a great challenge for educational institutions to achieve the highest possible levels in practices and processes to reach the highest quality of their outputs from graduate students to the labor market that auditing performance by adopting e-learning standards is one of the effective tools that help the management of educational institutions by providing information on the ex

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
Typical Effect of Flower and Coscroff on Expressive the Development of Lateral Thinking among the Literary Fifth Grade Students
...Show More Authors

Abstract

The current research aims to identify the typical effect of Flower and Coscroft on expressive performance and the development of lateral thinking among literary fifth-grade students. To achieve the research objective, the researcher chose a sample of (90) female students from the fifth literary grade, with two experimental groups and a control group. The research groups are of six subjects. The research found that the two experimental groups have more expressive performance than the control group. Students of the first experimental group outperformed the students of the second experimental group in expressive performance and lateral thinking tests. In light of the findings of the research, the researcher

... Show More
View Publication Preview PDF