Preferred Language
Articles
/
xxfvQo8BVTCNdQwCeGfO
ON THE GREEDY RADIAL BASIS FUNCTION NEURAL NETWORKS FOR APPROXIMATION MULTIDIMENSIONAL FUNCTIONS
...Show More Authors

The aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 17 2022
Journal Name
Journal Of Interdisciplinary Mathematics
Results of Differential Sandwich Theorem of the Univalent Functions Associated with Generalized Salageon Integro-Differential Operator
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Fri Jul 28 2023
Journal Name
Journal Of Optics
Estimated the nanoparticles size of CdS from UV–Vis spectrum absorption by effective mass approximation model (EMA) using capping and complex agent
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Impact of Denial-of-Service Attack on Directional Compact Geographic Forwarding Routing Protocol in Wireless Sensor Networks
...Show More Authors

Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
BANKING COMPLIANCE FUNCTION(COMPARATIVE STUDY BETWEEN COMMERCIAL & ISLAMIC BANKS): BANKING COMPLIANCE FUNCTION(COMPARATIVE STUDY BETWEEN COMMERCIAL & ISLAMIC BANKS)
...Show More Authors

Never the less, banking compliance function became one of the most important functions in banking sector according to its characteristics that considered as an interior control tools to control (executive management, departments, subsidiaries…etc) in any bank; and their compliance towards applying rules, recommendations and legislations. In addition to, estimating the risks and limited them; and controlling the anti-money laundering. Thus, these functions that covered the main concept of (Banking Compliance) would avoid the bank to be under the control of any sanctions.

 

View Publication Preview PDF
Publication Date
Tue Apr 04 2017
Journal Name
International Journal Of Science And Research
Effect of Coriandrumsativum Leaves Aqueous Extract on Structure and Function of Kidney in Male Albino Mice
...Show More Authors

Abstract: Coriandrum sativum leaves are used in folk medicine to treat several diseases such as digestive system disorder, diabetes, and hyperlipidemia. This study was designed to investigate the effect of aqueous extract of Coriandrum sativum on the structure and function of kidney, 30 males of white Swiss mice Mus musculus were divided randomly to three groups with 10 mice in each group. Animals of first group (control group) had been given orally 0.1 ml of tap water, animals in the second group had been treated orally with 0.1 of single dose (125 mg/Kg b. w./day) of C. sativum leaves extract and animals in the third group has been treated orally with 0.1 ml (250mg/Kg. b. w./day) of the same extract for 30 days. At the end of experiment,

... Show More
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Using Neural Network with Speaker Applications
...Show More Authors

In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 12 2018
Journal Name
International Journal Of Dynamics And Control
Decentralized adaptive partitioned approximation control of high degrees-of-freedom robotic manipulators considering three actuator control modes
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Sat Oct 25 2025
Journal Name
Iet Networks
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
An Extended Subclass of Meromorphic Multivalent Functions Involving Ruscheweyh Derivative Operator
...Show More Authors

     In this paper, we introduce and discuss an extended subclass〖 Ą〗_p^*(λ,α,γ) of meromorphic multivalent functions involving Ruscheweyh derivative operator. Coefficients inequality, distortion theorems, closure theorem for this subclass are obtained.

View Publication
Scopus Crossref