Preferred Language
Articles
/
bsj-6236
Optimized Artificial Neural network models to time series
...Show More Authors

        Artificial Neural networks (ANN) are powerful and effective tools in time-series applications. The first aim of this paper is to diagnose better and more efficient ANN models (Back Propagation, Radial Basis Function Neural networks (RBF), and Recurrent neural networks) in solving the linear and nonlinear time-series behavior. The second aim is dealing with finding accurate estimators as the convergence sometimes is stack in the local minima. It is one of the problems that can bias the test of the robustness of the ANN in time series forecasting. To determine the best or the optimal ANN models, forecast Skill (SS) employed to measure the efficiency of the performance of ANN models. The mean square error and the absolute mean square error were also used to measure the accuracy of the estimation for methods used. The important result obtained in this paper is that the optimal neural network was the Backpropagation (BP) and Recurrent neural networks (RNN) to solve time series, whether linear, semilinear, or non-linear. Besides, the result proved that the inefficiency and inaccuracy (failure) of RBF in solving nonlinear time series. However, RBF shows good efficiency in the case of linear or semi-linear time series only. It overcomes the problem of local minimum. The results showed improvements in the modern methods for time series forecasting.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Differential evolution detection models for SMS spam
...Show More Authors

With the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Science
On the Greedy Ridge Function Neural Networks for Approximation Multidimensional Functions
...Show More Authors

The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).

Preview PDF
Publication Date
Thu Feb 29 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Design and Development of Powerful Neuroevolution Based Optimized GNNBiLSTM Model for Consumer Behaviour and Effective Recommendation in Social Networks
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (21)
Crossref (12)
Scopus Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
Proposed mechanism to activate the role of the Federal board supreme Audit in the examination of the federal budget estimates of the state
...Show More Authors

The aim of the research is to present and discuss the subject of the budgeting estimates and how to activate the role of the Federal board of supreme audit in examining these estimates through reference to Articles 6 and 10 of the Federal board of supreme Law, which did not restrict Federal board of supreme in Preventive control on examination process for planning which is prepared from the government units, as the result of a large amount  of government units Provisions and the weakness of estimates in most of its items, which rely on personal assessment and not based on scientific and logical basis of the estimate, which leads to the emergence of a deficit is not true in the general budget and this seems clear in most Iraq

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Advances In Intelligent Systems And Computing
Optimal Prediction Using Artificial Intelligence Application
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Crossref
Publication Date
Tue Apr 14 2020
Journal Name
Modern Sport
The Effect of Using the Bybee Strategy(5ES) according to Brain Control Patterns in Learning a Kinetic Series on Floor exercises in Artistic Gymnastics for men
...Show More Authors

The aim of this study to identify patterns of cerebral control (right and left) for second grade students in the collage of physical education and sports science of the University of Baghdad, as well as identify the definition of theThe Effect of Using the Bybee Strategy(5ES) according to Brain Control Patterns in Learning a Kinetic Series on Floor exercises in Artistic Gymnastics for menمجلة الرياضة المعاصرةالمجلد 19 العدد 1 عام 2020effect using the (Bybee) strategy (5ES) according to brain control patterns inlearning a Kinetic series on floor exercises In artistic gymnastics for men, andidentify the best combination between the four research groups learn, use Finderexperimental method research sample consi

... Show More
Preview PDF
Crossref
Publication Date
Thu Apr 02 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
The effects of additives in to heat treatment temperature and time on the crystallinity of lithium silicate glass-ceramic
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Deconstruction the Theatrical Time in the Expressionist Doctrine
...Show More Authors

Time affects all elements of the intellectual scene or the theatrical scene. It came along with the theatrical doctrines according to the conditions of those doctrines and their conceptual ideas or the method of their mechanisms in the application. While it is classically or realistically integrated, we see it in the expressionist doctrine inconsistent and its inconsistency makes it responsive for the deconstruction strategy. Hence the researcher entitled his study (deconstruction the theatrical time in the expressionist doctrine) so that deconstruction would be a field for his study.   The study starts with an introduction presenting the research problem, importance and objective. The theoretical framework consisted of three s

... Show More
View Publication Preview PDF
Crossref