Preferred Language
Articles
/
JRgFKpgBVTCNdQwCnrpN
Effect of changing hidden neurons and activation function on Back Propagation (BP) Speed
...Show More Authors

The Back-Propagation (BP) is the best known and widely used learning algorithm in training multiple neural network. A vast variety of improvements to BP algorithm have been proposed since ninety’s. in this paper, the effects of changing the number of hidden neurons and activation equation are investigated. According to the simulation results, the convergence speed have been improved and become much faster by the previous two modifications on the BP algorithm.

Publication Date
Wed Jul 10 2019
Journal Name
Proceedings Of The Institution Of Mechanical Engineers, Part H: Journal Of Engineering In Medicine
The speed, reflection and intensity of waves propagating in flexible tubes with aneurysm and stenosis: Experimental investigation
...Show More Authors

A localized stenosis or aneurysm is a discontinuity that presents the pulse wave produced by the contracting heart with a reflection site. However, neither wave speed ( c) in these discontinuities nor the size of reflection in relation to the size of the discontinuity has been adequately studied before. Therefore, the aim of this work is to study the propagation of waves traversing flexible tubes in the presence of aneurysm and stenosis in vitro. We manufactured different sized four stenosis and four aneurysm silicone sections, connected one at a time to a flexible ‘mother’ tube, at the inlet of which a single semi-sinusoidal wave was generated. Pressure and velocity were measured simultaneously 25 cm downstream the inlet of th

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Engineering
Assessment of Pedestrian Walking Speed Through the Religious Occasions in Iraq
...Show More Authors

The design of safe pedestrian facilities usually depends on the assessment of pedestrian characteristics and behavior. In this investigation, pedestrian walking speed through the religious occasion have been monitored at three locations, Al- Kadhimiya (Imam AL-Kadim), Najaf and Karbala (Imam AL-Husain) holy shrines. Video captures of the pedestrian through their walking to the two holy shrines have been prepared and analyzed for walking speed, gender, age groups, and clothing tradition. The pedestrian sample size is 468, 501, and 447 for Al- Kadhimiya, Karbala, and Najaf respectively. When the gender is taken into consideration, it can be noted that the walking speed of male and female pedestrian is (0.97, 1.68, and 1.63

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Engineering
Speed Controller of Three Phase Induction Motor Using Sliding Mode Controller
...Show More Authors

In this paper, an adaptive integral Sliding Mode Control (SMC) is employed to control the speed of Three-Phase Induction Motor. The strategy used is the field oriented control as ac drive system. The SMC is used to estimate the frequency that required to generates three phase voltage of Space Vector Pulse Width Modulation (SVPWM) invertor . When the SMC is used with current controller, the quadratic component of stator current is estimated by the controller. Instead of using current controller, this paper proposed estimating the frequency of stator voltage since that the slip speed is function of the quadratic current . The simulation results of using the SMC showed that a good dynamic response can be obtained under load

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 24 2026
Journal Name
Journal Of Physical Education
Comparing Explosive Strength and Speed – Strength in College of Physical Education and Sport Sciences’ Leagues of Basketball and Handball
...Show More Authors

View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Bayesian and non-Bayesian estimation of the lomax model based on upper record values under weighted LINEX loss function
...Show More Authors

In this article, we developed a new loss function, as the simplification of linear exponential loss function (LINEX) by weighting LINEX function. We derive a scale parameter, reliability and the hazard functions in accordance with upper record values of the Lomax distribution (LD). To study a small sample behavior performance of the proposed loss function using a Monte Carlo simulation, we make a comparison among maximum likelihood estimator, Bayesian estimator by means of LINEX loss function and Bayesian estimator using square error loss (SE) function. The consequences have shown that a modified method is the finest for valuing a scale parameter, reliability and hazard functions.

View Publication
Scopus (9)
Scopus
Publication Date
Tue Jan 01 2019
Journal Name
Australian Journal Of Mathematical Analysis And Applications
Formulation of approximate mathematical model for incoming water to some dams on Tigris and Euphrates Rivers using spline function
...Show More Authors

n this paper, we formulate three mathematical models using spline functions, such as linear, quadratic and cubic functions to approximate the mathematical model for incoming water to some dams. We will implement this model on dams of both rivers; dams on the Tigris are Mosul and Amara while dams on the Euphrates are Hadetha and Al-Hindya.

View Publication
Scopus
Publication Date
Sun Jan 01 2017
Journal Name
Aes-atema International Conference Series - Advances And Trends In Engineering Materials And Their Applications
Behavior of back filler friction spot welded joints of similar AA2024-T3 & AA6061-T6 aluminum alloy sheets
...Show More Authors

""

Scopus
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 30 2016
Journal Name
Hepatology
Farnesoid X receptor activation increases reverse cholesterol transport by modulating bile acid composition and cholesterol absorption in mice
...Show More Authors

Activation of farnesoid X receptor (FXR) markedly attenuates development of atherosclerosis in animal models. However, the underlying mechanism is not well elucidated. Here, we show that the FXR agonist, obeticholic acid (OCA), increases fecal cholesterol excretion and macrophage reverse cholesterol transport (RCT) dependent on activation of hepatic FXR. OCA does not increase biliary cholesterol secretion, but inhibits intestinal cholesterol absorption. OCA markedly inhibits hepatic cholesterol 7α‐hydroxylase (Cyp7a1) and sterol 12α‐hydroxylase (Cyp8b1) partly through inducing small heterodimer partner, leading to reduced bile acid pool size and al

... Show More
View Publication
Scopus (151)
Crossref (152)
Scopus Clarivate Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Engineering, Technology & Applied Science Research
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence
...Show More Authors

In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (14)
Scopus Clarivate Crossref