Preferred Language
Articles
/
gBf50I0BVTCNdQwCLh3l
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of the network, the training and the convergence phases, the proposed strategy based on size of pattern but will avoid learning similar pattern many time, whereas the new strategy XOR shows tolerance in the presence of noise-distorted patterns, infinite storage capacity and pattern inverse value. Experiments showed that the suggested method produced promising results by avoiding the majority of the Hopfield network's limitations. In additional it learns to recognize an infinite number of patterns with varying sizes while preserving a suitable noise ratio.    

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Oct 01 2009
Journal Name
Baghdad University
Treatment of Cutaneous Leishmaniasis by Topical 25% Podophyllin Solution
...Show More Authors

AG Al-Ghazzi, 2009

View Publication
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Integrated System of Information hiding by Applying Three levels
...Show More Authors

MB Mahmood, BN Dhannoon

View Publication
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Thu Jun 07 2012
Journal Name
Scientific Research And Essays
Security verification of the return routability protocol by Murphi
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Inspired by poets under the Zangid and Ayyubid states
...Show More Authors

The poetic text, being an artistic product, is achieved during the moment of inspiration. However, this inspiration does not come from a vacuum. Rather, it needs a good environment capable of pushing the poetic text to the surface after its formation in the poet's mind, with the images and ideas it contains, expressed in his own language and style. Distinguished, and we must not overlook that language is not just words and meanings, but rather those feelings and emotions that are the essence of creativity (()), including musical, sentimental and imaginative aspects with colors of suggestion and symbols (()), because the poetic language is distinguished from others in that it (Symbols for psychological states are the substance of thought)

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Human recognition by utilizing voice recognition and visual recognition
...Show More Authors

Audio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 08 2011
Journal Name
مجلة الاداب
Morphophonemic Awareness of English Derivatives by Iraqi College Students
...Show More Authors

MR Younus, Al-A'DAB, 2011

View Publication
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Conjunctive Adverbials Used by Iraqi Men and Women Authors
...Show More Authors

This paper highlights the main features of conjunctive adverbials and their occurrence in English academic prose. It accounts for the semantic roles of conjunctive adverbials, forms in which they are used, their positions within a sentence, and their frequency of occurrence in different registers with special reference to academic prose. It also tries to investigate possible differences in men's and women's use of conjunctive adverbials.
Keyword: conjunctive adverbials, linking adverbials, stance adverbials, circumstance adverbials, academic prose

View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
Some Theorems of Fixed Point Approximations By Iteration Processes
...Show More Authors
Abstract<p>The purpose of this paper, is to study different iterations algorithms types three_steps called, new iteration, <italic>M</italic> <sup>∗</sup> −iteration, <italic>k</italic> −iteration, and Noor-iteration, for approximation of fixed points. We show that the new iteration process is faster than the existing leading iteration processes like <italic>M</italic> <sup>∗</sup> −iteration, <italic>k</italic> −iteration, and Noor-iteration process, for like contraction mappings. We support our analytic proof with a numerical example.</p>
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun May 02 2021
Journal Name
Knowledge-based Engineering And Sciences
Lead sorption from aqueous solutions by kaolinite: laboratory experiments
...Show More Authors

The lead has adverse effects in contamination the aquatic environment, for this reason, a laboratory simulation was conducted using kaolinite collected from the Ga’ara Formation at western Iraq to be considered as a natural sorbent material that can be addressed Pb2+ from the aqueous environments. The Energy-Dispersive X-ray Spectroscopy and atomic absorption spectroscopy clarifying very fine grains and pure phase with a very little quantity of quartz and has a number of active sites for adsorption. The sorption of kaolinite for the Pb2+ has been carefully tested by several designed laboratory experiments. Five lead solutions of different concentrations (25, 50, 75, 100 and 125 ppm) were tested under different values of pH (1.3-9)

... Show More
View Publication
Crossref (4)
Crossref