Version-3 (July-August 2016)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6
- Citation
- Abstract
- Reference
- Full PDF
- Index Page
- Cover Paper
Paper Type | : | Research Paper |
Title | : | Using Geographic Information Systems to develop decision support system for supplier selection in batik industry |
Country | : | Indonesia |
Authors | : | Aries Susanty || Sri Hartini || Diana Puspita Sari || Prilliandi Hidayatullah |
Abstract: This study has two purpose. First, this study aims to analyse the requirements of batik industry on effective and powerful software to select their supplier effectively. Second, this study aims to design, build, and test a web-based decision support system that using Geographic Information System (GIS) to select the best supplier for particular raw material. A prototype approach is used as a method for developing a web-based decision support system and several SMEs and supplier of batik industry in Central Java and Jogjakarta is used as a preliminary of object for proposed web-based decision support system.............
Keyword: Batik Industry, Central Java, Supplier Selection, Geographic Information System, Web-based decision support system, Yogyakarta,
[1] J. Rezaei, SMEs and supply chain management: a functional perspective, Master Thesis, Science and Industrial Management, University of Tehran, Iran, 2012.
[2] H. Hanny, The urge of finding new venture capital regime for Indonesia. Master Thesis, International Business Law, Tilburg University, Austria, 2014
[3] B. Nooteboom, Innovation and diffusion in small firms: theory and evidence, Small Business Economics, 6(5), 1994, 327-347.
[4] A. Gunasekaran, L. Forker, & B. Kobu, Improving operations performance in a small company: a case study, International Journal of Operations & Production Management, 20(3), 2000, 316-336.
[5] R. Davidrajuh, Automating supplier selection procedures. Dissertation, Narvik Institute of Technology, Narvik, Norway, 2001.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Embedding of Internal and External Components of Cochlear Implant on to a Single Integrated Circuit |
Country | : | India |
Authors | : | Dr.Ramesh K || Deepa Patil |
Abstract: The Latest Cochlear Implant Naida CI Q70 With Advanced Wireless Feature Has Got Its Speech Processor And Transmitter In The Form Of Reliable Wire Communication Architecture. This Architecture Creates Problem For Deaf In Terms Of Maintenance And Cost For Its Complex Structure. The External Components Such As Transmitter, Sound Processor And Its Internal Components And Microphones Are Apart In Structure Both Internally And Externally............
Keyword: Cochlear Implant, IC, Sond Processor, Transmitter, Head Piece, Electrode
[1]. ―Design & Implementation of Wireless system for Cochlear Devices‖ Ramesh K,De Gruyter Digital Library , July 09-10, 2016. [2]. www.advancedbionics.com
[3]. http://www.hearinghouse.co.nz/children-families/appropriate-amplification/
[4]. The History of Cochlear Implants – Comparing the Current Cochlear Implant Manufacturers byAshley Nicole Norkus Bloomsburg, Pennsylvania 27 June 2007
[5]. Cochlear Implant Speech Processing for Severely-to-Profoundly Deaf People by Graeme M.Clark.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comprehensive Review: Intrusion Detection System and Techniques |
Country | : | India |
Authors | : | Sheenam || Sanjeev Dhiman |
Abstract: Security becomes an important challenge to secure the network from cyber attacks. Up till now, threats on the network and security are significant research issues. With increasing the amount of network, there is a chance to secure the network. Number of methods is used to secure the system; our focus is on the study of intrusion detection System. Any hostile attacks on weakness of networks; computer might raise certain serious problems and exploit its Security Policies, Confidentiality, Integrity and Availability (CIA). Many techniques are used to check the system vulnerabilities and to detect the behavior of the system .i.e. anomalous behavior. Threats on the network become the significant research issue. There are number of literature surveys on IDS. This paper gives review on different techniques.
Keyword: IDS, SNORT, SPADE
[1]. Ho, Swee Yenn. "Intrusion detection systems for today and tomorrow." SANS Institute, SANS Institute, InfoSec Reading Room 8 (2001).
[2]. Liao, Hung-Jen, Chun-Hung Richard Lin, Ying-Chih Lin, and Kuang-Yuan Tung. "Intrusion detection system: A comprehensive review." Journal of Network and Computer Applications 36, no. 1 (2013): 16-24.
[3]. Rights, Retains Full. "SANS Institute InfoSec Reading Room." Risk 1 (2001): 27.
[4]. Patcha, Animesh, and Jung-Min Park. "An overview of anomaly detection techniques: Existing solutions and latest technological trends." Computer networks 51, no. 12 (2007): 3448-3470.
[5]. Khan, Rahul Rastogi1 Zubair Khan2 MH. "Network Anomalies Detection Using Statistical Technique: A Chi-Square approach." (2012).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography |
Country | : | Indonesia |
Authors | : | Boni Oktaviana || Andysah Putera Utama Siahaan |
Abstract: This study combines classic and modern cryptographic algorithms so that the data security of information more awake authenticity. Caesar cipher is the oldest classical cryptography which uses a symmetric key method is the key used for encryption is the same as the key used for the decryption process. Three-Pass Protocol is one of the modern cryptography where the process of sending a message does not need to distribute the key so that each party both the recipient and sender of the message does not need to know each lock.............
Keyword: Security, Caesar Cipher, Three-Pass Protocol, Encryption, Decryption
[1]. A. P. U. Siahaan, "Factorization Hack of RSA Secret Numbers," International Journal of Engineering Trends and Technology, vol. 37, no. 1, pp. 15-18, 2016.
[2]. M. Reza dan M. A. Budiman, "Simulasi Pengamanan File Teks Menggunakan Algoritma Massey-Omura," Jurnal Dunia Teknologi Informasi, vol. 1, no. 1, pp. 20-27, 2012.
[3]. A. Dony, Pengantar Ilmu Kriptografi Teori Analisis dan Implementasi, Yogyakarta: Andi Offset, 2008.
[4]. Mollin, An Introduction to Cryptography. Second Edition, Taylor & Francis Group, 2007.
[5]. Y. Kanamori dan S.-M. Yoo, "Quantum Three-Pass Protocol : Key Distribution Using Quantum Super Position States," International Journal of Network Security & Its Applications, vol. 1, no. 2, pp. 64-70, 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | To Propose Improvement in Probability based object tracking technique for Multiple Object Tracking |
Country | : | India |
Authors | : | Bindu sharma |
Abstract: The object tracking is the technique which is used to track object from the image or from the video. The video consists of multiple frames and in each frame location of that object had been predicted. To predict location of the object technique of probability has been applied and this technique works on single object. In this paper, improvement has been proposed in probability based technique to track multiple objects from the video. The proposed technique had been implemented in MATLAB. The graphical results shows that proposed technique works well in terms of detection rate.
Keyword: Object Tracking, Probability based technique, Detection rate, Multiple Objects
[1] Lipton, Alan J., Hironobu Fujiyoshi, and Raju S. Patil. "Moving target classification and tracking from real-time video." Applications of Computer Vision, 1998. WACV'98. Proceedings., Fourth IEEE Workshop on. IEEE, 1998.
[2] Yilmaz, Alper, Omar Javed, and Mubarak Shah. "Object tracking: A survey."Acm computing surveys (CSUR) 38.4 (2006): 13.
[3] G. Mallikarjuna Rao and Dr.Ch.Satyanarayana, "Object Tracking System Using Approximate Median Filter, Kalman Filter and Dynamic Template Matching", I.J. Intelligent Systems and Applications, 2014
[4] Deori, Barga, and Dalton Meitei Thounaojam. "A survey on moving object tracking in video." International Journal on Information Theory (IJIT) 3.3 (2014): 31-46.
