Preferred Language
Articles
/
ijs-4885
Using Persistence Barcode to Show the Impact of Data Complexity on the Neural Network Architecture
...Show More Authors

    It is so much noticeable that initialization of architectural parameters has a great impact on whole learnability stream so that knowing  mathematical properties of dataset results in providing neural network architecture a better expressivity and capacity. In this paper, five random samples of the Volve field dataset were taken. Then a training set was specified and the persistent homology of the dataset was calculated to show impact of data complexity on selection of multilayer perceptron regressor (MLPR) architecture. By using the proposed method that provides a well-rounded strategy to compute data complexity. Our method is a compound algorithm composed of the t-SNE method, alpha-complexity algorithm, and a persistence barcode reading method to extract the Betti number of a dataset. After that,  MLPR were trained using that dataset using a single hidden layer with increased hidden neurons. Then, increased both hidden layers and hidden neurons. Our empirical analysis has shown that the training efficiency of MLPR severely depends on its architecture’s ability to express the homology of the dataset.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study the Effect of Manganese Ion Doping on the Size- Strain of SnO2 nanoparticles Using X-Ray Diffraction Data
...Show More Authors

In this study, SnO2 nanoparticles were prepared from cost-low tin chloride (SnCl2.2H2O) and ethanol by adding ammonia solution by the sol-gel method, which is one of the lowest-cost and simplest techniques. The SnO2 nanoparticles were dried in a drying oven at a temperature of 70°C for 7 hours. After that, it burned in an oven at a temperature of 200°C for 24 hours. The structure, material, morphological, and optical properties of the synthesized SnO2 in nanoparticle sizes are studied utilizing X-ray diffraction. The Scherrer expression was used to compute nanoparticle sizes according to X-ray diffraction, and the results needed to be scrutinized more closely. The micro-strain indicates the broadening of diffraction peaks for nano

... Show More
View Publication
Crossref
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Postmodern Architecture between the pillars of philosophical discourse and architectural practice
...Show More Authors

Postmodern arguments, formed a critic case of what modernity brought in several levels. Postmodern practice was considered as a proactive case having amorphous concepts and features to what entiled as an intellectual trends postmodern philosophically and intellectually. But, what postmodernism architecture broughts in it essence, was not isolation from the intellectual context and entrepreneurship case, and it was not disconnecting from the intellectual and philosophical era of that period. Lliteratures and philosophical argument precede what (Robert Venturi) and (Charles A Jencks) had brought, albeit it was closer to critics and correction the path of modernity from crystallizing a direction that exceeds modrinity to wh

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Nov 03 2022
Journal Name
Sensors
A Novel Application of Deep Learning (Convolutional Neural Network) for Traumatic Spinal Cord Injury Classification Using Automatically Learned Features of EMG Signal
...Show More Authors

In this study, a traumatic spinal cord injury (TSCI) classification system is proposed using a convolutional neural network (CNN) technique with automatically learned features from electromyography (EMG) signals for a non-human primate (NHP) model. A comparison between the proposed classification system and a classical classification method (k-nearest neighbors, kNN) is also presented. Developing such an NHP model with a suitable assessment tool (i.e., classifier) is a crucial step in detecting the effect of TSCI using EMG, which is expected to be essential in the evaluation of the efficacy of new TSCI treatments. Intramuscular EMG data were collected from an agonist/antagonist tail muscle pair for the pre- and post-spinal cord lesi

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Feb 02 2023
Journal Name
Journal Of The College Of Basic Education
Context and conveying meaning in the Iraqi theatrical show
...Show More Authors

يشكل السياق جانبا مهماً في فهم الخطاب والمقصود هنا العرض المسرحي، من خلال ما يمده السياق للمتلقي من مؤشرات، يتم الاعتماد عليها في استكمال المعنى الظاهر بالمعنى المستتر، فالسياق يعتمد في الاصل على المحيط المادي الاجتماعي الذي يتم فيه التواصل وفيه يتعرف المرسل والمتلقي أحدهما على الآخر وتتبلور الصورة التي يحملها الطرفان أحدهما عن الآخر، الى جانب كونه يمثل الاحداث التي سبق لهما أن عاشاها والتبادل القولي

... Show More
View Publication
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
fashion and Contrasting in the contemporary Iraqi theater show
...Show More Authors

Since its inception, the theatrical performance has been based on the principle of permanence, continuity, renewal and innovation in the structure of its visual elements. These innovations and the effectiveness of continuity cannot be achieved without searching for everything that is new and different at the level (form and content) in order to create an image with innovative and effective features in the theatrical discourse, and from Among the elements of the theatrical performance (theatrical costumes) that have been subject to variation since the beginning of the theater until now, and for this purpose, the current research was conducted with the question of the research problem: What are the variations of costumes in the contemporar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 26 2019
Journal Name
Iraqi Journal Of Science
Microfacies Architecture and Stratigraphic Development of the Yamama Formation, Southern Iraq
...Show More Authors

The Yamama Formation belongs to the late Berriasian-Aptian succession, which was deposited during the Lower Cretaceous period within the main shallow marine depositional environment.

Petrographic study and microfacies analysis enabled the recognition of six main microfacies for three association facies. These are the Semi-restricted, Shallow open marine and Shoal environments. The study succession represents deposition of three third order cycles, these cycles where deposited during successive episodes of relative sea level rises and still stand.

The presence of shoal association facies (oolitic packstone microfaces) between the Sulaiy and Yamama formations refer to continue the deposition during the same stage, and may s

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The impact of strategic leadership skills on effective environmental management according to the (VUCA Prime) model
...Show More Authors

Purpose: clarify the integrative relationship of strategic leadership skills and effective management and the role of those skills combined or individually in achieving effective management.

Research design: The researchers used the quantitative method by surveying a class sample from the heads of the executive departments in a group of Iraqi private banks, consisting of (106) individuals according to the (VUCA Prime) methodology for effective management and the ten skills model for Johansen. The questionnaire was analyzed using a model of the structural equation.

Findings: The most prominent results of the research were the presence of a weak ro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Al-academy
The Factors influencing to the cognition operation & its Data: وفاء جاسم محمد
...Show More Authors

The present research deals with the influencing factors which depends on the way perceptual of the graphic designer which enters in the design logos of the loco European health, where the search include four chapters, the researcher reviewed in the chapter 0ne the methodical frame of the research ,as reviewed in the second chapter the theoretical frame, and the previous studies which included three sections, the first section included the perceptual understandable and types of it, and the second section included the influencing factors in the designer perceptual ways and its division . While the third section included the perceptual in graphic designer through the percepted shapes and the relation with ground and colors for express the i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More