In this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet function. This approach has been performed very successfully, with better results
obtained with the FFNN with modified wavelet activation function (FFMW) when compared with classic
FFNN with Sigmoid activation function (FFS) .One can notice from the simulation that the FFMW can be
capable of identifying the 4-Links of SCARA robot more efficiently than the classic FFS.
The research aims to recognize the impact of the training program based on integrating future thinking skills and classroom interaction patterns for mathematics teachers and providing their students with creative solution skills. To achieve the goal of the research, the following hypothesis was formulated: There is no statistically significant difference at the level (0.05) between the mean scores of students of mathematics teachers whose teachers trained according to the proposed training program (the experimental group) and whose teachers were not trained according to the proposed training program (the control group) in Pre-post creative solution skills test. Research sample is consisted of (31) teachers and schools were distribut
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
Abstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreThe study aims to build a proposed training program for school leaders in the Sultanate of Oman on the planning practices of the Kaufman model in light of the needs and challenges of reality. It also aims to identify the challenges facing school leaders in practicing the stages of strategic planning. To achieve these objectives, the study adopted the descriptive approach due to its suitability to the nature of the study. A questionnaire was used to collect the needed data. The study sample included (225) individuals from school principals, their assistants and senior teachers in post-basic education in the Sultanate of Oman. After processing the data statistically, the study concluded that the reality of planning practices for school lea
... Show Morenew, simple and fast solid-phase extraction method for separation and preconcentration of trace theophylline in aqueous solutions was developed using magnetite nanoparticles (MIONPs) coated with aluminium oxide (AMIONPs) and modified with palmitate (P) as an extractor (P@AMIONPs). It has shown that the developed method has a fast absorbent rate of the theophylline at room temperature. The parameters that affect the absorbent of theophylline in the aqueous solutions have been investigated such as the amount of magnetite nanoparticle, pH, standing time and the volume, concentration of desorption solution. The linear range, limit of quantification (LOQ) and limit of detection (LOD) for the determination of theophylline were 0.05-2.450 μg mL-
... Show MoreBACKGROUND: Hospital training courses for pharmacy students were required to prepare students to meet the challenges of real-world hospital work. AIM: Because there have been few studies on the efficacy of such courses, we aimed to recognize recent graduates’ perceptions, benefits, and factors influencing the quality of hospital training courses for pharmacy students. METHODS: A qualitative study using a phenomenology approach was conducted in 2022 and included several hospitals in Baghdad, Iraq, using in-depth face-to-face individual-based semi-structured interviews. Until saturation, a convenient sample of recently graduated pharmacists was included. The obtained data were analyzed using a thematic content analysis approach
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThere many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma
... Show MorePoly(L-lactic acid) (PLLA)/poly(caprolactone) (PCL) and two types of organoclay (OMMT) including a fatty amide and ocatdecylamine montmorillonite (FA-MMT and ODA-MMT) were employed to produce polymer nanocomposites by melt blending. Materials were characterized using X-ray diffraction (XRD), Fourier transform infrared (FTIR) spectroscopy, thermogravimetric analysis (TGA), elemental analysis, scanning electron microscopy (SEM) and transmission electron microscopy (TEM). Mechanical properties were also investigated for these nanocomposites. The nanocomposites showed increasing mechanical properties and thermal stability. XRD results indicated that the materials formed nanocomposites. SEM morphology showed that increasing content of OMMT reduc
... Show More