The Back-Propagation (BP) is the best known and widely used learning algorithm in training multiple neural network. A vast variety of improvements to BP algorithm have been proposed since ninety’s. in this paper, the effects of changing the number of hidden neurons and activation equation are investigated. According to the simulation results, the convergence speed have been improved and become much faster by the previous two modifications on the BP algorithm.
A localized stenosis or aneurysm is a discontinuity that presents the pulse wave produced by the contracting heart with a reflection site. However, neither wave speed ( c) in these discontinuities nor the size of reflection in relation to the size of the discontinuity has been adequately studied before. Therefore, the aim of this work is to study the propagation of waves traversing flexible tubes in the presence of aneurysm and stenosis in vitro. We manufactured different sized four stenosis and four aneurysm silicone sections, connected one at a time to a flexible ‘mother’ tube, at the inlet of which a single semi-sinusoidal wave was generated. Pressure and velocity were measured simultaneously 25 cm downstream the inlet of th
... Show MoreThe design of safe pedestrian facilities usually depends on the assessment of pedestrian characteristics and behavior. In this investigation, pedestrian walking speed through the religious occasion have been monitored at three locations, Al- Kadhimiya (Imam AL-Kadim), Najaf and Karbala (Imam AL-Husain) holy shrines. Video captures of the pedestrian through their walking to the two holy shrines have been prepared and analyzed for walking speed, gender, age groups, and clothing tradition. The pedestrian sample size is 468, 501, and 447 for Al- Kadhimiya, Karbala, and Najaf respectively. When the gender is taken into consideration, it can be noted that the walking speed of male and female pedestrian is (0.97, 1.68, and 1.63
... Show MoreIn this paper, an adaptive integral Sliding Mode Control (SMC) is employed to control the speed of Three-Phase Induction Motor. The strategy used is the field oriented control as ac drive system. The SMC is used to estimate the frequency that required to generates three phase voltage of Space Vector Pulse Width Modulation (SVPWM) invertor . When the SMC is used with current controller, the quadratic component of stator current is estimated by the controller. Instead of using current controller, this paper proposed estimating the frequency of stator voltage since that the slip speed is function of the quadratic current . The simulation results of using the SMC showed that a good dynamic response can be obtained under load
... Show MoreIn this article, we developed a new loss function, as the simplification of linear exponential loss function (LINEX) by weighting LINEX function. We derive a scale parameter, reliability and the hazard functions in accordance with upper record values of the Lomax distribution (LD). To study a small sample behavior performance of the proposed loss function using a Monte Carlo simulation, we make a comparison among maximum likelihood estimator, Bayesian estimator by means of LINEX loss function and Bayesian estimator using square error loss (SE) function. The consequences have shown that a modified method is the finest for valuing a scale parameter, reliability and hazard functions.
n this paper, we formulate three mathematical models using spline functions, such as linear, quadratic and cubic functions to approximate the mathematical model for incoming water to some dams. We will implement this model on dams of both rivers; dams on the Tigris are Mosul and Amara while dams on the Euphrates are Hadetha and Al-Hindya.
In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreActivation of farnesoid X receptor (FXR) markedly attenuates development of atherosclerosis in animal models. However, the underlying mechanism is not well elucidated. Here, we show that the FXR agonist, obeticholic acid (OCA), increases fecal cholesterol excretion and macrophage reverse cholesterol transport (RCT) dependent on activation of hepatic FXR. OCA does not increase biliary cholesterol secretion, but inhibits intestinal cholesterol absorption. OCA markedly inhibits hepatic cholesterol 7α‐hydroxylase (
In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show More