Maitham Ali Naji
Middle Technical University (MTU)

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Architecture neural network deep optimizing based on self organizing feature map algorithm Muthna Jasim Fadhil; Majli Nema Hawas; Maitham Ali Naji
Bulletin of Electrical Engineering and Informatics Vol 9, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v9i6.1935

Abstract

Forward neural network (FNN) execution relying on the algorithm of training and architecture selection. Different parameters using for nip out the architecture of FNN such as the connections number among strata, neurons hidden number in each strata hidden and hidden strata number. Feature architectural combinations exponential could be uncontrollable manually so specific architecture can be design automatically by using special algorithm which build system with ability generalization better. Determination of architecture FNN can be done by using the algorithm of optimization numerous. In this paper methodology new proposes achievement where FNN neurons respective with hidden layers estimation work where in this work collect algorithm training self organizing feature map (SOFM) with advantages to explain how the best architectural selected automatically by SOFM from criteria error testing based on architecture populated. Different size of dataset benchmark of 4 classifications tested for approach proposed.
Transceiver error reduction by design prototype system based on neural network analysis method Muthna Jasim Fadhil; Maitham Ali Naji; Ghalib Ahmed Salman
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v18.i3.pp1244-1251

Abstract

Code words traditional can be decoding when applied in artificial neural network. Nevertheless, explored rarely for encoding of artificial neural network so that it proposed encoder for artificial neural network forward with major structure built by Self Organizing Feature Map (SOFM). According to number of bits codeword and bits source mentioned the dimension of forward neural network at first then sets weight of distribution proposal choosing after that algorithm appropriate using for sets weight initializing and finally sets code word uniqueness check so that matching with existing. The spiking neural network (SNN) using as decoder of neural network for processing of decoding where depending on numbers of bits codeword and bits source dimension the spiking neural network structure built at first then generated sets codeword by network neural forward using for train spiking neural network after that when whole error reached minimum the process training stop and at last sets code word decode accepted. In tests simulation appear that feasible decoding and encoding neural network while performance better for structure network neural forward a proper condition is achieved with γ node output degree. The methods of mathematical traditional can not using for decoding generated Sets codeword by encoder network of neural so it is prospect good for communication security. 
Methods for database ciphering Maitham Ali Naji; Dalal Abdul Mohsin Hammood; Nuha Abdul Razik Al Debagh
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 3: March 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i3.pp1499-1505

Abstract

In this paper Caesar and Vigenere methods have been used for table ciphering. Each record has unique and independent keys to the next record to get high security. The cipher text stored in script file that separates the content of fields by semicolon. The second part is the process of creating a new database using the Object called Data Access Object (DAO) and then create table and it is fields. The program gets plaintext of the table by applying the decryption rules of two methods.