Preferred Language
Articles
/
bsj-8564
Detection of Autism Spectrum Disorder Using A 1-Dimensional Convolutional Neural Network
...Show More Authors

Autism Spectrum Disorder, also known as ASD, is a neurodevelopmental disease that impairs speech, social interaction, and behavior. Machine learning is a field of artificial intelligence that focuses on creating algorithms that can learn patterns and make ASD classification based on input data. The results of using machine learning algorithms to categorize ASD have been inconsistent. More research is needed to improve the accuracy of the classification of ASD. To address this, deep learning such as 1D CNN has been proposed as an alternative for the classification of ASD detection. The proposed techniques are evaluated on publicly available three different ASD datasets (children, Adults, and adolescents). Results strongly suggest that 1D CNNs have shown improved accuracy in the classification of ASD compared to traditional machine learning algorithms, on all these datasets with higher accuracy of 99.45%, 98.66%, and 90% for Autistic Spectrum Disorder Screening in Data for Adults, Children, and Adolescents respectively as they are better suited for the analysis of time series data commonly used in the diagnosis of this disorder

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Improved Firefly Algorithm with Variable Neighborhood Search for Data Clustering
...Show More Authors

Among the metaheuristic algorithms, population-based algorithms are an explorative search algorithm superior to the local search algorithm in terms of exploring the search space to find globally optimal solutions. However, the primary downside of such algorithms is their low exploitative capability, which prevents the expansion of the search space neighborhood for more optimal solutions. The firefly algorithm (FA) is a population-based algorithm that has been widely used in clustering problems. However, FA is limited in terms of its premature convergence when no neighborhood search strategies are employed to improve the quality of clustering solutions in the neighborhood region and exploring the global regions in the search space. On the

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
La voix de la mère dans À la Recherche du Temps perdu
...Show More Authors

 

Abstract

The twentieth century French novel had undergo a significant change that took the form of a radical move from the traditional son who follows his father to one who no way prevalent in the classical French novel. The new son in the 2Oth century novel finds himself emotionally attached which both became a new trend and approach in novel writing.

Marcel Proust's novel which can be considered a source of inspiration for most of 2Oth century novelists is a good example of the mother supremacy which is crystal clear from the first page through its parts and chapters till the last page. In fact, Proust had written a completely different novel from the Balzacian conventions. Unlike the latter's novels, Pro

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
المجلة السياسية والدولية
تنفيذ مفهوم المسؤولية عن الحماية في ليبيا
...Show More Authors

بعد الاحتجاجات التي اندلعت في ليبيا في فبراير 3122 ،استند مجلس الأمن وهيئات الأمم المتحدة الأخرى على مفهوم المسئولية عن الحماية (R2P )(لمعالجة الأوضاع الإنسانية الناجمة عن تلك الاحتجاجات. وأصدر المجلس القرار 1970والذي فرض بموجبه حزمة من العقوبات على ليبيا، ثم أصدر القرار 1973 الذي سمح بالتدخل العسكري هناك. وبعد البدء بتنفيذ الحملة العسكرية تبين أن الناتو استغل هذه القرارات لتنفيذ أجندته الخاصة وعمل على الإطاحة بالن

... Show More
View Publication Preview PDF
Publication Date
Wed May 05 2021
Journal Name
Arab Science Heritage Journal
مؤلفات عن وباء الطاعون في الوباء الاسلامي
...Show More Authors

Throughout the ages, a number of natural and human disasters have
occurred in the Islamic world,

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Bağdat Coğrafyası Örneğinde Nazarla İlgili Halk Anlatıları
...Show More Authors

 Özet

        Dünyanın muhtelif yerlerinde yaşayan, farklı din, kültür ve etnik gruba mensup olan insanlar arasında nazar inancının mevcut olduğu bilinmektedir. Nazar inancı İslam dinine inananlar arasında olduğu gibi farklı semavi ve gayri semavi dinlere inanan insanlar arasında da mevcut olduğu çeşitli pratik ve uygulamalardan tespit edilebilir. İnsanlar, nazara gelmemek için çeşitli yollara başvurmaktadırlar. Kötü nazarlı insanlara karşı her zaman bir korku, rahatsızlık ve çekingenliğin var olduğu söylenebilir. Dolayısıyla birçok insan, nazara ve başına kötü bir şeyin gelmemesi için söz konusu nazarı kötü

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 28 2018
Journal Name
Arab Science Heritage Journal
توطئة توطئة تاريخية عن عصر ابن الساعي
...Show More Authors

This paper deals with the political, economic and cultural condition wich in volves a lot of events that angaged Arab is history Islamic, The advantage of the Ibn AL-saa`i is in fact a study of the character of the historian and how classihy us his book History of the Caliphs in the eventes of this era.

 

View Publication Preview PDF
Publication Date
Mon Oct 17 2011
Journal Name
Journal Of Engineering
MODIFIED TRAINING METHOD FOR FEEDFORWARD NEURAL NETWORKS AND ITS APPLICATION in 4-LINK SCARA ROBOT IDENTIFICATION
...Show More Authors

In this research the results of applying Artificial Neural Networks with modified activation function to perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of identification strategy consists of a feed-forward neural network with a modified activation function that operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have been trained online and offline have been used, without requiring any previous knowledge about the system to be identified. The activation function that is used in the hidden layer in FFNN is a modified version of the wavelet function. This approach ha

... Show More
Preview PDF
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
MODIFIED TRAINING METHOD FOR FEEDFORWARD NEURAL NETWORKS AND ITS APPLICATION in 4-LINK SCARA ROBOT IDENTIFICATION
...Show More Authors

In this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet func

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Chemical And Process Engineering Research
Synthesis and Characterization of Complexes of Schiff Base [1, 2-Diphenyl -2- 2-{[1-(3-Amino-Phenyl)-Ethylidene]-Hydrazono Methyl}-Phenol] with Mn(II), Fe(II), Co(II), Cu(II), Zn(II), Cd(II), Ni(II), and Hg(II) Ions
...Show More Authors

The new tridentate Schiff base ligand (HL)namely 2-{[1-(3-amino-phenyl)-ethylidene]-hydrazono methyl}- phenol containing (N N O)as donors atoms was prepared in two steps:Step (1): By the reaction of 3- aminoacetophenone with hydrazine monohydrate under reflux in methanol and drops of glacial acetic acid gave the intermediate compound 3-(1- hydrazono ethyl)-phenol amine.Step (2): By the reaction of 3-(1-hydrazono ethyl)-phenol amine with salicyaldehyde under reflux in methanol, gave the ligand (HL).The prepared ligand was characterized by I.R, U.V-Vis,1H- 13C NMR spectra and melting point and reacted with some metal ions under reflux in methanol with (1:1) ratio gave complexes of the general formula: [MClL]. Where: M= Mn(II), Fe(II), Co(II),

... Show More
Preview PDF