A three-stage learning algorithm for deep multilayer perceptron (DMLP) with effective weight initialisation based on sparse auto-encoder is proposed in this paper, which aims to overcome difficulties in training deep neural networks with limited training data in high-dimensional feature space. At the first stage, unsupervised learning is adopted using sparse auto-encoder to obtain the initial weights of the feature extraction layers of the DMLP. At the second stage, error back-propagation is used to train the DMLP by fixing the weights obtained at the first stage for its feature extraction layers. At the third stage, all the weights of the DMLP obtained at the second stage are refined by error back-propagation. Network structures and values of learning parameters are determined through cross-validation, and test datasets unseen in the cross-validation are used to evaluate the performance of the DMLP trained using the three-stage learning algorithm. Experimental results show that the proposed method is effective in combating overfitting in training deep neural networks.
In this research, we studied the multiple linear regression models for two variables in the presence of the autocorrelation problem for the error term observations and when the error is distributed with general logistic distribution. The auto regression model is involved in the studying and analyzing of the relationship between the variables, and through this relationship, the forecasting is completed with the variables as values. A simulation technique is used for comparison methods depending
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreA modification to cascaded single-stage distributed amplifier (CSSDA) design by using active inductor is proposed. This modification is shown to render the amplifier suitable for high gain operation in small on-chip area. Microwave office program simulation of the Novel design approach shows that it has performance compatible with the conventional distributed amplifiers but with smaller area. The CSSDA is suitable for optical and satellite communication systems.
Standardized uptake values, often known as SUVs, are frequently utilized in the process of measuring 18F-fluorodeoxyglucose (FDG) uptake in malignancies . In this work, we investigated the relationships between a wide range of parameters and the standardized uptake values (SUV) found in the liver. Examinations with 18F-FDG PET/CT were performed on a total of 59 patients who were suffering from liver cancer. We determined the SUV in the liver of patients who had a normal BMI (between 18.5 and 24.9) and a high BMI (above 30) obese. After adjusting each SUV based on the results of the body mass index (BMI) and body surface area (BSA) calculations, which were determined for each patient based on their height and weight. Under a variety of dif
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreGrowth is a multifactorial process influenced by genetic, nutritional, hormonal, psychosocial and other factors including the general health of a child. Epilepsy defined as a chronic condition characterized by recurrent clinical events or epileptic seizures, which occur in the absence of a metabolic or toxic disease the drugs that use in the treatment of this condition can affect patients growth due to their mechanisms of action. This study aimed to evaluate the effect of some antiepileptic drugs on growth (height and weight) in children with epilepsy. This work involved 51 newly diagnosed children with a different form of epilepsy (Generalized, absent and partial). Patients divided into three groups according to the treatment (group one
... Show MoreThe performance and durability of the asphalt pavement structure mainly depend on the strength of the bonding between the layers. Such a bond is achieved through the use of an adhesive material (tack coat) to bond the asphalt layers. The main objective of this study is to evaluate the effect of moisture in conjunction with repeated traffic loads on the strength of the bonding between asphalt layers using two types of tack coats with different application rates. Using the nominal maximum size of aggregate (NMAS), the layers were graded (25/19) and (19/9.5) mm. The slabs of multilayer asphalt concrete were prepared using a roller compactor using two types of tack coats to bond between layers, namely rapid curing cut back a
... Show MoreThe paper presents a highly accurate power flow solution, reducing the possibility of ending at local minima, by using Real-Coded Genetic Algorithm (RCGA) with system reduction and restoration. The proposed method (RCGA) is modified to reduce the total computing time by reducing the system in size to that of the generator buses, which, for any realistic system, will be smaller in number, and the load buses are eliminated. Then solving the power flow problem for the generator buses only by real-coded GA to calculate the voltage phase angles, whereas the voltage magnitudes are specified resulted in reduced computation time for the solution. Then the system is restored by calculating the voltages of the load buses in terms
... Show MoreThe mathematical construction of an ecological model with a prey-predator relationship was done. It presumed that the prey consisted of a stage structure of juveniles and adults. While the adult prey species had the power to fight off the predator, the predator, and juvenile prey worked together to hunt them. Additionally, the effect of the harvest was considered on the prey. All the solution’s properties were discussed. All potential equilibrium points' local stability was tested. The prerequisites for persistence were established. Global stability was investigated using Lyapunov methods. It was found that the system underwent a saddle-node bifurcation near the coexistence equilibrium point while exhibiting a transcritical bifurcation
... Show More