[5] Kiran .S. Khandar and Nilima R. Kharsan, "Digital Image Processing Techniques for Object Tracking System Using Kalman Filter", International Journal of Scientific Engineering and Research ISSN (Online): 2347‐3878 Volume 2 Issue 6, June 2014.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Automated Car Number Plate Detection System to detect far number plates |
Country | : | India |
Authors | : | Anisha goyal || Rekha Bhatia |
Abstract: The Automatic number plate recognition (ANPR) is a mass reconnaissance strategy that uses optical character recognition on pictures to peruse the tags on vehicles. They can use existing shut circuit TV or street standard enforcement cameras, or ones particularly designed for the errand. They are used by different police forces and as a technique for electronic toll collection on pay-per-use streets and monitoring movement action, for example, red light adherence in an intersection. ANPR can be used to store the pictures caught by the cameras and in addition the content from the tag with some configurable to store a photo of the driver.............
Keyword: ANPR, Localization, segmentation, recognition, Optical Character Recognition (OCR)
[1]. Kuldeepak, Monika kaushik and Munish Vashishath (2012), "License Plate Recognition System based on Image Processing Using Labview" International Journal of Electronics Communication and Computer Technology (IJECCT) Volume 2 Issue 4 (July 2012).
[2]. Muhammad Tahir Qadri, Muhammad Asif, "Automatic Number Plate Recoginization System For Vechile Identification Using Optical Character Recoginization" 2009 International Conference on Education Technology and Computer.
[3]. Amar Badr Mohamed M. Abdelwahab, Ahmed M. Thabet, and Ahmed M.Abdelsadek, "Automatic Number Plate Recognition System", Annals of the University of Craiova, Mathematics and Computer Science Series Volume 38(1), 2011, Pages 62{71ISSN: 1223-6934.
[4]. Markus Friedrich Prokop Jehlicka Johannes Schlaich, "AUTOMATIC NUMBER PLATE RECOGNITION FOR THE OBSERVANCE OF TRAVEL BEHAVIOUR" 8th International Conference on Survey Methods in Transport, France, May 25-31, 2008.
[5]. Nasrul Humaimi Mahmood, Noraishikin Zulkarnain, Nor Saradatul Akmar Zulkifli (2012) International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 3, May-Jun 2012, pp.691-694.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Efficient Construction of Dictionary using Directed Acyclic Word Graph |
Country | : | India |
Authors | : | Srinivas.H || Amruth.V |
Abstract: Implementation of dictionary is a topic on which research is going on since a long time in the search of a better and efficient algorithm both in terms of space and time complexity. Its necessity has increased due to the advent of recent technical advances in the fields of Pattern Recognition, Image Processing, Natural Language Processing and Machine Learning. The matter is of utter importance when it comes to handheld devices where limited memory availability is a crucial factor. From a programmer's point of view, the earlier and the conventional methods used to implement a dictionary were hashing and suffix trees which subsequently failed in order to provide the desired space efficiency..........
Keyword: Deterministic Finite Automata (DFA), Associative Arrays, DAWG, Trie, Right Language, Natural Language Processing
[1]. Watson, Bruce W. 1993a. A taxonomy of finite automata construction algorithms. Computer Science Note 93/43, Eindhoven University of Technology, The Netherlands. Available at www.OpenFIRE.org.
[2]. Thulasiraman, K. Swamy, M. N. S. (1992), "5.7 Acyclic Directed Graphs", Graphs: Theory and Algorithms, John Wiley and Son, p. 118, ISBN 978-0-471-51356-8.
[3]. Hopcroft, John E. and Jeffrey D. Ullman (1979) "Introduction to Automata Theory, Languages, and Computation" Addison-Wesley, Reading, MA.
[4]. Jan Daciuk, StoyanMihov, Bruce W. Watson, Richard E. Watson (2000) "Incremental Construction of Finite Automata"Volume 26, Number 1, Association for Computational Linguistics.
[5]. Cláudio L. Lucchesi, Tomasz Kowaltowski (1992) "Applications of Finite Automata Representing Large Vocabularies" Relatório Técnico DCC – 01/92..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Level of Interleukin 8 and Alpha -1 Antitrypsin in CerebroSpinal Fuid of Iraqi Patient with Bacterial and Viral Meniningitis |
Country | : | Iraq |
Authors | : | Dr. Anmar O.Hatem FIBM |
Abstract: Objective: Meningitis refers to inflammation of the leptomeninges, the connective tissue layers in closest proximity to the surface of the brain. Meningitis can be caused by bacteria, viruses, parasites, and fungi, as well as by non-infectious conditions, including inflammatory disorders. Interleuk-8 (IL-8) is produced predominantly by monocytes , but also by fibroblasts and endothelial cells . This chemokine may play a role in various inflammatory and infectious diseases. . Alpha 1-antitrypsin is also referred to as alpha-1 proteinase inhibitor (A1PI) because it inhibits a wide variety of proteases. It protects tissues from enzymes of inflammatory cells, especially neutrophil elastase..........
Keyword: Interleukin -8 ( IL-8) , Alpha -1 Antitrypsin (A1AT).
[1]. Onal H , Onal Z , Ozdil M and Albaj S , A new parameter on the differential diagnosis of bacterial and viral meningitis, Neurosciences , (2008) ; vol.13 , No.1 , pp : 91-92 .
[2]. James F and Bale JR , Meningitis and Encephalitis . In: Current Management in Child Neurology , Third Edition , United state of america , Bernard L.Maria, , (2005) ; PP : 509-514 .
[3]. Mace SE , Acute Bacterial Meningitis , Emergency Medicine Clincs of North Amerca ,( 2008) ; Vol. 38, pp : 231-317.
[4]. Handa S , Concentration of Interleukin 1 ,Interleukin-6 , Interleukin -8 and TNF alpha in Cerebrospinal Fluid from Children with Septic or Aseptic Meningitis , the kurume medical journal , (1992) ; vol. 39, pp : 257 - 265.
[5]. McAllister CK , O'Donoghue JM and Beaty HN , Experimental pneumococcal meningitis . II. Characterization and quantification of the inflammatory process .Infect Dis , (1975 ); Vol. 132, pp : 353-360 .
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Pose Estimation in AVI from Unknown Correspondences Using Genetic Algorithm |
Country | : | India |
Authors | : | A. Mukhopadhyay || S. Hati |
Abstract: In this paper we propose a model based approach to determine correspondences and pose of objects in automated visual inspection applications. The method does not consider correspondence and pose estimation problems as two distinct processes. Rather they are viewed as two cooperative processes and implemented through a proposed new composite chromosome structure of Genetic Algorithm (GA). GA evolves sets of poses and matched vertices sequences and the evolution process continues until a good accuracy in the values of pose parameters are obtained..........
Keyword: Pose Estimation, Correspondences, AVI, Genetic Algorithm
[1] T.G. H., S.N. Gottschlich, Ivis: An Integrated Volumetric Inspection System. Computer Vision and Image Understanding, 1995, 61(3): 430-444.
[2] N.T. S., A.K. Jain, A Survey of Automated Visual Inspection, Computer Vision and Image Understanding , 1995, 61(2): 231-262.
[3] D. Cyganski, J.A. Orr, Application of Tensor Theory to Object Recognition and Orientation Determination, IEEE Trans. on Pattern Analysis and Machine Intelligence, 1985, 662–673.
[4] P.David, D. DeMenthon, R. Duraiswami, H. Samet. Softposit: Simultaneous Pose and Correspondence Determination, Lecture Notes on Computer Science, 2002, 424–431.
[5] W.R. Franklin, V. Akman, Reconstructing Visible Regions from Visible Segments, 1986, BIT, 26: 430 – 441.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Level of Interleukin 8 and Alpha -1 Antitrypsin in CerebroSpinal Fuid of Iraqi Patient with Bacterial and Viral Meniningitis |
Country | : | Iraq |
Authors | : | Dr. Anmar O.Hatem FIBM |
Abstract: Objective: Meningitis refers to inflammation of the leptomeninges, the connective tissue layers in closest proximity to the surface of the brain. Meningitis can be caused by bacteria, viruses, parasites, and fungi, as well as by non-infectious conditions, including inflammatory disorders. Interleuk-8 (IL-8) is produced predominantly by monocytes, but also by fibroblasts and endothelial cells. This chemokine may play a role in various inflammatory and infectious diseases. Alpha 1-antitrypsin is also referred to as alpha-1 proteinase inhibitor (A1PI) because it inhibits a wide variety of proteases. It protects tissues from enzymes of inflammatory cells, especially neutrophil elastase........
