Preferred Language
Articles
/
jeasiq-1427
Neural Networks as a Discriminant Purposes
...Show More Authors

Discriminant between groups is one of the common procedures because of its ability to analyze many practical phenomena, and there are several methods can be used for this purpose, such as linear and quadratic discriminant functions. recently, neural networks is used as a tool to distinguish between groups.

In this paper the simulation is used to compare neural networks and classical method for classify observations to group that is belong to, in case of some variables that don’t follow the normal distribution. we use the proportion of number of misclassification observations to the all observations as a criterion of comparison.  

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
International Journal Of Modern Trends In Engineering And Research (ijmter)
Effect of changing hidden neurons and activation function on Back Propagation (BP) Speed
...Show More Authors

The Back-Propagation (BP) is the best known and widely used learning algorithm in training multiple neural network. A vast variety of improvements to BP algorithm have been proposed since ninety’s. in this paper, the effects of changing the number of hidden neurons and activation equation are investigated. According to the simulation results, the convergence speed have been improved and become much faster by the previous two modifications on the BP algorithm.

Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Proceedings of Ninth International Congress on Information and Communication Technology
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
View Publication
Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 07 2016
Journal Name
Fourth International Conference On Wireless And Optical Communications, 2016, Beijing, China
ESAM: Endocrine inspired Sensor Activation Mechanism for multi-target tracking in WSNs
...Show More Authors

Target tracking is a significant application of wireless sensor networks (WSNs) in which deployment of self-organizing and energy efficient algorithms is required. The tracking accuracy increases as more sensor nodes are activated around the target but more energy is consumed. Thus, in this study, we focus on limiting the number of sensors by forming an ad-hoc network that operates autonomously. This will reduce the energy consumption and prolong the sensor network lifetime. In this paper, we propose a fully distributed algorithm, an Endocrine inspired Sensor Activation Mechanism for multi target-tracking (ESAM) which reflecting the properties of real life sensor activation system based on the information circulating principle in the endocr

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
URAL BATIR DESTANINDA SÖZ TEKRARLARI
...Show More Authors

Tekrarlar, anlamı kuvvetlendirmek, ifadeyi zenginleştirmek amacıyla kullanılan dil unsurlarıdır. Ural Batır destanı da tekrarlar, özellikle de ikilemeler açısından zengindir. Bu yazıda, Ural Batır destanındaki ikilemeler gruplandırılarak verilecek ve değerlendirmesi yapılacaktır.

Abstract

Word repeating is language items used for strengthen the meaning and riching the expression. By this view, Ural Batır epic is a good example for word repeating units. In this paper, Ural Batır epic’s word repeating has been presented by classification.

View Publication Preview PDF
Publication Date
Thu Sep 07 2023
Journal Name
Journal Of Higher Education Theory And Practice
THE CONCEPTUAL FRAMEWORK OF THE CULTURE OF PEACE AND ITS IMPLICATIONS ON SUSTAINABLE DEVELOPMENT
...Show More Authors

The issue of peace, renunciation of violence, and acceptance of the other is one of the vital issues that rose to the top of the list of priorities at the end of the last century and the beginning of the new millennium of the conscience of the Iraqi people by spreading the culture of peace. In this context, we seek during this research to identify the concept of the culture of peace and its impact on sustainable development, and to draw a set of results and suggestions to consolidate this culture in our Iraqi society as an obligation of sustainable development.

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Biotechnology Research Center
Molecular screening of the entA gene of Enterococcus faecium isolated from Food and clinical sources
...Show More Authors

Background: The microbial production of substances that have the potency to suppress the growth of other microorganisms is probably one of the prevalent defense strategy developed in nature, microorganisms produce a variable bunch of microbial defense systems, which include antibiotics, metabolic by-products, lytic agents, bacteriocins and others. Objective: The purpose of the present study was to isolate and identify Enterococcus faecium isolates then detecting its ability of carrying the gene responsible for enterocin production in this species. Materials and methods: Out of 50 samples from different sources (food and clinical sources) were collected for the Enterococcus faecium isolation, and the isolated bacteria Enterococ

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Biochemical Characterization for Lipid Synthesis in Aspergillus niger
...Show More Authors

A niger, a fungus which doesn't have high ability to production lipid, this fungus has been select to investigate the non oleaginicity. In this search, there are explorations about: i) growth profile ii) enzymes profile iii) isoforms. Growth profile shows that this fungus doesn't have ability to accumulate lipid more than 6% while bio mass are around 10g/l in spite of the presence of glucose in the media till the end of cultivation time and excision of nitrogen within 24 hrs. In enzyme study, we investigate all lipogenic enzymes Malic enzyme (ME), Fatty acid synthase (FAS), ATP: Citrate lays (ACL), NAD+ isocitrate dehydrogenase (NAD+ICDH), Glucose-6-phosphate (G6PD), and 6-phosphogluconate dehydrogenase (6PGD), all these enzymes show, ac

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
Abu Al-Shammaq, the tramp of spelling
...Show More Authors

Research summary

Praise be to God, Lord of the worlds, and prayers and peace be upon the one who was the most eloquent of people in language and the most eloquent of them in eloquence, our Master Muhammad (peace and blessings of God be upon him).

To proceed... There is no doubt that many studies have preceded me in talking about chalk, each according to his own destination and view, and what I do not deny is that I benefited a lot from it, and it provided me with a lot of valuable information, and I liked to be one of those study pens, trying as much as possible To add something new and different in the study, far from similarity and repetition. Especially in the Abbasid study.

The babble in the Abbasid society was d

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Petrophysical Properties of Nahr Umar Formation in Nasiriya Oil Field
...Show More Authors

   Petrophysical characterization is the most important stage in reservoir management. The main purpose of this study is to evaluate reservoir properties and lithological identification of Nahr Umar Formation in Nasiriya oil field. The available well logs are (sonic, density, neutron, gamma-ray, SP, and resistivity logs). The petrophysical parameters such as the volume of clay, porosity, permeability, water saturation, were computed and interpreted using IP4.4 software. The lithology prediction of Nahr Umar formation was carried out by sonic -density cross plot technique. Nahr Umar Formation was divided into five units based on well logs interpretation and petrophysical Analysis: Nu-1 to Nu-5. The formation lithology is mainly

... Show More
View Publication Preview PDF
Crossref