Preferred Language
Articles
/
gBf50I0BVTCNdQwCLh3l
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of the network, the training and the convergence phases, the proposed strategy based on size of pattern but will avoid learning similar pattern many time, whereas the new strategy XOR shows tolerance in the presence of noise-distorted patterns, infinite storage capacity and pattern inverse value. Experiments showed that the suggested method produced promising results by avoiding the majority of the Hopfield network's limitations. In additional it learns to recognize an infinite number of patterns with varying sizes while preserving a suitable noise ratio.    

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The contractual budget: the ideal technique in planning and implementing capital budgeting projects: a strategy of preparing the contractual budget for Baghdad local government
...Show More Authors

Public budget is the government's tool in achieving the objectives of economic and social development is the accounting curriculum to estimate state revenues and expenditures for years to come, as well as to have legal status as it is after the adoption of an official statement of government units to spend funds on items planned at the same time is a statement collect resources to finance these appropriations, if the primary objective of the budget initially limited to the achievement of financial and legislative control have evolved this function in the area of public administration turned attention from mere imposition of control over the money, which provides information to assist the Department to utilize available resources and prog

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
The Impact of using the strategy of shape (V) on the Achievement of the students of the Department of Artistic Education: كريم حواس علي، نجلاء خضير حسان
...Show More Authors

This research aim at finding out the impact of using the strategy of shape V on the achievement of the students of the Department of Artistic Education in the subject of "Principles of scientific Research ". This strategy is one of the cognitive strategies used in this topic . To verify the aim of the research ,the two researchers have put the following null hypothesis:-There are no significant differences on the level of 0,05 among the average degrees of the students of the experimental group in their answers on the topics of the pre and post cognitive achievement tests of the subject of "principles of scientific Research " . The two researchers have adopted the experimental approach which consists of one group . the population of the r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of projects during the trial operation period in accordance with the cost, quality and time - applied research in the Directorate-General for the distribution
...Show More Authors

Research includes evaluation of projects implemented and which entered into trial operation period in accordance with the evaluation criteria and of (cost, quality and time) to determine the size deviations gap for the sample of projects during the years of assessment (2011-2012-2013-2014) of each of the three evaluation criteria, and then followed by a calculation the size of the overall gap to the problem based on the research problem to determine deviations from the specific implementation of each project by answering several questions to answer turns out the reasons for these deviations occur.

The importance of research Focus on the evaluation of received projects from contractors executing the projec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 28 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Stem cells a novel approach to periodontal regeneration (A review of literature)
...Show More Authors

In this review of literature, the light will be concentrated on the role of stem cells as an approach in periodontal regeneration.

View Publication Preview PDF
Publication Date
Mon Mar 03 2014
Journal Name
Journal Of Baghdad College Of Dentistry
Stem Cells a Novel Approach to Periodontal Regeneration: A Review of Literature
...Show More Authors

Publication Date
Mon Apr 17 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
10.28936 STUDY OF THE KINETIC AND ADSORPTION ISOTHERM PARAMETERS FOR REMOVING COPPER AND IRON IONS FROM AQUEOUS SOLUTIONS BY USING AGRICALTURAL BY-PRODUCTS.: STUDY OF THE KINETIC AND ADSORPTION ISOTHERM PARAMETERS FOR REMOVING COPPER AND IRON IONS FROM AQUEOUS SOLUTIONS BY USING AGRICALTURAL BY-PRODUCTS.
...Show More Authors

Wheat straw was modified with malonic acid in order to get low cost adsorbent have a good ability to remove copper and ferric ions from aqueous solutions, chemical modification temperature was 120°C and the time was 12 h. Parameters that affect the adsorption experiments were studied and found the optimum pH were 6 and 5 for copper and iron respectively and the time interval was 120 min and the adsorbent mass was 0.1 g. The values for adsorption isotherms parameters were determined according to Langmuir [qmax were 54.64 and 61.7 mg/g while b values were 0.234 and 0.22 mg/l] , Freundlich [Kf were 16.07 and 18.89 mg/g and n were 2.77 and 3.16], Temkin [B were 0.063 and 0.074 j/mol and At were 0.143 and 1.658 l/g] and for Dubinin-Radushkev

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Analytical Methods In Environmental Chemistry Journal
Design a continuous microfluidic flow cell for turbidimetric-flow injection technology: A new approach for routine analysis of active pharmaceutical formulations
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 10 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ENCAPSULATION OF OMEGA-3 FATTY ACID USING NANOTECHNOLOGY TO IMPROVE ITS THERMAL STABILITY AND USE IT TO ENRICHING THE YOGURT: ENCAPSULATION OF OMEGA-3 FATTY ACID USING NANOTECHNOLOGY TO IMPROVE ITS THERMAL STABILITY AND USE IT TO ENRICHING THE YOGURT
...Show More Authors

Concentrations 25, 50 and 100 mg of nano-capsules linolenic acid and non-capsulated fatty acid for 1kg of Milk was used for yogurt manufacture. The results showed no significant differences in the ratio of titration acidity and pH values between all processed treatments at the beginning and during of period storage. The treatments was added to it coated omega-3 by nano method were the least exposed to the oxidation process from the non-capsules omega-3, And for shield of The poly lactic acid had a significant role in the protection of alpha-linolenic acid against lipolysis by the formation of a protective layer to protect the acid from the activity of lipases enzymes, and the addition of fatty acid linolenic to milk was determined the gr

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Thu May 15 2025
Journal Name
Route Educational And Social Science Journal
A PSYCHOSOCIAL ANALYSIS OF APPROACHING ZANZIBAR BY TINA HOWE
...Show More Authors

View Publication Preview PDF
Crossref