ANN modeling is used here to predict missing monthly precipitation data in one station of the eight weather stations network in Sulaimani Governorate. Eight models were developed, one for each station as for prediction. The accuracy of prediction obtain is excellent with correlation coefficients between the predicted and the measured values of monthly precipitation ranged from (90% to 97.2%). The eight ANN models are found after many trials for each station and those with the highest correlation coefficient were selected. All the ANN models are found to have a hyperbolic tangent and identity activation functions for the hidden and output layers respectively, with learning rate of (0.4) and momentum term of (0.9), but with different data set sub-division into training, testing and holdout data sub-sets, and different number of hidden nodes in the hidden layer. It is found that it is not necessary that the nearest station to the station under prediction has the highest effect; this may be attributed to the high differences in elevation between the stations. It can also found that the variance is not necessary has effect on the correlation coefficient obtained.
The study using Nonparametric methods for roubust to estimate a location and scatter it is depending minimum covariance determinant of multivariate regression model , due to the presence of outliear values and increase the sample size and presence of more than after the model regression multivariate therefore be difficult to find a median location .
It has been the use of genetic algorithm Fast – MCD – Nested Extension and compared with neural Network Back Propagation of multilayer in terms of accuracy of the results and speed in finding median location ,while the best sample to be determined by relying on less distance (Mahalanobis distance)has the stu
... Show MoreHuman identification is crucial in forensics for the investigation of large-scale disasters such as fires, epidemics, earthquakes, and tsunamis. Even though biometric identification using panoramic dental radiography (PDR) has been the subject of several studies in the literature, further study remains a necessary and challenging issue. In this research, a human identification system was developed based on a convolutional neural network (CNN) and contour transform (CT). The proposed system was implemented on a total of 1540 PDR from 302 individuals. The preprocessing applied to PDRs for enhancing and taking the Region of Interest (ROI). The features were extracted using CT transform. These features were fused with features extracted
... Show MoreIn this paper, an algorithm is suggested to train a single layer feedforward neural network to function as a heteroassociative memory. This algorithm enhances the ability of the memory to recall the stored patterns when partially described noisy inputs patterns are presented. The algorithm relies on adapting the standard delta rule by introducing new terms, first order term and second order term to it. Results show that the heteroassociative neural network trained with this algorithm perfectly recalls the desired stored pattern when 1.6% and 3.2% special partially described noisy inputs patterns are presented.
The paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is impleme
... Show Moreconventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation.
The drill bit is the most essential tool in drilling operation and optimum bit selection is one of the main challenges in planning and designing new wells. Conventional bit selections are mostly based on the historical performance of similar bits from offset wells. In addition, it is done by different techniques based on offset well logs. However, these methods are time consuming and they are not dependent on actual drilling parameters. The main objective of this study is to optimize bit selection in order to achieve maximum rate of penetration (ROP). In this work, a model that predicts the ROP was developed using artificial neural networks (ANNs) based on 19 input parameters. For the
Modeling forward kinematics with neural networks allows for efficient handling of nonlinear relationships and realistic error correction in time-critical applications by relying on accurate training data. This paper presents a Multi-Layer Feed-Forward Neural Network (MLFFNN) to solve the forward kinematics of a 3-DOF robot. The proposed MLFFNN consists of 50 hidden neurons and was trained using 628319 samples to find only the position (x, y, z) of the end-effector. Data were generated by MATLAB, assuming an incremental motion of joints. The joint variables ( , , and ) are the inputs of the NN, which outputs the positions of the end effector (x, y, z) calculated using the Denavit-Hartenberg (DH) method. The results demonstrate that t
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More