Preferred Language
Articles
/
xxfvQo8BVTCNdQwCeGfO
ON THE GREEDY RADIAL BASIS FUNCTION NEURAL NETWORKS FOR APPROXIMATION MULTIDIMENSIONAL FUNCTIONS
...Show More Authors

The aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Approximation of Functions in Lp, α (I) (0 < p < 1)
...Show More Authors

   In this paper we show that the function , () p fLI α ∈ ,0<p<1 where I=[-1,1] can be approximated by an algebraic polynomial with an error not exceeding , 1 ( , , ) kp ft n Ï• αω      where
,
1 ( , , ) kp ft n ϕ αω is the Ditizian–Totik modules of smoothness of unbounded function in , () p LI

View Publication Preview PDF
Publication Date
Thu Aug 30 2018
Journal Name
Iraqi Journal Of Science
Towards Generating Robust Key Based on Neural Networks and Chaos Theory
...Show More Authors

There are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.

View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
The Performance Differences between Using Recurrent Neural Networks and Feedforward Neural Network in Sentiment Analysis Problem
...Show More Authors

 With the spread use of internet, especially the web of social media, an unusual quantity of information is found that includes a number of study fields such as psychology, entertainment, sociology, business, news, politics, and other cultural fields of nations. Data mining methodologies that deal with social media allows producing enjoyable scene on the human behaviour and interaction. This paper demonstrates the application and precision of sentiment analysis using traditional feedforward and two of recurrent neural networks (gated recurrent unit (GRU) and long short term memory (LSTM)) to find the differences between them. In order to test the system’s performance, a set of tests is applied on two public datasets. The firs

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Comparison of Bayes' Estimators for the Exponential Reliability Function Under Different Prior Functions
...Show More Authors

 In this study, we derived the estimation for Reliability of the Exponential distribution based on the Bayesian approach. In the Bayesian approach, the parameter of the Exponential distribution is assumed to be random variable .We  derived  posterior distribution the parameter of the Exponential distribution under four types priors distributions for the scale parameter of the Exponential distribution is: Inverse Chi-square distribution, Inverted Gamma distribution, improper distribution, Non-informative distribution. And the estimators for Reliability is obtained using the two proposed loss function in this study which is based on the natural logarithm for Reliability function .We used simulation technique, to compare the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Calculation of Radial Density Distribution Function for main orbital of Carbon atom and Carbon like ions
...Show More Authors

Radial density distribution function of one particle D(r1) was calculated for main orbital of carbon atom and carbon like ions (N+ and B- ) by using the Partitioning technique .The results presented for K and L shells for the Carbon atom and negative ion of Boron and positive ion for nitrogen ion . We observed that as atomic number increases the probability of existence of electrons near the nucleus increases and the maximum of the location r1 decreases. In this research the Hartree-fock wavefunctions have been computed using Mathcad computer software .

View Publication Preview PDF
Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Application of q-Mittag-Leffer Function on Certain Subclasses of Analytic Functions
...Show More Authors

The main objective of this paper is to introduce and study the generality differential operator involving the q-Mittag-Leffler function on certain subclasses of analytic functions.  Also, we  investigate the inclusion properties of these classes, by using the concept of subordination between analytic functions.

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Oct 15 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Combining Convolutional Neural Networks and Slantlet Transform For An Effective Image Retrieval Scheme
...Show More Authors

In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),

... Show More
Scopus (10)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 13 2016
Journal Name
University Of Baghdad
Employ Mathematical Model and Neural Networks for Determining Rate Environmental Contamination
...Show More Authors

Preview PDF
Publication Date
Wed Jun 26 2019
Journal Name
Iraqi Journal Of Science
On the Grobner Basis of the Toric Ideal for 3 X n- Contingency Tables
...Show More Authors

In this paper, The Grobner basis of the Toric Ideal for - contingency tables related with the Markov basis B introduced by Hussein S. MH, Abdulrahman H. M in 2018 is found. Also, the Grobner basis is a reduced and universal Grobner basis are shown.

View Publication Preview PDF
Scopus (1)
Scopus Crossref