Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The results show that the neural network has good performance compared with two other analytical methods which are average positioning method and optimal positioning method.
Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show MoreFlexible job-shop scheduling problem (FJSP) is one of the instances in flexible manufacturing systems. It is considered as a very complex to control. Hence generating a control system for this problem domain is difficult. FJSP inherits the job-shop scheduling problem characteristics. It has an additional decision level to the sequencing one which allows the operations to be processed on any machine among a set of available machines at a facility. In this article, we present Artificial Fish Swarm Algorithm with Harmony Search for solving the flexible job shop scheduling problem. It is based on the new harmony improvised from results obtained by artificial fish swarm algorithm. This improvised solution is sent to comparison to an overall best
... Show MoreIt is well known that the rate of penetration is a key function for drilling engineers since it is directly related to the final well cost, thus reducing the non-productive time is a target of interest for all oil companies by optimizing the drilling processes or drilling parameters. These drilling parameters include mechanical (RPM, WOB, flow rate, SPP, torque and hook load) and travel transit time. The big challenge prediction is the complex interconnection between the drilling parameters so artificial intelligence techniques have been conducted in this study to predict ROP using operational drilling parameters and formation characteristics. In the current study, three AI techniques have been used which are neural network, fuzzy i
... Show MoreThis paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p
... Show MoreThe aim of this work is study the partical distribution function g(r12,r1) for Carbon ion cases (C+2,C+3,C+4) in the position space using Hartree-Fock's Wave function, and the partitioning technique for each shell which is represented by Carbon Ions [C+2 (1s22s2)], [C+3 (1s22s)] and [C+4 (1s2)]. A comparision has been made among the three Carbon ions for each shell. A computer programs (MATHCAD ver. 2001i) has been used texcute the results.
insulin-like Growth Factor 1 (IGF-1) gene has been described in several studies as a candidate gene for growth. The present study attempts to identify associations between body weight traits and polymorphisms at 279 position of 5'UTR flanking region of IGF-1 gene in broiler chickens. Three hundred broiler chickens from two breeds (Cobb 500 and Hubbard F-15) were used in this study. A single nucleotide polymorphism (SNP) at 279 position of 5'UTR region of the IGF-1 gene was identified in 20.6 and 60.3% of Cobb 500 and Hubbard F-15, respectively, using the PCR-RFLP technique. Allele frequencies were 83.87 and 42.80% for the T allele and 16.13 and 57.20% for the C allele in Cobb500 and Hubbard-15 breeds, respectively. Genotype frequencies were
... Show MoreSince the invention of the automobile, no aspect of American life, including crime and its control, has remained untouched by this far-reaching innovation in transportation. Vehicular "hot pursuit"-when suspects in motor vehicles use excessive speed in attempting to elude the police. Unfortunately, accounts of wild chases across crowded inner city streets, through tree-lined suburban boulevards, and over remote country roads are very real and not merely fictional material created for entertaining television and motion picture audiences. The specter of "hot pursuit," complete with screaming sirens and red or blue flashing lights, has become a recurring fact of modem life.1 So, too, are the mishaps involving police vehicles or the vehicles pu
... Show MoreThermal energy storage is an important component in energy units to decrease the gap between energy supply and demand. Free convection and the locations of the tubes carrying the heat-transfer fluid (HTF) have a significant influence on both the energy discharging potential and the buoyancy effect during the solidification mode. In the present study, the impact of the tube position was examined during the discharging process. Liquid-fraction evolution and energy removal rate with thermo-fluid contour profiles were used to examine the performance of the unit. Heat exchanger tubes are proposed with different numbers and positions in the unit for various cases including uniform and non-uniform tubes distribution. The results show that
... Show More