The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of the network, the training and the convergence phases, the proposed strategy based on size of pattern but will avoid learning similar pattern many time, whereas the new strategy XOR shows tolerance in the presence of noise-distorted patterns, infinite storage capacity and pattern inverse value. Experiments showed that the suggested method produced promising results by avoiding the majority of the Hopfield network's limitations. In additional it learns to recognize an infinite number of patterns with varying sizes while preserving a suitable noise ratio.
This work comprises the synthesis of new thioxanthone derivatives containing C-substituted thioxanthone. To obtain these derivatives, the o-mercapto benzoic acid was chosen as the starting material, which was reacted with dry benzene in sulfuric acid (98 %) to produce the thioxanthone (1). The 2,7-(disulfonyl phosphine imine) thioxanthone (4-8) were prepared from reaction of compound (1) with chlorosulfonic acid gave 2,7-(disulfonyl chloride) thioxanthone (2). Treatment of (2) with sodium azide to produce 2,7-(disulfonyl azide) thioxanthone (3). Condensation of (3) with phosphorus compounds afforded compounds (4-8). The 2,7-(disulfonamide) thioxanthone (9-21) was obtained when co
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThere are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
In this paper, new transform with fundamental properties are presented. The new transform has many interesting properties and applications which make it rival to other transforms.
Furthermore, we generalize all existing differentiation, integration, and convolution theorems in the existing literature. New results and new shifting theorems are introduced. Finally, comprehensive list of this transforms of functions will be providing.
In this paper, we studied the travelling wave solving for some models of Burger's equations. We used sine-cosine method to solution nonlinear equation and we used direct solution after getting travelling wave equation.
The reaction of some new Schiff bases ( 2-[(2-Amino – ethylimino)-methyl]-R , 2-({2-[(R-benzylidene)-amino]-ethylimino}-methyl)-R with Benzoyl chloride or Acetyl chloride were carried out. Subsequent reactions of these products N-(2-Amino-ethyl)-N-[Chloro-(R) –methyl]-benzamide or N-(2-{?-[chloro-(R) –methyl]-amino}-ethyl)-N-[chloro-(R) –methyl]- benzamide with thiourea afforded thioureas compounds. The synthesized compounds were confirmed by their IR,UV,spectra and C.H.N. analysis.
TI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show MoreThis work comprises the synthesis of new phenoxazine derivatives containing N-substituted phenoxazine starting from phenoxazine (1). Synthesis of ethyl acetate phenoxazine (2) through the reaction of phenoxazine with ethylchloroacetate, which reacted with hydrazine hydrate to give 10-aceto hydrazide phenoxazine (3), then reacted with formic acid to give 10-[N-formyl acetohydrazide] phenoxazine (4). Reaction of compound (4) with phosphorous pentaoxide or phosphorus pentasulphide to gave 10-[N-methylene-1,3,4-oxadiazole] phenoxazine (5) and 10-[N-methylene-1,3,4-thiadiazole] phenoxazine (6).