Keyword: Interleukin -8 (IL-8) , Alpha -1 Antitrypsin (A1AT).
[1]. Onal H , Onal Z , Ozdil M and Albaj S, A new parameter on the differential diagnosis of bacterial and viral meningitis, Neurosciences , (2008) ; vol.13 , No.1 , pp : 91-92 .
[2]. James F and Bale JR , Meningitis and Encephalitis . In: Current Management in Child Neurology , Third Edition , United state of america , Bernard L.Maria, , (2005) ; PP : 509-514 .
[3]. Mace SE , Acute Bacterial Meningitis , Emergency Medicine Clincs of North Amerca ,( 2008) ; Vol. 38, pp : 231-317.
[4]. Handa S , Concentration of Interleukin 1 ,Interleukin-6 , Interleukin -8 and TNF alpha in Cerebrospinal Fluid from Children with Septic or Aseptic Meningitis , the kurume medical journal , (1992) ; vol. 39, pp : 257 - 265.
[5]. McAllister CK , O'Donoghue JM and Beaty HN , Experimental pneumococcal meningitis . II. Characterization and quantification of the inflammatory process .Infect Dis , (1975 ); Vol. 132, pp : 353-360 .
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Effect of investigationVPN to Secure Wireless LAN |
Country | : | Iraq |
Authors | : | El Mutaz Mahdi Osman Elawad || Dr.Haala El Dawo |
Abstract: Manycorporationsare seriously concerne dabout security of network sand the refore, the ir network superviso rsarestill reluctanttoinstallWLANs.In thisregards,theIEEE802.11istandard wasdevelopedto addressthesecurityproblems,eventhoughthe mistrustofthewirelessLANtechnologystill exists.Thethought wasthatthebestsecuritysolutionscouldbefoundin openstandards based technologies that can be delivered by Virtual Private Networking(VPN)beingusedfor a long timewithoutaddressingany security holes for the pas tfew years...........
Keyword: IEEE802.11,VPN,Networking,SecureWireless,WLAN,Opnet.
[1] TheCentreforInternetsecurity,NetworkingBenchMark,ThesisTitle: Wireless NetworkingBenchmark,version1.0,April2005.
[2] P. K. Neelakantham, Villanova University, Thesis Title: Wireless Networking Study of IEEE 802.11 Specification Communication Throughputoutbound 3:08 448660 202010 246650 55%
Networks,Summer2002.
[3] SelfStudyReportonPersonalAreaNetwork,Submittedby:H.Srikanth, Guid.
[4] National Institute Standards and Technology (NIST), Thesis Title:
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Overview: Importance of Network Security and Future Issues |
Country | : | Iraq |
Authors | : | El Mutaz Mahdi Osman Elawad || Dr.Haala El Dawo |
Abstract: Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent a cross the network..........
Keyword: .........
[1]. Dowd, P.W.; Mc Henry, J.T.," Network security: it's time to takeitseriously,"Computer,vol.31,no.9,pp.24‐
[2]. 28,Sep1998
[3]. Kartalopoulos,S.V.,"DifferentiatingDataSecurityandNetworkSecurity,"Communications,2008.ICC'08.IEEEInternationalConferenceon,pp.1469‐1473,19‐23 May2008
[4]. Security Overview," www.redhat.com/docs/manuals/enterprise/RHEL‐4‐ Manual/security‐guide/ch‐sgs‐ov.html.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A cost-effective delay model for leased data centers to establish private cloud computing services |
Country | : | Iran |
Authors | : | Mir Shahriar Emami |
Abstract: Nowadays, using of cloud computing services and developing movement towards on-demand and inexpensive communication and storage infrastructures, and also specialized software is one of the main topics for discussions among manufacturers, enterprises, universities and research centers in developing countries. However, the main challenge is that the information system based on public cloud computing is too expensive to establish for small and medium scale organizations..........
