The study of biomechanical indicators in the arc of the run and the upgrading stage is one of the important variables that affect the nature of the upgrading and thus affect the result of the race due to the importance of these stages and the consequent variables during the last steps. That’s why, the jump-trainings based on assistant means or body weight positively affect the step-time for each of the three steps in the acceleration arc. As well as, it focuses on the momentary strength of each step at this stage. It also significantly affects the speed of motor performance to suit the activity in which the runner needs to perform perfect steps with high flow in order to convert the horizontal speed to a vertical one. This is achieved through producing high instantaneous power and in a short time to achieve a perfect elevation. Those trainings must be built according to real indicators based on scientific results to know the nature of these time-characteristics and the range of its impact on the variables of the last three steps and upgrading, because these variables depend on performance and accuracy and need to stability in performance during attempts. Therefore, some biomechanical variables are found for the three steps and the stage of upgrading through the use of video graphing, kinetic analysis, and preparing special trainings to develop these variables in order to solve this problem that faces the players of the country right now. The research was applied on a group of high-jump players from the country for the (6) advanced-level players and the results of the preceding and following tests were compared. The researchers concluded that the exercises which were performed by using the means and equipment according to the performance and which were used within the strength-exercises are effective in developing the pushing-time at the moments of contact for the last three steps and the stage of upgrading. In the same way, they are effective in the right-time strength of the performance-nature which helped in the frugality of time, the force spent correctly, and the interconnection of the parts of the correct performance of these variables in the last three steps. This is reflected on the stage of upgrading and led to its development.
Steel–concrete–steel (SCS) structural systems have economic and structural advantages over traditional reinforced concrete; thus, they have been widely used. The performance of concrete made from recycled rubber aggregate from scrap tires has been evaluated since the early 1990s. The use of rubberized concrete in structural construction remains necessary because of its high impact resistance, increases ductility, and produces a lightweight concrete; therefore, it adds such important properties to SCS members. In this research, the use of different concrete core materials in SCS was examined. Twelve SCS specimens were subjected to push-out monotonic loading for inspecting their mechanical performance. One specimen was constructed from co
... Show MoreEco-friendly concrete is produced using the waste of many industries. It reduces the fears concerning energy utilization, raw materials, and mass-produced cost of common concrete. Several stress-strain models documented in the literature can be utilized to estimate the ultimate strength of concrete components reinforced with fibers. Unfortunately, there is a lack of data on how non-metallic fibers, such as polypropylene (PP), affect the properties of concrete, especially eco-friendly concrete. This study presents a novel approach to modeling the stress-strain behavior of eco-friendly polypropylene fiber-reinforced concrete (PFRC) using meta-heuristic particle swarm optimization (PSO) employing 26 PFRC various mixtures. The cement was partia
... Show MoreDeep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d
... Show MoreIn this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.
This study thoroughly investigates the potential of niobium oxide (Nb2O5) thin films as UV-A photodetectors. The films were precisely fabricated using dc reactive magnetron sputtering on Si(100) and quartz substrates, maintaining a consistent power output of 50W while varying substrate temperatures. The dominant presence of hexagonal crystal structure Nb2O5 in the films was confirmed. An increased particle diameter at 150°C substrate temperature and a reduced Nb content at higher substrate temperatures were revealed. A distinct band gap with high UV sensitivity at 350 nm was determined. Remarkably, films sputtered using 50W displayed the highest photosensitivity at 514.89%. These outstanding optoelectronic properties highlight Nb2O5 thin f
... Show MoreThis paper presents the first data for bremsstrahlung buildup factor (BBUF) produced by the complete absorption of Y-91 beta particles in different materials via the Monte Carlo simulation method. The bremsstrahlung buildup factors were computed for different thicknesses of water, concrete, aluminum, tin and lead. A single relation between the bremsstrahlung buildup factor BBUF with both the atomic number Z and thickness X of the shielding material has been suggested.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More