BP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.
In the past two decades, maritime transport traffic has increased, especially in the case of container flow. The BAP (Berth Allocation Problem) (BAP) is a main problem to optimize the port terminals. The current manuscript explains the DBAP problems in a typical arrangement that varies from the conventional separate design station, where each berth can simultaneously accommodate several ships when their entire length is less or equal to length. Be a pier, serve. This problem was then solved by crossing the Red Colobuses Monkey Optimization (RCM) with the Genetic Algorithm (GA). In conclusion, the comparison and the computational experiments are approached to demonstrate the effectiveness of the proposed method contrasted with other
... Show More
Regression testing is a crucial phase in the software development lifecycle that makes sure that new changes/updates in the software system don’t introduce defects or don’t affect adversely the existing functionalities. However, as the software systems grow in complexity, the number of test cases in regression suite can become large which results into more testing time and resource consumption. In addition, the presence of redundant and faulty test cases may affect the efficiency of the regression testing process. Therefore, this paper presents a new Hybrid Framework to Exclude Similar & Faulty Test Cases in Regression Testing (ETCPM) that utilizes automated code analysis techniques and historical test execution data to
... Show MoreAphelenchus avenae was isolated from the wheat crown in Summel distract- Duhok, Kurdistan region-Iraq infected by a crown rot disease which is caused by Fusarium spp; wheat's crown culturing on Potato Dextrose Agar (PDA) and incubating at 25°C A. avenae was found associated with fungal culture which meant that fungal nematode was parasitic on crown rot fungi on wheat crown, this species was described for the first time in Iraq.
Fungal Nematode incubated with Fusarium graminearum, F. oxysporum and Verticillium dahliae reproduce in both solid and liquid media, best results of nematode reproduction were recorded on F. graminearum followed by F. oxy
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThis paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures
... Show MoreThis study aims to numerically simulate the flow of the salt wedge by using computational fluid dynamics, CFD. The accuracy of the numerical simulation model was assessed against published laboratory data. Twelve CFD model runs were conducted under the same laboratory conditions. The results showed that the propagation of the salt wedge is inversely proportional to the applied freshwater discharge and the bed slope of the flume. The maximum propagation is obtained at the lowest discharge value and the minimum slope of the flume. The comparison between the published laboratory results and numerical simulation shows a good agreement. The range of the relative error varies between 0 and 16% with an average of 2% and a roo
... Show MoreThe study aimed to identify the relationship between the speed and direction of the ball's rotation in the accuracy of the front and rear side longitudinal blow in wheelchair tennis players. The descriptive approach wasused in the manner of correlations to suit the nature of the problem to be studied. The research community identified the 32 players aged18 and over, and the search sample was selected from players with a local classification registered with the 2020 Wheelchair Ground Tennis Federation (2020) in the intentional manner of 8 players, using Smart Tennis Sensor technology to measure the speed and direction of the ball and test the accuracy of the front and rear side longitudinalstraightstrike. She conducted the reconnaissance exp
... Show More