Preferred Language
Articles
/
joe-2034
Spatial Prediction of Monthly Precipitation in Sulaimani Governorate using Artificial Neural Network Models
...Show More Authors

ANN modeling is used here to predict missing monthly precipitation data in one station of the eight weather stations network in Sulaimani Governorate. Eight models were developed, one for each station as for prediction. The accuracy of prediction obtain is excellent with correlation coefficients between the predicted and the measured values of monthly precipitation ranged from (90% to 97.2%). The eight ANN models are found after many trials for each station and those with the highest correlation coefficient were selected. All the ANN models are found to have a hyperbolic tangent and identity activation functions for the hidden and output layers respectively, with learning rate of (0.4) and momentum term of (0.9), but with different data set sub-division into training, testing and holdout data sub-sets, and different number of hidden nodes in the hidden layer. It is found that it is not necessary that the nearest station to the station under prediction has the highest effect; this may be attributed to the high differences in elevation between the stations. It can also found that the variance is not necessary has effect on the correlation coefficient obtained.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 31 2024
Journal Name
Iraqi Geological Journal
Geomechanical Modeling and Artificial Neural Network Technique for Predicting Breakout Failure in Nasiriyah Oilfield
...Show More Authors

Wellbore instability is one of the major issues observed throughout the drilling operation. Various wellbore instability issues may occur during drilling operations, including tight holes, borehole collapse, stuck pipe, and shale caving. Rock failure criteria are important in geomechanical analysis since they predict shear and tensile failures. A suitable failure criterion must match the rock failure, which a caliper log can detect to estimate the optimal mud weight. Lack of data makes certain wells' caliper logs unavailable. This makes it difficult to validate the performance of each failure criterion. This paper proposes an approach for predicting the breakout zones in the Nasiriyah oil field using an artificial neural network. It

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Computational Intelligence And Neuroscience
A New Artificial Neural Network Approach in Solving Inverse Kinematics of Robotic Arm (Denso VP6242)
...Show More Authors

This paper presents a novel inverse kinematics solution for robotic arm based on artificial neural network (ANN) architecture. The motion of robotic arm is controlled by the kinematics of ANN. A new artificial neural network approach for inverse kinematics is proposed. The novelty of the proposed ANN is the inclusion of the feedback of current joint angles configuration of robotic arm as well as the desired position and orientation in the input pattern of neural network, while the traditional ANN has only the desired position and orientation of the end effector in the input pattern of neural network. In this paper, a six DOF Denso robotic arm with a gripper is controlled by ANN. The comprehensive experimental results proved the appl

... Show More
View Publication
Scopus (127)
Crossref (101)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Human Pose Estimation Algorithm Using Optimized Symmetric Spatial Transformation Network
...Show More Authors

Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Dec 23 2011
Journal Name
International Journal Of The Physical Sciences
Fast prediction of power transfer stability index based on radial basis function neural network
...Show More Authors

View Publication
Scopus (16)
Crossref (4)
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Artificial neural network model for predicting the desulfurization efficiency of Al-Ahdab crude oil
...Show More Authors

View Publication Preview PDF
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Sun May 08 2011
Journal Name
Journal Of Planner And Development
spatial analysis of health services in wasit governorate
...Show More Authors

The spatial variation of regional development means that some regions to be a center of activities and services and job opportunities and economic development, and are usually in major urban centers, while lacking in other regions to such activities and services. Perhaps the studies of spatial variation SPATIAL INEQUALITY, regional development, REGIONAL DEVELOPMENT has had the greatest impact on the operations of regional planning in particular the study of the regional dimension of any city requires that you review the basis and theoretical framework, which refers to the inevitability of the existence of disparities across regions, due to the properties of the regions population and economic political and environmental The study

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
2008 Ieee International Joint Conference On Neural Networks (ieee World Congress On Computational Intelligence)
Linear block code decoder using neural network
...Show More Authors

View Publication
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref