Preferred Language
Articles
/
NBdKPo8BVTCNdQwCcWVJ
A three-stage learning algorithm for deep multilayer perceptron with effective weight initialisation based on sparse auto-encoder
...Show More Authors

A three-stage learning algorithm for deep multilayer perceptron (DMLP) with effective weight initialisation based on sparse auto-encoder is proposed in this paper, which aims to overcome difficulties in training deep neural networks with limited training data in high-dimensional feature space. At the first stage, unsupervised learning is adopted using sparse auto-encoder to obtain the initial weights of the feature extraction layers of the DMLP. At the second stage, error back-propagation is used to train the DMLP by fixing the weights obtained at the first stage for its feature extraction layers. At the third stage, all the weights of the DMLP obtained at the second stage are refined by error back-propagation. Network structures and values of learning parameters are determined through cross-validation, and test datasets unseen in the cross-validation are used to evaluate the performance of the DMLP trained using the three-stage learning algorithm. Experimental results show that the proposed method is effective in combating overfitting in training deep neural networks.

Crossref
View Publication
Publication Date
Tue Aug 28 2018
Journal Name
Mechanical Sciences
Mechatronic design and genetic-algorithm-based MIMO fuzzy control of adjustable-stiffness tendon-driven robot finger
...Show More Authors

Abstract. This work presents a detailed design of a three-jointed tendon-driven robot finger with a cam/pulleys transmission and joint Variable Stiffness Actuator (VSA). The finger motion configuration is obtained by deriving the cam/pulleys transmission profile as a mathematical solution that is then implemented to achieve contact force isotropy on the phalanges. A VSA is proposed, in which three VSAs are designed to act as a muscle in joint space to provide firm grasping. As a mechatronic approach, a suitable type and number of force sensors and actuators are designed to sense the touch, actuate the finger, and tune the VSAs. The torque of the VSAs is controlled utilizing a designed Multi Input Multi Output (MIMO) fuzzy controll

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Jan 13 2020
Journal Name
Day 3 Wed, January 15, 2020
Numerical Simulation of Gas Lift Optimization Using Genetic Algorithm for a Middle East Oil Field: Feasibility Study
...Show More Authors
<p>Gas-lift technique plays an important role in sustaining oil production, especially from a mature field when the reservoirs’ natural energy becomes insufficient. However, optimally allocation of the gas injection rate in a large field through its gas-lift network system towards maximization of oil production rate is a challenging task. The conventional gas-lift optimization problems may become inefficient and incapable of modelling the gas-lift optimization in a large network system with problems associated with multi-objective, multi-constrained, and limited gas injection rate. The key objective of this study is to assess the feasibility of utilizing the Genetic Algorithm (GA) technique to optimize t</p> ... Show More
View Publication
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A Novel Invasive Weed Optimization Algorithm (IWO) by Whale Optimization Algorithm(WOA) to solve Large Scale Optimization Problems
...Show More Authors

Abstract  

  In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Impact of Health Education Program upon Knowledge of Patients with End-Stage Renal Failure
...Show More Authors

Objective(s): To determine the impact of health education program toward their end-stage renal failure (ESRF)
patients’ knowledge through a follow-up approach each two months post program implementation for six months.
Methodology: "Follow-up" longitudinal design by using time series approach of data analysis and the application of
pre-post tests approach for the study group and the control group. The study is conducted in Al-Shahid Ghazi Hariri
Teaching Hospital for Surgical Specialties/Centre for Disease and Renal Transplant, and Al-Khayal private Hospital for
renal disease and transplantation during the period from August, 29th
, 2010 through February, 28th
, 2011. To achieve
the objectives of the study, purp

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 19 2017
Journal Name
Al-academy
Pen weight and diversity of Arabic calligraphy
...Show More Authors

           This thesis study (pen weight and diversity of Arabic calligraphy), including the Arabic script went through multiple bodies, it came through the natural evolution of societies, and helped in the renovation and development of calligraphy after they gained a clear identity as a result of development that has occurred in the materials and writing instruments, especially industry pen that led to the diversity of Arabic calligraphy, and through the exploratory research and modeling study, which was obtained that the researcher could pose a problem discussed in the first chapter of his study follows by asking: is the pen is the weight of the role in the diversity of Arabic calligrap

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Relationship between Neonatal septicemia and birth weight
...Show More Authors

Background: Neonatal Septicemia (NNS) is generalized microbial symptomatic infection during the first 28 days of life.It>s the most serious complication in Neonatal Intensive Care Units (NICU) that demand urgent diagnosis and accurate treatment.Objective: To reveal the relationship of neonatal septicemia with birth weight (one of the neonatal risk factors).Patients and Methods: Blood sample was obtained from 76 neonates aged 1 hour-28 days who were diagnosed clinically (poor feeding, respiratory distress, fever, hypothermia, gastrointestinal and/or central nervous system symptoms)and bacteriologically to have neonatal septicemia.Results:One of the most important neonatal factor predisposing to infection is low birth weight, signi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2017
Journal Name
Iosr Journal Of Dental And Medical Sciences (iosr-jdms)
Is deferasirox As Effective As Desferrioxamine in Treatment of Iron Overload In Patients With Thalassemia Major?
...Show More Authors

View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus