Preferred Language
Articles
/
bsj-1417
Stability of Back Propagation Training Algorithm for Neural Networks
...Show More Authors

In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
Stability analysis of a competitive ecological system in a polluted environment
...Show More Authors

The interplay of species in a polluted environment is one of the most critical aspects of the ecosystem. This paper explores the dynamics of the two-species Lokta–Volterra competition model. According to the type I functional response, one species is affected by environmental pollution. Whilst the other degrades the toxin according to the type II functional response. All equilibrium points of the system are located, with their local and global stability being assessed. A numerical simulation examination is carried out to confirm the theoretical results. These results illustrate that competition and pollution can significantly change the coexistence and extinction of each species.

View Publication Preview PDF
Scopus (15)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 15 2020
Journal Name
College Of Islamic Sciences
Ancestor back to achieve the doctrine of the predecessor Sheikh Ibrahim Al-Kurdi Al-Kurani Study and investigation
...Show More Authors

This letter dealt with one of the most prominent verbal and contractual issues, which are the similarities of the legal texts, or the so-called news features. The scholars differed as to their interpretation. Most of the verbal schools went on to interpret these texts in a valid interpretation according to the data of the Arabic language, in order to preserve them from the divine self's pronouncement of similar creatures, while we find that the ancestors kept it on its surface with delegating its meanings to God Almighty. This is what Burhan al-Din al-Kurani suggested in this letter, declaring his total rejection of interpretation.

View Publication Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
An algorithm for binary codebook design based on the average bitmap replacement error (ABPRE)
...Show More Authors

In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
The emotional stability development, Ages 11 to 14 Years
...Show More Authors

The current research aims to identify 1) the differences of emotional stability development level according to the variable of age; and 2) the differences of emotional stability development level according to the variable of gender (male, female). This study employed a descriptive approach, whereby a total of 165 primary and secondary school student was randomly selected from the directorate of AL -rusafa side (1st rusafa) of Baghdad province to constitute the sample of the study. The questionnaire was created based on the previous testes and studies that are relevant to emotional stability, and all its psychometrics features were examined. The researcher analyzed the data using SPSS statistic

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Comparing Study of The Stability and spectral properties vibrations for some Tellurium (IV) compounds containing cycloctadienyl group by Quantum Mechanical Calculations
...Show More Authors

Density Functional Theory (DFT) with B3LYP hybrid exchange-correlation functional and 3-21G basis set and semi-empirical methods (PM3) were used to calculate the energies (total energy, binding energy (Eb), molecular orbital energy (EHOMO-ELUMO), heat of formation (?Hf)) and vibrational spectra for some Tellurium (IV) compounds containing cycloctadienyl group which can use as ligands with some transition metals or essential metals of periodic table at optimized geometrical structures.

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2012
Journal Name
2012 8th International Conference On Wireless Communications, Networking And Mobile Computing
Performance Evaluation of Location Management in GSM Networks
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Topological Indices Polynomials of Domination David Derived Networks
...Show More Authors

The chemical properties of chemical compounds and their molecular structures are intimately connected. Topological indices are numerical values associated with chemical molecular graphs that help in understanding the physicochemical properties, chemical reactivity and biological activity of a chemical compound. This study obtains some topological properties of second and third dominating David derived (DDD) networks and computes several K Banhatti polynomial of second and third type of DDD.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Simulations of the initiation and propagation of streamers in electrical discharges inside water at 3 mm length gap
...Show More Authors

This work is devoted to the modeling of streamer discharge, propagation in liquid dielectrics (water) gap using the bubble theory. This of the electrical discharge (streamer) propagating within a dielectric liquid subjected to a divergent electric field, using finite element method (in two dimensions). Solution of Laplace's equation governs the voltage and electric field distributions within the configuration, the electrode configuration a point (pin) - plane configuration, the plasma channels were followed, step to step. The results show that, the electrical discharge (streamer) indicates the breakdown voltage required for a 3mm atmospheric pressure dielectric liquid gap as 13 kV. Also, the electric potential and field distributions sho

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 11 2023
Journal Name
Applied Sciences
A Preliminary Study and Implementing Algorithm Using Finite State Automaton for Remote Identification of Drones
...Show More Authors

Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the ene

... Show More
View Publication
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Automatic Spike Neural Technique for Slicing Bandwidth Estimated Virtual Buffer-Size in Network Environment
...Show More Authors

The Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modifie

... Show More
View Publication Preview PDF
Crossref