Preferred Language
Articles
/
bsj-1417
Stability of Back Propagation Training Algorithm for Neural Networks
...Show More Authors

In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Development Binary Search Algorithm
...Show More Authors

There are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
Al-kindy College Medical Journal
Neural Tube Defects in Iraq
...Show More Authors

1.
Embryonic Origin of Neural Tube Defects.
Insaf Jasim Mahmoud
2.
Etiology of Neural Tube Defectss.
Ali Abdul Razzak Obed
3.
Epidemiology of Neural Tube Defects in Iraq.
Mahmood Dhahir Al-Mendalawi
4.
Surgical Management of Neural Tube Defects.
Laith Thamer Al-Ameri
5.
Prevention of Neural Tube Defects in Iraq.
Mahmood Dhahir Al-Mendalawi

View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of Platelet-Rich Fibrin on Implant Stability
...Show More Authors

Background: Preparation of platelet-rich fibrin (PRF) is a simple, low cost and minimally invasive method to obtain a natural concentration of autologous growth factors that is widely used to accelerate soft and hard tissue healing, thus, PRF is used in different fields of medicine. The aim of this study was to evaluate the effect of local application PRF on stability of dental implants. Materials and methods: nineteen healthy patients with adequate alveolar bone with two or more adjacent missing teeth and/or bilaterally symmetric to the midline (split-mouth design) missing teeth participated in this study. Each patient received at least two dental implants (Dentium Co., Korea). After surgical preparation of the implant sockets, the PRF was

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Jan 06 2018
Journal Name
International Journal Of Applied Pharmaceutics
PREPARATION, RELEASE, RHEOLOGY AND STABILITY OF PIROXICAM EMULGEL
...Show More Authors

Objective: The purpose of this work was to develop and optimize the emulgel formulation of piroxicam with two types of gelling agent chitosan and xanthan gum. The release profiles of prepared formulas were investigated. In addition, the rheology and stability of the best formula were investigated.Methods: Emulsified piroxicam was prepared to use oleic acid, tween 80 and PG with a ratio (3:10:10). In xanthan based emulgel, the xanthan gum (1% and 1.5%) was spread as powder on emulsified piroxicam with stirring until emulgel was formed. In chitosan-based emgels, Chitosan gel was added to emulsified piroxicam and stirring until the Emulgel was constructed. Chitosan gels were prepared by incorporating different concentration, 2%, 3%, 6%

... Show More
View Publication
Scopus (13)
Crossref (10)
Scopus Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
The Influence of NMI against Modularity in Community Detection Problem: A Case Study for Unsigned and Signed Networks
...Show More Authors

Community detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algo

... Show More
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of the Point Efficiency of Sieve Tray Using Artificial Neural Network
...Show More Authors

An application of neural network technique was introduced in modeling the point efficiency of sieve tray, based on a
data bank of around 33l data points collected from the open literature.Two models proposed,using back-propagation
algorithm, the first model network consists: volumetric liquid flow rate (QL), F foctor for gas (FS), liquid density (pL),
gas density (pg), liquid viscosity (pL), gas viscosity (pg), hole diameter (dH), weir height (hw), pressure (P) and surface
tension between liquid phase and gas phase (o). In the second network, there are six parameters as dimensionless
group: Flowfactor (F), Reynolds number for liquid (ReL), Reynolds number for gas through hole (Reg), ratio of weir
height to hole diqmeter

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
2016 International Conference On Computing, Networking And Communications (icnc)
Connectivity and rendezvous in distributed DSA networks
...Show More Authors

In this paper, we use concepts and results from percolation theory to investigate and characterize the effects of multi-channels on the connectivity of Dynamic Spectrum Access networks. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from-a phenomenon which we define as channel abundance. To cope with the existence of multi-channels, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocol, it becomes difficult for two nodes to agree on a common channel, thereby potentially remaining invisible to each other. We model this

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 01 2009
Journal Name
2009 Ieee Wireless Communications And Networking Conference
Power Efficiency Maximization in Cognitive Radio Networks
...Show More Authors

Cognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the exi

... Show More
View Publication
Scopus (16)
Crossref (10)
Scopus Crossref