Preferred Language
Articles
/
shb_UYoBVTCNdQwCLJQb
Enhancing the Delta Training Rule for a Single Layer Feedforward Heteroassociative Memory Neural Network
...Show More Authors

In this paper, an algorithm is suggested to train a single layer feedforward neural network to function as a heteroassociative memory. This algorithm enhances the ability of the memory to recall the stored patterns when partially described noisy inputs patterns are presented. The algorithm relies on adapting the standard delta rule by introducing new terms, first order term and second order term to it. Results show that the heteroassociative neural network trained with this algorithm perfectly recalls the desired stored pattern when 1.6% and 3.2% special partially described noisy inputs patterns are presented.

Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Non-newtonian Fluid Mechanics
On the stability of the BEK family of rotating boundary-layer flows for power-law fluids
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Geotechnical Engineering And Sustainable Construction
Stability and Seismic Performance of Tall Steel Structures with Hybrid Energy Absorbers Including P-Delta Effect
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
GEOMETRIC NONLINEAR TIME DOMAIN SPECTRALMATCHING SEISMIC ANALYSIS OF BASE ISOLATED HIGHRISE BUILDINGS INCLUDING P-DELTA EFFECT
...Show More Authors

Time-domain spectral matching commonly used to define seismic inputs to dynamic analysis in terms of acceleration time history compatible with a specific target response spectrum is used in this study to investigate the second-order geometric effect of P-delta on the seismic response of base-isolated high-rise buildings. A synthetic time series is generated by adjusting reference time series that consist of available readings from a past earthquake of the 1940 El Centro earthquake adopted as an initial time series. The superstructure of a 20-story base isolated building is represented by a 3-D finite element model using ETABS software. The results of the base isolated building show that base isolation technique significantly reduces inter-s

... Show More
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Estimated Outlet Temperatures in Shell-and-Tube Heat Exchanger Using Artificial Neural Network Approach Based on Practical Data
...Show More Authors

The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
Brain, Behavior, And Immunity
Combination of cannabinoids, delta-9-tetrahydrocannabinol (THC) and cannabidiol (CBD), mitigates experimental autoimmune encephalomyelitis (EAE) by altering the gut microbiome
...Show More Authors

View Publication Preview PDF
Scopus (111)
Crossref (117)
Scopus Clarivate Crossref
Publication Date
Tue Apr 30 2019
Journal Name
International Journal Of Environmental Research
A Comparative Study for the Identification of Superior Biomass Facilitating Biosorption of Copper and Lead Ions: A Single Alga or a Mixture of Algae
...Show More Authors

View Publication
Scopus (13)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2023
Journal Name
Biocatalysis And Agricultural Biotechnology
Enhancing the prodigiosin pigment by adding Ag\TiO2 synergism for antibacterial activity
...Show More Authors

View Publication Preview PDF
Scopus (13)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE USE OF MICROENCAPSULATION TECHNOLOGY WITH COATING LAYER BY LAYER TO IMPROVE THE STABILITY OF THE Lactobacillus casei TOWARDS THE BILE SALTS AND TREATMENT HEAT.: THE USE OF MICROENCAPSULATION TECHNOLOGY WITH COATING LAYER BY LAYER TO IMPROVE THE STABILITY OF THE Lactobacillus casei TOWARDS THE BILE SALTS AND TREATMENT HEAT.
...Show More Authors

This study aimed to improve the microencapsulation technique using a type coating the encapsulation Layer by Layer, which provide the best protection for life Lactobacillus casei in the extrusion method and use the microencapsulation of materials of the protein concentrated by protein 80% and the coating with alginate and chitosan have the results showed the variation in the difference of the binding process encapsulation yield among the types of coating through. by studying of these the effect o stability of the bio probiotic free cell and the three types coated towards three different concentrations from bile salts 0, 0.3, 0.5 and 0.7% when the periods of time different of zero and two and three hours at incubation the recorded

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref