Preferred Language
Articles
/
jih-2683
Cascade-Forward Neural Network for Volterra Integral Equation Solution
...Show More Authors

The method of solving volterra integral equation by using numerical solution is a simple operation but to require many memory space to compute and save the operation. The importance of this equation appeares new direction to solve the equation by using new methods to avoid obstacles. One of these methods employ neural network for obtaining the solution.

This paper presents a proposed method by using cascade-forward neural network to simulate volterra integral equations solutions. This method depends on training cascade-forward neural network by inputs which represent the mean of volterra integral equations solutions, the target of cascade-forward neural network is to get the desired output of this network. Cascade-forward neural network is trained multi times to obtain the desired output, the training of cascade-forward neural network model terminal when there is no enhancement in result. The model combines all training cascade-forward neural network to obtain the best result. This method proved its successful in training and testing cascade-forward neural network for obtaining the desired output of numerical solution of volterra integral equation for multi intervals. Cascade-forward neural network model measured by calculating MSE to compute the degree of error at each training time.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Electronic payment methods used for salary resettlement and its impact on improving the mental image of customers: an applied study of the opinions of a sample of (private) commercial banks 'customers contracting with the Ministry of Higher Education and Scientific Research to localize employees' salaries
...Show More Authors

The research seeks to identify the contemporary events that face the use of electronic payment methods to localize the salaries of state employees and its impact in enhancing the mental image of customers, and to achieve this purpose from the fact that a questionnaire was designed and distributed to an optional sample of (31) individual customers (employees) dealing With the researched private banks, it has been analyzed and reached a number of conclusions and recommendations, the most prominent of which is the lack of modernity of electronic payment methods by customers, which is reflected in the mental image of customers and the achievement of their satisfaction, in the Emiratization project for salaries needs an advanced leade

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Impacts of Denial-of-Service Attack on Energy Efficiency Pulse Coupled Oscillator
...Show More Authors

The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A Survey on Arabic Text Classification Using Deep and Machine Learning Algorithms
...Show More Authors

    Text categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accu

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Crossref
Publication Date
Tue Sep 29 2020
Journal Name
Iraqi Journal Of Science
An Automated Classification of Mammals and Reptiles Animal Classes Using Deep Learning
...Show More Authors

Detection and classification of animals is a major challenge that is facing the researchers. There are five classes of vertebrate animals, namely the Mammals, Amphibians, Reptiles, Birds, and Fish, and each type includes many thousands of different animals. In this paper, we propose a new model based on the training of deep convolutional neural networks (CNN) to detect and classify two classes of vertebrate animals (Mammals and Reptiles). Deep CNNs are the state of the art in image recognition and are known for their high learning capacity, accuracy, and robustness to typical object recognition challenges. The dataset of this system contains 6000 images, including 4800 images for training. The proposed algorithm was tested by using 1200

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Compression of an ECG Signal Using Mixed Transforms
...Show More Authors

Electrocardiogram (ECG) is an important physiological signal for cardiac disease diagnosis. With the increasing use of modern electrocardiogram monitoring devices that generate vast amount of data requiring huge storage capacity. In order to decrease storage costs or make ECG signals suitable and ready for transmission through common communication channels, the ECG data
volume must be reduced. So an effective data compression method is required. This paper presents an efficient technique for the compression of ECG signals. In this technique, different transforms have been used to compress the ECG signals. At first, a 1-D ECG data was segmented and aligned to a 2-D data array, then 2-D mixed transform was implemented to compress the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Traveling Wave Solutions of Fractional Differential Equations Arising in Warm Plasma
...Show More Authors

This paper aims to study the fractional differential systems arising in warm plasma, which exhibits traveling wave-type solutions. Time-fractional Korteweg-De Vries (KdV) and time-fractional Kawahara equations are used to analyze cold collision-free plasma, which exhibits magnet-acoustic waves and shock wave formation respectively. The decomposition method is used to solve the proposed equations. Also, the convergence and uniqueness of the obtained solution are discussed. To illuminate the effectiveness of the presented method, the solutions of these equations are obtained and compared with the exact solution. Furthermore, solutions are obtained for different values of time-fractional order and represented graphically.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Epidemiological Complex Networks: A Survey
...Show More Authors

     In this review paper, several research studies were surveyed to assist future researchers to identify available techniques in the field of infectious disease modeling across complex networks. Infectious disease modelling is becoming increasingly important because of the microbes and viruses that threaten people’s lives and societies in all respects. It has long been a focus of research in many domains, including mathematical biology, physics, computer science, engineering, economics, and the social sciences, to properly represent and analyze spreading processes. This survey first presents a brief overview of previous literature and some graphs and equations to clarify the modeling in complex networks, the detection of societie

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Study of Graph Theory Applications in IT Security
...Show More Authors

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Re

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Revaluation of Student Failure Reasons Using Non-Additive Methods
...Show More Authors

In this paper, An application of non-additive measures for re-evaluating the degree of importance of some student failure reasons has been discussed. We apply non-additive fuzzy integral model (Sugeno, Shilkret and Choquet) integrals for some expected factors which effect student examination performance for different students' cases.

View Publication Preview PDF
Scopus Crossref