The convergence speed is the most important feature of Back-Propagation (BP) algorithm. A lot of improvements were proposed to this algorithm since its presentation, in order to speed up the convergence phase. In this paper, a new modified BP algorithm called Speeding up Back-Propagation Learning (SUBPL) algorithm is proposed and compared to the standard BP. Different data sets were implemented and experimented to verify the improvement in SUBPL.
Ensuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac
... Show MoreIn recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication
... Show MoreThe ongoing research to improve the clinical outcome of titanium implants has resulted in the implementation of multiple approaches to deliver osteogenic growth factors accelerating and sustaining osseointegration. Here we show the presentation of human bone morphogenetic protein 7 (BMP-7) adsorbed to titanium discs coated with poly(ethyl acrylate) (PEA). We have previously shown that PEA promotes fibronectin organization into nanonetworks exposing integrin- and growth-factor-binding domains, allowing a synergistic interaction at the integrin/growth factor receptor level. Here, titanium discs were coated with PEA and fibronectin and then decorated with ng/mL doses of BMP-7. Human mesenchymal stem cells were used to investigate cellular resp
... Show MoreSustainable development (SD) is an improvement that meets present needs but jeopardizes the ability of new populations to do the same. It is vital to acquaint EFL students with the terminology and idiomatic expressions of this discipline. Nowadays, sustainable development and the environment have been prioritized in every aspect of life. Since culture and the teaching of Foreign language English cannot be separated, the English language becomes the mean of communication in health, economics, education, and politics. Thus, integrating sustainable development goals within language learning and teaching is very important. This descriptive quantitative study aims to investigate the perception of EFL pre-service teachers of sustainable develo
... Show MoreIdentifying breast cancer utilizing artificial intelligence technologies is valuable and has a great influence on the early detection of diseases. It also can save humanity by giving them a better chance to be treated in the earlier stages of cancer. During the last decade, deep neural networks (DNN) and machine learning (ML) systems have been widely used by almost every segment in medical centers due to their accurate identification and recognition of diseases, especially when trained using many datasets/samples. in this paper, a proposed two hidden layers DNN with a reduction in the number of additions and multiplications in each neuron. The number of bits and binary points of inputs and weights can be changed using the mask configuration
... Show MoreThe research aims to identify the effect of teaching-learning design based on the constructivism theory on the life skills of middle stage students. The sample consisted of (60) students from one of the middle schools in Baghdad's governorate. The experimental group and control group consisted of 30 students for each group, the research tool was the life skills scale composed of (78) items. The scale proved its validity and reliability, which was found to be (0.85). The results showed a statistically significant difference in life skills between the two groups of research in favor of the experimental group, which studied the educational design according to models of constructivism theory compared to the usual method of teaching.
Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MorePurpose: The purpose of this study was to clarify the basic dimensions, which seeks to indestructible scenarios practices within the organization, as a final result from the use of this philosophy.
Methodology: The methodology that focuses adoption researchers to study survey of major literature that dealt with this subject in order to provide a conceptual theoretical conception of scenarios theory .
The most prominent findings: The only successful formulation of scenarios, when you reach the decision-maker's mind wa takes aim to form a correct mental models, which appear in the expansion of Perception managers, and adopted as the basis of the decisions taken. The strength l
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More