The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).
The 3-parameter Weibull distribution is used as a model for failure since this distribution is proper when the failure rate somewhat high in starting operation and these rates will be decreased with increasing time .
In practical side a comparison was made between (Shrinkage and Maximum likelihood) Estimators for parameter and reliability function using simulation , we conclude that the Shrinkage estimators for parameters are better than maximum likelihood estimators but the maximum likelihood estimator for reliability function is the better using statistical measures (MAPE)and (MSE) and for different sample sizes.
Note:- ns : small sample ; nm=median sample
... Show MoreThe experiment was conducted in two stages: first stage: determination of the most effective dose of Cyperus rotundus tubers aquatic extract in male rats for 5 days, which was concentrated as (200 mg/kg body weight). The second stage was designed to observe and test the protective effects of C. rotundus tubers aquatic extract in the liver and kidney functions of male rats exposed to cadmium chloride poisoning (5 mg/kg bw) for 30 days. The animals were divided into (4) groups within each group (5) animals weighted (200-220g). The results of oral dose of cadmium chloride showed a significant increase of (P˂0.05) in the activity of both enzymes Alanine aminotransferas
... Show MoreFlying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conduct
... Show MoreEstimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreThis study deals with a prominent critical term - poetics - in critical studies as an area related to uncovering the laws of creative and aesthetic discourses (Preaching)، and the various functions that accompany it in literary texts. So، the study employs the pioneers' works of this theory specially the eastern theorists in making a parallel comparing study of the text book of " the Magic and Poetry” by Al-Lisan Al-Din bin Al-Khatib (776 AH). It displays the utility of the concept of poetics in the referred book pointing to the illumination of various functions that، in turn، reflected the
A model using the artificial neural networks and genetic algorithm technique is developed for obtaining optimum dimensions of the foundation length and protections of small hydraulic structures. The procedure involves optimizing an objective function comprising a weighted summation of the state variables. The decision variables considered in the optimization are the upstream and downstream cutoffs lengths and their angles of inclination, the foundation length, and the length of the downstream soil protection. These were obtained for a given maximum difference in head, depth of impervious layer and degree of anisotropy. The optimization carried out is subjected to constraints that ensure a safe structure aga
... Show MoreFinding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith
... Show MoreThe ground state density distributions and electron scattering Coulomb form factors of Helium (4,6,8He) and Phosphorate (27,31P) isotopes are investigated in the framework of nuclear shell model. For stable (4He) and (31P) nuclei, the core and valence parts are studied through Harmonic-oscillator (HO) and Hulthen potentials. Correspondingly, for exotic (6,8He) and (27P) nuclei, the HO potential is applied to the core parts only, while the Hulthen potential is applied to valence parts. The parameters for HO and Hulthen are chosen to reproduce the available experimental size radii for all nuclei under study. Finally, the CO component of electron scattering charge form factors are also investigated. Unfortunately, there is no
... Show More