In this paper we study and design two feed forward neural networks. The first approach uses radial basis function network and second approach uses wavelet basis function network to approximate the mapping from the input to the output space. The trained networks are then used in an conjugate gradient algorithm to estimate the output. These neural networks are then applied to solve differential equation. Results of applying these algorithms to several examples are presented
So far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u
... Show MoreThis study evaluated the knowledge and practice of breast self-examination (BSE), among a sample of educated Iraqi women. The study sample comprised 858 women aged 18–62 years affiliated to 6 major Iraqi universities, categorized according to occupation as teaching staff (11.5%), administrative staff (18.0%) and students (70.5%). Data were collected by a self-completed questionnaire. In all, 93.9% of the women had heard about BSE, the main source of information was television (39.9%), doctors (18.4%) and the awareness campaign of the Iraqi National Breast Cancer Research Programme (11.6%). Only 53.9% of the women practised BSE; the most common excuses by those that did not were lack of knowledge of the significance of BSE (42.0%) and lack
... Show MoreLight naphtha one of the products from distillation column in oil refineries used as feedstock for gasoline production. The major constituents of light naphtha are (Normal Paraffin, Isoparaffin, Naphthene, and Aromatic). In this paper, we used zeolite (5A) with uniform pores size (5Aº) to separate normal paraffin from light naphtha, due to suitable pore size for this process and compare the behavior of adsorption with activated carbon which has a wide range of pores size (micropores and mesopores) and high surface area. The process is done in a continuous system - Fixed bed reactor- at the vapor phase with the constant conditions of flow rate 5 ml/min, temperature 180oC, pressure 1.6 bar and 100-gram weight o
... Show MoreTo damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. A suitable PSS model was selected considering the low frequencies oscillation in the inter-area mode based on conventional PSS and Fuzzy Logic Controller. Two types of (FIS) Mamdani and suggeno were considered in this paper. The software of the methods was executed using MATLAB R2015a package.
The modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the
... Show MoreThe combination of high protein content and a soft seed coat makes the wheat-rye hybrid Triticale (Triticosecale) vulnerable to attack by rice weevils. Drying triticale grain to moisture contents safe for storage can prevent infestation by rice weevils, but if grain is being stored for seed, high drying temperatures can affect seed germination. Grain can be effectively dried at low temperatures, but low-temperature drying is difficult in hot, humid regions such as the Gulf Coast. This study nvestigated the effects of drying temperatures from 35°C to 45°C on triticale seed germination and found no statistical differences between the germination rates of the seed at any of the drying temperatures and the germination rates of controls. Final
... Show More