Preferred Language
Articles
/
KRiNEpUBVTCNdQwCLSVc
Deep Bayesian for Opinion-target identification
...Show More Authors

The use of deep learning.

View Publication
Publication Date
Sun Mar 13 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Isolation and Identification of food Probiotic Saccharomyces boulardii by using traditional methods, Vitek 2 system and molecular identification methods.: Isolation and Identification of food Probiotic Saccharomyces boulardii by using traditional methods, Vitek 2 system and molecular identification methods.
...Show More Authors

This study was aimed to isolate and identify Saccharomyces boulardii from Mangosteen fruits (Garcinia mangostana L.) by traditional and molecular identification methods To get safe and healthy foods probiotics for use, The isolates and two commercial strains were subjected to cultural, morphological and biochemical tests, The colonies of the isolates were spherical, smooth, mucoidal, dull and white to cream colour on SD agar media .The shape of cells was globose to ovoid and sometimes with budding, in a single form or clustered like a beehive. The isolates and two commercial strains were unable to metabolized galactose and lactose , Results shows that all isolates were unable to utilize potassium nitrate and not grow in the presence of (

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2009
Journal Name
Iraqi Journal Of Physics
Laplacian Operator as Speaker Identification Parameter
...Show More Authors

New speaker identification test’s feature, extracted from the differentiated form of the wave file, is presented. Differentiation operation is performed by an operator similar to the Laplacian operator. From the differentiated record’s, two parametric measures have been extracted and used as identifiers for the speaker; i.e. mean-value and number of zero-crossing points.

View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Pakistan Journal Of Medical & Health Sciences
Entamoeba histolytica, identification in asymptomatic infection
...Show More Authors

Background: Reliable detection the etiological agent of amoebic dysentery and extra-intestinal amoebiasis have Public health importance specially in asymptomatic human and animals, Since the acquisition of pet dogs in the recent period has become widespread in our city. Aim: To give correct perception of infection rate in asymptomatic individuals (human and domestic dogs) for the first aspect and about detection and diagnosis of the pathogenic species of Entamoeba histolytica from another morphologically similar and commensal one using the molecular technique in stool samples of asymptomatic individuals the second aspect. Methods: During the study period from the beginning of September 2020 to the end of February 2021, a total of 95 stool s

... Show More
Preview PDF
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
Lexical Bundles: Identification and Distinguishing Features
...Show More Authors

It is not often  easy to identify a certain group of words as a lexical bundle, since the same set of words can be, in different situations, recognized as idiom,  a collocation, a lexical phrase or a lexical bundle. That is, there are many cases where the overlap among the four types is plausible. Thus, it is important to extract the most identifiable and distinguishable characteristics with which a certain group of words, under certain conditions, can be recognized as a lexical bundle, and this is the task of this paper.

View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
International Journal Of Engineering In Computer Science
Human biometric identification: Application and evaluation
...Show More Authors

View Publication
Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
The Identification Party of University Students
...Show More Authors

The Political loyalties of the individual considered as the most important democracies through direct psychological identification in a particular party. The political parties regarded as the important elements and the foundations of the democratic system. They have effective interaction between the voters and the government institutions. The aim of the current research is to identify the quality of Islamic, the Civilian parties, and the most preferred for students. also, the research attempt to identify the level of identification  party that the  university students have, and the difference of identification party  according to the gender (male, female), the difference of of social class (upper, middle, poor). The sample

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Risk measurement and its role in preparing the target cash flow statement and rationalizing administrative decisions
...Show More Authors

Abstract :

The Aims of this research is to describe the concept of risk, its type and method of measurement, and to clarify the impact of these risks on the expected cash flow statement and the preparation of the target cash flow statement that takes these risks into consideration. Because the local economic environment is exposed to many risks, Therefore, this list will be predictive, which will help the economic unit to make administrative decisions, especially decisions related to operational, investment and financing activities. Therefore, the research problem is based on the fact that most of the local economic units are the list of flows According to the actual basis and not according to the discretionary basis (bud

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 02 2019
Journal Name
Artificial Intelligence Research
A three-stage learning algorithm for deep multilayer perceptron with effective weight initialisation based on sparse auto-encoder
...Show More Authors

A three-stage learning algorithm for deep multilayer perceptron (DMLP) with effective weight initialisation based on sparse auto-encoder is proposed in this paper, which aims to overcome difficulties in training deep neural networks with limited training data in high-dimensional feature space. At the first stage, unsupervised learning is adopted using sparse auto-encoder to obtain the initial weights of the feature extraction layers of the DMLP. At the second stage, error back-propagation is used to train the DMLP by fixing the weights obtained at the first stage for its feature extraction layers. At the third stage, all the weights of the DMLP obtained at the second stage are refined by error back-propagation. Network structures an

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
MODIFIED TRAINING METHOD FOR FEEDFORWARD NEURAL NETWORKS AND ITS APPLICATION in 4-LINK SCARA ROBOT IDENTIFICATION
...Show More Authors

In this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet func

... Show More
View Publication Preview PDF
Crossref