68 research outputs found

    Is it conceivable that neurogenesis, neural Darwinism, and species evolution could all serve as inspiration for the creation of evolutionary deep neural networks?

    Full text link
    Deep Neural Networks (DNNs) are built using artificial neural networks. They are part of machine learning methods that are capable of learning from data that have been used in a wide range of applications. DNNs are mainly handcrafted and they usually contain numerous layers. Research frontier has emerged that concerns automated construction of DNNs via evolutionary algorithms. This paper emphasizes the importance of what we call two-dimensional brain evolution and how it can inspire two dimensional DNN evolutionary modeling. We also highlight the connection between the dropout method which is widely-used in regularizing DNNs and neurogenesis of the brain, and how these concepts could benefit DNNs evolution.The paper concludes with several recommendations for enhancing the automatic construction of DNNs

    Information Technology

    Get PDF
    The new millennium has been labeled as the century of the personal communications revolution or more specifically, the digital wireless communications revolution. The introduction of new multimedia services has created higher loads on available radio resources. These services can be presented in different levels of quality of service. Namely, the task of the radio resource manager is to provide these levels. Radio resources are scarce and need to be shared by many users. The sharing has to be carried out in an efficient way avoiding as much as possible any waste of resources. The main contribution focus of this work is on radio resource management in opportunistic systems. In opportunistic communications dynamic rate and power allocation may be performed over the dimensions of time, frequency and space in a wireless system. In this work a number of these allocation schemes are proposed. A downlink scheduler is introduced in this work that controls the activity of the users. The scheduler is a simple integral controller that controls the activity of users, increasing or decreasing it depending on the degree of proximity to a requested quality of service level. The scheduler is designed to be a best effort scheduler; that is, in the event the requested quality of service (QoS) cannot be attained, users are always guaranteed the basic QoS level provided by a proportional fair scheduler. In a proportional fair scheduler, the user with the best rate quality factor is selected. The rate quality here is the instantaneous achievable rate divided by the average throughput Uplink scheduling is more challenging than its downlink counterpart due to signalling restrictions and additional constraints on resource allocations. For instance, in long term evolution systems, single carrier FDMA is to be utilized which requires the frequency domain resource allocation to be done in such a way that a user could only be allocated subsequent bands. We suggest for the uplink a scheduler that follows a heuristic approach in its decision. The scheduler is mainly based on the gradient algorithm that maximizes the gradient of a certain utility. The utility could be a function of any QoS. In addition, an optimal uplink scheduler for the same system is presented. This optimal scheduler is valid in theory only, nevertheless, it provides a considerable benchmark for evaluation of performance for the heuristic scheduler as well as other algorithms of the same system. A study is also made for the feedback information in a multi-carrier system. In a multi-carrier system, reporting the channel state information (CSI) of every subcarrier will result in huge overhead and consequent waste in bandwidth. In this work the subcarriers are grouped into subbands which are in turn grouped into blocks and a study is made to find the minimum amount of information for the adaptive modulation and coding (AMC) of the blocks. The thesis also deals with admission control and proposes an opportunistic admission controller. The controller gradually integrates a new user requesting admission into the system. The system is probed to examine the effect of the new user on existing connections. The user is finally fully admitted if by the end of the probing, the quality of service (QoS) of existing connections did not drop below a certain threshold. It is imperative to mention that the research work of this thesis is mainly focused on non-real time applications.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Biometric identification and recognition for IRIS using Failure Rejection Rate (FRR) / Musab Ahmed Mohammed Ali Al-Rawi

    Get PDF
    Iris recognition is reckoned as one of the most reliable biometrics for identification purpose in terms of reliability and accuracy. Hence, the objectives of this research are new algorithms development significantly for iris segmentation specifically the proposed Fusion of Profile and Mask Technique (FPM) specifically in getting the actual center of the pupil with high level of accuracy prior to iris localization task, followed by a particular enhancement in iris normalization that is the application of quarter size of an iris image (instead of processing a whole or half size of an iris image) and for better precision and faster recognition with the robust Support Vector Machine (SVM) as classifier. Further aim of this research is the integration of cancelable biometrics feature in the proposed iris recognition technique via non-invertible transformation which determines the feature transformation-based template protection techniques security. Therefore, it is significant to formulate the noninvertibility measure to circumvent the possibility of adversary having the capability in guessing the original biometric providing that the transformed template is obtained. At any process of recognition stage, the biometric data is protected and also whenever there is a compromise to any information in the database it will be on the cancelable biometric template merely without affecting the original biometric information

