يعد علم التدريب الرياضي الحديث عملية تربوية علمية مبنية على اسس صحيحة هدفها وصول اللاعبين الى التكامل في الاداء الفني وهذا يتم عن طريق التأثير المنظم والدقيق بواسطة استعمال التمارين البدنية التي تحدث تغيرات خاصة في عمل اعضاء واجهزة جسم الرياضي والتي بدورها تؤدي الى رفع كفاءة الاعضاء والاجهزة لتحقيق الانجازات الرياضية العالية ولقد استعملت الباحثتان اسلوب حديث من اساليب التدريب الرياضي من اجل تطوير تحم
... Show Moreتحتل أدوات السياسة المالية (الإنفاقية والإيرادية) مكانة مهمة بين أدوات السياسات الاقتصادية الأخرى لما تتمتع به من تأثيرات اقتصادية واجتماعية على مجمل النشاط الاقتصادي .
وفي بحثنا هذا سنركز على الآثار الاجتماعية لأدوات السياسة المالية (الإنفاق العام والإيراد العام) لما للتنمية الاجتماعية من أهمية متزايدة في عالمنا اليوم خاصة فيما يتعلق بمقوماتها غير المادية المتمثلة في خدما
... Show MoreWe examine 10 hypothetical patients suffering from some of the symptoms of COVID 19 (modified) using topological concepts on topological spaces created from equality and similarity interactions and our information system. This is determined by the degree of accuracy obtained by weighing the value of the lower and upper figures. In practice, this approach has become clearer.
With the development of cloud computing during the latest years, data center networks have become a great topic in both industrial and academic societies. Nevertheless, traditional methods based on manual and hardware devices are burdensome, expensive, and cannot completely utilize the ability of physical network infrastructure. Thus, Software-Defined Networking (SDN) has been hyped as one of the best encouraging solutions for future Internet performance. SDN notable by two features; the separation of control plane from the data plane, and providing the network development by programmable capabilities instead of hardware solutions. Current paper introduces an SDN-based optimized Resch
A true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems
A particle swarm optimization algorithm and neural network like self-tuning PID controller for CSTR system is presented. The scheme of the discrete-time PID control structure is based on neural network and tuned the parameters of the PID controller by using a particle swarm optimization PSO technique as a simple and fast training algorithm. The proposed method has advantage that it is not necessary to use a combined structure of identification and decision because it used PSO. Simulation results show the effectiveness of the proposed adaptive PID neural control algorithm in terms of minimum tracking error and smoothness control signal obtained for non-linear dynamical CSTR system.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.
The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More