Survival analysis is widely applied in data describing for the life time of item until the occurrence of an event of interest such as death or another event of understudy . The purpose of this paper is to use the dynamic approach in the deep learning neural network method, where in this method a dynamic neural network that suits the nature of discrete survival data and time varying effect. This neural network is based on the Levenberg-Marquardt (L-M) algorithm in training, and the method is called Proposed Dynamic Artificial Neural Network (PDANN). Then a comparison was made with another method that depends entirely on the Bayes methodology is called Maximum A Posterior (MAP) method. This method was carried out using numerical algorithms represented by Iteratively Weighted Kalman Filter Smoothing (IWKFS) algorithm and in combination with the Expectation Maximization (EM) algorithm. Average Mean Square Error (AMSE) and Cross Entropy Error (CEE) were used as comparison’s criteria. The methods and procedures were applied to data generated by simulation using a different combination of sample sizes and the number of intervals.
The purpose of this paper is to apply different transportation models in their minimum and maximum values by finding starting basic feasible solution and finding the optimal solution. The requirements of transportation models were presented with one of their applications in the case of minimizing the objective function, which was conducted by the researcher as real data, which took place one month in 2015, in one of the poultry farms for the production of eggs
... Show MoreData scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for
Many of the proposed methods introduce the perforated fin with the straight direction to improve the thermal performance of the heat sink. The innovative form of the perforated fin (with inclination angles) was considered. Present rectangular pin fins consist of elliptical perforations with two models and two cases. The signum function is used for modeling the opposite and the mutable approach of the heat transfer area. To find the general solution, the degenerate hypergeometric equation was used as a new derivative method and then solved by Kummer's series. Two validation methods (previous work and Ansys 16.0‐Steady State Thermal) are considered. The strong agreement of the validation results (0.3
Polycystic ovary syndrome(PCOS) is a heterogeneous disorder of uncertain etiology , it is the most common endocrinopathy in women and most common cause of anovulatery infertility ,characterized by chronic anovulation and hyperandrogenemia .The present study was designed to investigate the effect of silymarin which is known to have antioxidant and insulin sensitivity effects on the levels of glucose, insulin ,testosterone ,leutinizing hormone(LH) and progesterone .Ovulation rate and Homeostasis Model Assessment of insulin Resistance (HOMA) ratio were determined .A 3-months of treatment were conducted in 60 PCOS patients in three well-matched groups .The first one (n=20),received silymarin(750mg/day) .The second group received
... Show MoreThis paper presents the dynamic responses of generators in a multi-machine power system. The fundamental swing equations for a multi-machine stability analysis are revisited. The swing equations are solved to investigate the influence of a three-phase fault on the network largest load bus. The Nigerian 330kV transmission network was used as a test case for the study. The time domain simulation approach was explored to determine if the system could withstand a 3-phase fault. The stability of the transmission network is estimated considering the dynamic behaviour of the system under various contingency conditions. This study identifies Egbin, Benin, Olorunsogo, Akangba, Sakete, Omotosho and Oshogbo as the key buses w
... Show MoreIn this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal
... Show MoreOne of the recent significant but challenging research studies in computational biology and bioinformatics is to unveil protein complexes from protein-protein interaction networks (PPINs). However, the development of a reliable algorithm to detect more complexes with high quality is still ongoing in many studies. The main contribution of this paper is to improve the effectiveness of the well-known modularity density ( ) model when used as a single objective optimization function in the framework of the canonical evolutionary algorithm (EA). To this end, the design of the EA is modified with a gene ontology-based mutation operator, where the aim is to make a positive collaboration between the modularity density model and the proposed
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreDiesel generators is widely used in Iraq for the purpose of maintaining electric power demand. Large number of operators engaged in this work encounters high level of noise generated by back pack type diesel generators used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known., in present research , quastionaire was adsministered 86 repondents in Baghdad city were exposured to wide range of noise level (80-110) dB(A) with different ages and they have different skill discretion levels. Noise levels A-weigthed decibles dB(A) were measured over 8 weeks two times aday during the 2019 summer using a sound level meter.For predicting the wo
... Show More