    Opportunistic packet scheduling algorithms for beyond 3G wireless networks

    Get PDF
    The new millennium has been labeled as the century of the personal communications revolution, or more specifically, the digital wireless communications revolution. The introduction of new multimedia services has created higher loads on available radio resources. Namely, the task of the radio resource manager is to deliver different levels of quality for these multimedia services. Radio resources are scarce and need to be shared by many users. This sharing has to be carried out in an efficient way avoiding, as much as possible, any waste in resources. A Heuristic scheduler for SC-FDMA systems is proposed where the main objective is to organize scheduling in a way that maximizes a collective utility function. The heuristic is later extended to a multi-cell system where scheduling is coordinated between neighboring cells to limit interference. Inter-cell interference coordination is also examined with game theory to find the optimal resource allocation among cells in terms of frequency bands allocated to cell edge users who suffer the most from interference. Activity control of users is examined in scheduling and admission control where in the admission part, the controller gradually integrates a new user into the system by probing to find the effect of the new user on existing connections. In the scheduling part, the activity of users is adjusted according to the proximity to a requested quality of service level. Finally, a study is made about feedback information in multi-carrier systems due to its importance in maximizing the performance of opportunistic networks

    Using multidimensional scaling technique in image dimension reduction for satellite image

    Get PDF
    A satellite multispectral sensor provides data in the form of several spectral image of particular area of the earth under observation. The amount of data by multispectral exhibit high-inter band correlation with redundancy of the information. In this research, we suggested using multidimensional scaling technique as a statistical technique to reduce image dimensions for reconstruction of a new image form multispectral image. The results proved the efficiency of this technique in providing high quality low dimension images based on the value of Peak Signal to Noise Ratio (PSNR) that was measured to the new image. At the same time, the ability of this technique to reduce dimensions while preserving the basic characteristics of the image has been confirmed

    The MR affect on optical properties for poly (Vinyl alcohol) films

    Get PDF
    optical properties of pure poly(vinyl Alcohol) films and poly(vinyl Alcohol) doped with methyl red were study, different percentage prepared with constant thickness using casting technique. Absorption, Transmission spectra have been recorded in order to study the optical parameters such as absorption coefficient, energy gap, refractive index, Extinction coefficient and dispersion parameters were measured in the wavelength range (200-800)nm. This study reveals that the optical properties of PVA affect by increasing the impurity concentration

    A Novel Electromyography (EMG) Based Classification Approach for Arabic Handwriting

    Get PDF
    In this paper, a novel classification approach for handwritten Arabic characters is proposed. Features for classification are extracted from electromygraphic (EMG) signals detected on two forearm muscles. Noise cancellations in conjunction with a process parameter estimator for feature identification are proposed. Neural networks using a potentially damped least mean squared algorithm is used at the classification stage. The proposed new classification technique is used on handwritten Arabic characters

    Microfacies interpretation related to tectonical concept inBekhme Formation

    Get PDF
    The relationship between tectonic high element and the sediments of the Bekhme limestone formation had been discussed. The Bekhme deposits on such a paleohigh on the upper Cretaceous represent "swell facies". The identified microfacies types were discussed as a clue, for local crustal events

    Network intrusion detection using genetic algorithm to find best DNA signature

    Full text link
    Bioinformatics is part of computer science that joins between computer programming and molecular biology. DNA consists of long sequence of nucleotides which formulates the genome. Our method is to generate normal signature sequence and alignment threshold value from processing the system training data and encode observed network connection into corresponding DNA nucleotides sequence, then to align the signature sequence with observed sequence to find similarity degree value and decide whether the connection is attack or normal. Number of DNA sequences makes up each population, and then new generations are produced to select the Signature with best alignment value with normal network connection sequences. This paper ends up with accuracy value and threshold score for detecting the network anomalies that no known conditions exist for them to be discovered in addition for percentage of generating false positive and true negative alarms

    التوظيف السياسي للصورة

    Get PDF
    يهدف البحث الى معرفة ما تود الصورة إبلاغه بوصفها نصًا بصريًا، إذ أن الصور لا يتم التقاطها اعتباطًا، ولا سيما صور السياسيين، إذ لكل صورة رسالة حتى وإن اختلفت توجهات تفسير تلك الرسالة بين شخص وآخر، وقد اعتمد البحث على تطبيق منهجية قائمة على التحليل السيميائي بتطبيق نموذج لوران جيرفيرو في تحليل صورة زيارة رئيس الوزراء العراقي مصطفى الكاظمي للفلوجة في ذكرى الانتصار على داعش، وكون هذه الصور لغة مبنية على جملة من الدلائل البصرية أو الايقونية التي تندمج فيما بينها لتكون صورة ذات موضوع معين تحمل رسالة محددة أراد المرسل إيصالها الى الجمهور، كما وتكشف عن إيديولوجية المصور الذي يختار جزءًا من الحدث ليوجه إليه كاميرته. وتوصل البحث إلى نتائج عدّة منها: إن الأفكار والمعاني التي تضمنتها الصورة شكلًا ومضمونًا تنصب في إطار التسويق السياسي لشخصية رئيس الوزراء العراقي مصطفى الكاظمي، فضلًا عن ابرازه كشخصية قوية حادة الملامح، واستندت أساليب بلاغة الصورة بالتأكيد على وحدة المصير ونبذ الطائفية والقومية، إذ ساعد التنوع والتدرّج الوظيفي للكاظمي في مجال الصحافة والتوثيق التاريخي باكتسابه خبرة فن الظهور والتأثير في المتلقي، فضلًا عن عمله سابقًا في حقل حساس وهو المخابرات
    corecore