In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained
The present study aim at preparing frusemide in liquid form suitable for oral use. This is achieved through preparing different liquid forms of frusemide. The frusemide liquid is prepared in the following forms: oral solution, syrup and elixir with intensity of 1, 0.4 and 0.8% weight /volume respectively and in combination with potassium carbonate, polysorbate 80, alcohol and phosphate buffer solution of pH8 to dissolve the frusemide in the above mentioned forms. The different forms of the prepared medicine have been stored in glass bottles that can provide protection against light and at 40, 50, 600C for four months. Besides the pH has been checked to decide the period of validity. The results show that the expiration date of
... Show MoreEmulsion Liquid Membrane (ELM) is an emerging technology that removes contaminants from water and industrial wastewater. This study investigated the stability and extraction efficiency of ELM for the removal of Chlorpyrifos Pesticide (CP) from wastewater. The stability was studied in terms of emulsion breakage. The proposed ELM included n-hexane as a diluent, span-80 as a surfactant, and hydrochloric acid (HCl) as a stripping agent. Parameters such as mixing speed, aqueous feed solution pH, internal-to-organic membrane volume ratio, and external-to-emulsion volume ratio were investigated. A minimum emulsion breakage of 0.66% coupled with a maximum chlorpyrifos extraction and stripping efficiency were achieved at 96.1% and 95.7% at b
... Show MoreThe consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreThis study aims to identify the role of forensic accounting in the Iraqi environment, banking stability, and to achieve this goal, we used the field survey method, as it is the most appropriate for studying the phenomenon in question and achieving its objectives.
Where we selected a sample consisting of (50) male and female employees, distributed among five private banks in Baghdad governorate, namely (Ashur International Bank, Development Investment Bank, Iraqi Middle East Investment Bank, Hammurabi Commercial Bank, Khaleej Commercial Bank), and the questionnaire tool was applied to them Designed for this purpose, which consisted of
... Show MoreVariable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreAbstract
Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show More