Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
Background:The demand for esthetic orthodontic appliances is increasing so that the esthetic orthodontic archwires were introduced. This in vitro study was designed to evaluate the surface roughness offiber-reinforced polymer composite (FRPC) archwires compared to coated nickel-titanium (NiTi) archwires immersed in artificial saliva. Materials and Methods:Three types of esthetic orthodontic archwires were used: FRPC (Dentaurum), Teflon coated NiTi (Dentaurum) and epoxy coated NiTi (Orthotechnology). They were round (0.018 inch) in cross section and cut into pieces of 15 mm in length.Forty pieces from each type were divided into four groups; one group was left at a dry condition and the other three groups were immersed in artificial saliva (
... Show MoreIn this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet func
In this research the results of applying Artificial Neural Networks with modified activation function to perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of identification strategy consists of a feed-forward neural network with a modified activation function that operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have been trained online and offline have been used, without requiring any previous knowledge about the system to be identified. The activation function that is used in the hidden layer in FFNN is a modified version of the wavelet function. This approach ha
... Show MoreIn this work, a new development of predictive voltage-tracking control algorithm for Proton Exchange Membrane Fuel Cell (PEMFCs) model, using a neural network technique based on-line auto-tuning intelligent algorithm was proposed. The aim of proposed robust feedback nonlinear neural predictive voltage controller is to find precisely and quickly the optimal hydrogen partial pressure action to control the stack terminal voltage of the (PEMFC) model for N-step ahead prediction. The Chaotic Particle Swarm Optimization (CPSO) implemented as a stable and robust on-line auto-tune algorithm to find the optimal weights for the proposed predictive neural network controller to improve system performance in terms of fast-tracking de
... Show MoreThe Study aims at evaluating the efficiency of the regional transportation net in Al-mahmoodiya Qadaa center. The bus station of the Qadaa center is suffering from heavy traffic jam, which is due to the ongoing movement of the adjacent provinces, particularly the small cities. They vary in the degree of their link by the regional transportation net that links the province with the centers of big cities. That affects the traffic flow of the civilians of these cities and their daily activities in hierarchical way To achieve the purpose of the study, a questionnaire has been constructed to collect data through selecting a random sample including the passengers who are coming to the bus station in Al-Mahmoodiya center to know the flo
... Show MoreWireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates i
... Show MoreThe water supply network inside the building is of high importance due to direct contact with the user that must be optimally designed to meet the water needs of users. This work aims to review previous research and scientific theories that deal with the design of water networks inside buildings, from calculating the amount of consumption and the optimal distribution of the network, as well as ways to rationalize the use of water by the consumer. The process of pumping domestic water starts from water treatment plants to be fed to the public distribution networks, then reaching a distribution network inside the building till it is provided to the user. The design of the water supply network inside the building is
... Show MorePower switches require snubbing networks for driving single – phase industrial heaters. Designing these networks, for controlling the maximum allowable rate of rise of anode current (di/dt) and excessive anode – cathode voltage rise (dv/dt) of power switching devices as thyristors and Triacs, is usually achieved using conventional methods like Time Constant Method (TCM), resonance Method (RM), and Runge-Kutta Method (RKM). In this paper an alternative design methodology using Fuzzy Logic Method (FLM) is proposed for designing the snubber network to control the voltage and current changes. Results of FLM, with fewer rules requirements, show the close similarity with those of conventional design methods in such a network of a Triac drivin
... Show More