Preferred Language
Articles
/
Ihj1KZgBVTCNdQwC6brG
A HYBRID CUCKOO SEARCH AND BACK-PROPAGATION ALGORITHMS WITH DYNAMIC LEARNING RATE TO SPEED UP THE CONVERGENCE (SUBPL) ALGORITHM
...Show More Authors

BP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.

Publication Date
Fri Oct 01 2021
Monitoring and controlling the speed and direction of a DC motor through FPGA and comparison of FPGA for speed and performance optimization
...Show More Authors

<span lang="EN-US">We are living in the 21<sup>st</sup> century, an era of acquiring necessity in one click. As we, all know that technology is continuously reviving to stay ahead of advancements taking place in this world of making things easier for mankind. Technology has been putting his part in introducing different projects as we have used the field programmable gate arrays (FPGAs) development board of low cost and programmable logic done by the new evolvable cyclone software is optimized for specific energy based on Altera Cyclone II (EP2C5T144) through which we can control the speed of any electronic device or any Motor Control IP product targeted for the fan and pump. Altera Cyclone FPGAs’ is a board thro

... Show More
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of a Kinematic Neural Controller for Mobile Robots based on Enhanced Hybrid Firefly-Artificial Bee Colony Algorithm
...Show More Authors

The paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then  proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is impleme

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 04 2025
Journal Name
Journal Of The College Of Basic Education
The effectiveness of upward training with weights to develop explosive power and speed and some functional variables for young volleyball players
...Show More Authors

The effectiveness of upward training with weights to develop explosive power, characterized by speed and some functional variables for young volleyball players Many efforts of sports laboratories in various countries have been devoted to laying scientific foundations and rules in caring for the physical, skilled, planning, and psychological preparation of players and creating the conditions and requirements for reaching players to higher standards. The research aims to:1- Preparing an ascending training program with weights to develop explosive strength, which is characterized by speed and some functional variables for volleyball players.2- Identify the effect of the training program with upward training in weights to develop explosive stre

... Show More
View Publication
Publication Date
Tue Nov 04 2025
Journal Name
Iraqi Journal Of Mechanical And Material Engineering
WAKE ROLL-UP BEHIND WINGS WITH GROUND EFFECT
...Show More Authors

A numerical method for the calculation of the three-dimensional wake rollup behind symmetric wings with ground effect and its aerodynamic characteristics for steady low subsonic flow have been developed. A non-planar quadrilateral vortex-ring method with vortex wake relaxation iterative scheme for lifting surfaces is obtained. A computer program was build to treat wings with breaks, span wise trailing edge flaps, local dihedral angle, camber, twist and ground effect. Forces and moments are obtained from vector product of local velocity and vortex strength multiplied by density. The program has been validated for a number of configurations for which experimental data is available. Good agreement has been obtained for these configurations. Al

... Show More
View Publication
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
...Show More Authors

            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Sep 12 2019
Journal Name
Al-kindy College Medical Journal
Evaluation of obesity, smoking, and sedentary lifestyle associations with low back pain in young adults
...Show More Authors

Background: low back pain is one of the most common public health problems and of the most common musculoskeletal complaint. Many risk factors have been considered for developing low back pain include smoking, obesity and sedentary lifestyle.

Aim of study: To evaluate smoking, obesity, and sedentary lifestyle associations with low back pain in young adults aged (18 – 39 years).

Methods: a comparative cross sectional study for young adults aged 18 – 39 years, participants with low back pain as a symptom constitutes the first group, others free of this symptom considered as the control group. Age and gender matched in both groups. Smoking, obesity and sedentary life sty

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
The Convergence of Iterative Methods for Quasi δ-Contraction Mappings
...Show More Authors
Abstract<p>In this article, we will present a quasi-contraction mapping approach for D iteration, and we will prove that this iteration with modified SP iteration has the same convergence rate. At the other hand, we prove that the D iteration approach for quasi-contraction maps is faster than certain current leading iteration methods such as, Mann and Ishikawa. We are giving a numerical example, too.</p>
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Applications And Applied Mathematics: An International Journal (aam)
Stability and Bifurcation of a Cholera Epidemic Model with Saturated Recovery Rate
...Show More Authors

In this paper, a Cholera epidemic model is proposed and studied analytically as well as numerically. It is assumed that the disease is transmitted by contact with Vibrio cholerae and infected person according to dose-response function. However, the saturated treatment function is used to describe the recovery process. Moreover, the vaccine against the disease is assumed to be utterly ineffective. The existence, uniqueness and boundedness of the solution of the proposed model are discussed. All possible equilibrium points and the basic reproduction number are determined. The local stability and persistence conditions are established. Lyapunov method and the second additive compound matrix are used to study the global stability of the system.

... Show More
View Publication
Publication Date
Thu Dec 01 2016
Journal Name
Al.qadisiya Journal For The Sciences Of Physical Education
Comparing self-learning associated with the model and learning reverse fashioned way of partial way to learn Olympic lifts for beginners
...Show More Authors

Abstract The purpose of this study, teach the art of performing Olympic lifts (snatch and, clean and jerk) using the two methods are instructional (self-learning associated with the model) and (reverse style of partial way). Identify the effectiveness of these methods in learning the art of performance and style of the best Olympic lifting in the learning and retention of novice for Olympic lifts. The research sample consisted of 16 lifters were selected purposively representing specialist center for the care of athletic talent to weightlifting for ages 14 years. The sample was divided into two experimental, Each group (8) eight weightlifters. The experimental group used the style of the first self-learning associated with the m

... Show More
View Publication Preview PDF