BP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.
The survey and checklist of invasive species of the insects in some different localities of Iraq are revised; 24 invasive species were documented until December 2018 during the current investigations. The species distributions, common names and synonyms are given.
The current investigation included all of exotic species in Iraq, which are not collected during this study.
The objective of this research paper is two-fold. The first is a precise reading of the theoretical underpinnings of each of the strategic approaches: "Market approach" for (M. Porter), and the alternative resource-based approach (R B V), advocates for the idea that the two approaches are complementary. Secondly, we will discuss the possibility of combining the two competitive strategies: cost leadership and differentiation. Finally, we propose a consensual approach that we call "dual domination".
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreIn order to study the dynamic response of historical masonry structures, a scaled down brick masonry model constructed in civil engineering department at Baghdad University to simulate a part of a real case study, which is Alkifil historic minaret. Most of the previous researches about masonry structures try to understand the behavior of the masonry under seismic loading by experimental and numerical methods. In this paper, the masonry units (bricks) simulated in scale (S= 1/6) with the exact shape of the prototype bricks. Cementitious tile adhesive was selected to be the mortar for the modeling. The height of the model designed to be 1.5 m with a 0.5 m diameter. Detailed construction steps were presented in this paper. Experts buil
... Show MoreFuture wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show MoreThe main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreThroughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.
Aims: To assess the success rate and implant stability changes of narrow dental implants (NDIs) during the osseous healing period. Materials and methods: This prospective observational clinical study included 21 patients with narrow alveolar ridge of restricted mesiodistal interdental span who received NDIs. The alveolar ridge width was determined by the ridge mapping technique. Implant stability was measured using Periotest® M immediately after implant insertion then after 4 weeks, 8 weeks and 12 weeks postoperatively. The outcome variables were success rate and implant stability changes during the healing period. The statistical analysis included one-way analysis of variance (ANOVA) and Tukey\'s multiple comparisons test, values < 0.05 w
... Show More