Erratum for Organic acid concentration thresholds for ageing of carbonate minerals: Implications for CO2 trapping/storage.
The aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).
Most Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mo
... Show MoreAbstract
The following research is marked by "social intelligence and its role in demonstration the potential abilities for individuals." The discussion dealt with the concepts of contemporary is very important because of their significant role in influencing the work of the Organization, as adopted link between the concepts of social intelligence and the potential role of the first to show the second .The research hypotheses tested in three health institutions in the city of Mosul, the research community is represented (Al-Salam Hospital and General Hospital and the son of ether), while the sample were the leaders of these institutio
... Show MoreCountries are developing the spatial development of their societies through the projects that they undertake in various ways, and this development may be cause great impact on the environment, which also depend on the type of development, whether industrial, agricultural, or service and after the problems that occurred as a result of development on the environment, most of the countries currently did to legislating laws Environmental and some other procedures before granting environmental approvals for the purpose of establishing spatial development projects. One of the most important of these laws and regulations is Environmental impact assessment (EIA). The environmental impact asse
<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreThe study addressed the change in the nature of the land cover of the Al-Jadriya Twist area for the period from 1976-2024 with an area of (140 km2)and for a period of (48 years) based on satellite images and their analysis using geographic information systems. The main classifications of the area were reached (water cover, residential areas, vegetation cover, in addition to empty, unused areas). The extracted data indicate a decrease in the water cover and the change rate reached (-14.29) and the residential areas increased with a change rate of (28.26), while the vegetation cover rate was recorded from (45 km2) to (66 km2) and the empty areas had a change rate of (-78.57).
Classification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE), Border
... Show MoreIn this paper, our purpose is to study the classical continuous optimal control (CCOC) for quaternary nonlinear parabolic boundary value problems (QNLPBVPs). The existence and uniqueness theorem (EUTh) for the quaternary state vector solution (QSVS) of the weak form (WF) for the QNLPBVPs with a given quaternary classical continuous control vector (QCCCV) is stated and proved via the Galerkin Method (GM) and the first compactness theorem under suitable assumptions(ASSUMS). Furthermore, the continuity operator for the existence theorem of a QCCCV dominated by the QNLPBVPs is stated and proved under suitable conditions.
Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show More