Results 11 to 20 of about 11,068 (53)

Scaled Fletcher-Revees Method for Training Feed forward Neural Network [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2011
The training phase of a Back-Propagation (BP) network is an unconstrained optimization problem. The goal of the training is to search an optimal set of connection weights in the manner that the error of the network out put can be minimized.
Basher M. Khalaf, Khalil K. Abbo
doaj   +1 more source

Speech compression based on wavelet and contourlet Transformation [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2011
Speech compression is very important in many applications. In this research we applied compression on speech by using wavelet transform and contourlet transform.
Khalil I. Alsaif, Hadia Salih Albadrani
doaj   +1 more source

Detecting and Administrating Hide Processes in Linux System [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2011
Hiding processes in Linux system is an essential part of rootkits actions and malicious program. So, it is very important to monitor and administrate the system hidden processes to ensure the safety and reliability of the computer system.
Rawaa Putros Qasha
doaj   +1 more source

Self-tuning PID Controller using Genetic Algorithm [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2011
This work presents design, modeling, simulation and hardware implementation of a separately excited DC motor speed control using Field Programmable Analog Array (FPAA) Technology.
Abdul-Kareem Z. Mansoor   +2 more
doaj   +1 more source

New Projection Matrix for the Stander Conjugate Gradient Method [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2013
In this paper, we have derived anew proposed algorithm for conjugate gradient method based on a projection matrix. This Algorithm satisfies the sufficient descent condition and the globally converges .
Abaas Y. BAYATI   +2 more
doaj   +1 more source

Estimation of Multiple Logistic Model by Using Empirical Bayes Weights and Comparing it with the Classical Method with Application [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2011
In this research, a solution of heteroscedastisity of the random error variance is found in the Multiple Logistic Model when the response variable (dependent) variable is Qualitative by using the method of weighted least squares (WLS) to estimate the ...
doaj   +1 more source

Conjugate Gradient Algorithm Based on Meyer Method for Training Artificial Neural Networks [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2013
The difference between the desired output and the actual output of an multi-layers feed forward neural network produces an error value can be expressed it as a function of the network weights.
Khalil K. Abbo, Hind H. Mohammed
doaj   +1 more source

Thin films flow by inertia forces [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2011
In this paper we consider the motion in thin liquid films of a rectilinear flow by inertia force and there is a balance of pressure gradient, viscous and surface tension.Navier – stokes equations and continuity equation are used to obtain the ...
doaj   +1 more source

An approximate Solution of Heat Equation in Three Dimensions by LOD Method [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2011
In this paper, we solve one of the parabolic partial differential equations in three dimensions which is heat equation with Locally One Dimension methods, and by comparing the results by this method with the exact solution, we see that the results are ...
doaj   +1 more source

Stability Analysis of the Flow of Aqueous Humor in the Posterior Chamber to the Human Eye. [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2011
This paper is devoted to analyze the stability of the flow of a aqueous humor in posterior chamber of the human eye. This analysis is done by finding the eigenvalues of the system which enable us to investigate the growth of disturbance after setting the
doaj   +1 more source

Home - About - Disclaimer - Privacy