Keyword: Cost-effective, service time, on demand services, cloud computing, private cloud, public cloud, delay model, PaaS, SaaS, IaaS
[1] Cheng,L, Zhang,Q.,Boutaba R. (2010), "Cloud Computing: State-of-the-art and research challenges, IEEE Journal of Internet Services and Applications".
[2] Deaton, R. Garzon, M., Rose, J. , Franceschetti , D. R. Stevens, S. E., and Jr (1997), DNA Computing: A Review, Fundamenta Informaticae, IOS Press
[3] Emami,M. Sh.(2008), "A New Dynamic Strategy on Portals for Managing ERPs as a Semi Distributed ERP Approach", International Conference on Engineering and Science, Malaysia.
[4] Emami M. and ParnianMoqaddam A (1394), a review of cloud computing treatments and security techniques against of them, high tech conference in computer networks, Milad tower, Tehran (in Persian).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Security in E-Commerce |
Country | : | Iran |
Authors | : | Maryam KeshtkarYamini |
Abstract: Despite the all benefits of e-commerce, the transaction and online connections provide a great space for the abuse of technology, even the criminal acts.The organizations should find out a security system, tailored to their needs and apply it.Although the service selection, tailored to the various sides of organization, is a difficult act, but the experts, the custodian of selection, implementation and organization of security information systems, should evaluate the available options accurately and choose the best one.
Keyword: digital money, Secret signature, coin transaction
[1] Daniel L.Ruggles, IT Solutions Series: E-Commerce Security: Advice from Experts,Cybertech Publishing, 2004,
[2] Hassler, Vesna, Security Fundamentals for E-commerce, Artech House on Demand Publishers, 2001
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Examining Routing Methods and the Role of Neural Network in Wireless Sensor Networks. |
Country | : | Iran |
Authors | : | Javad Nikafshar |
Abstract: A wireless sensor network is a set of numerous sensor networks with small dimensions and limited computing and tele-communicative capabilities used for collecting and transferring data from one environment toward a user of base station. Artificial neural network is a large system of parallel or distributed components called neuron or nerve cell connected to each other in a graph topology. In other words, artificial neural networks are math algorithms able to learn complex mappings between input(s) and output(s) through supervised training or capable of classifying input data by an unsupervised approach. There are several types of neural networks which each of them have various capabilities according to their usage.........
Keyword: Wireless sensor network, neural network, neuron, topology
[1] Akkaya, K. and Younis M.(2005). A Survey on Routing Protocols for Wireless Sensor Networks. Elsevier Adhoc Network Journal.349 - 325
[2] Alkaraki,J. N. Kamal.and A. E.(2004).On the Correlated Data Gathering Problem in Wireless Sensor Networks, Proceedings of the 9th IEEE Symposium on Computers and Communications, Alexandria, Egypt.
[3] Sohraby, K. Minoli, D.andZnati, T.(2007).Wireless Sensor Networks: Technology Protocols and Applications, Published by WILEY INTERSCIENCE.
[4] Hedetniemi, S. and Liestman, A.(1988)A Survey of Gossiping and Broadcasting in Communication Networks, IEEE Networks, Vol. 18, No. 4, 349 - 319.
[5] Schurgers, C. and Srivastava, M. B.(2001). Energy Efficient Routing in Wireless Sensor Networks,Proceedings of the IEEE Military Communications Conference (MilCom'01) Communications for Network-Centric Operations-Creating the Information Force, McLean, VA.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Neural Networks Optimization, Using the Genetic Algorithm |
Country | : | Iran |
Authors | : | Somaieh Khajeh Hasani Rabori || Khojaste Shour bakhloo |
Abstract: There are many ways in neural networks optimization by genetic algorithm. One of the optimization methods is the neural networks repetition. The main idea of this method is that the model is developed at first and then trained using the less trained samples and probable searching area respectively. Approved results based on applied cases has been added as the new model training and second method is the genetic algorithm addition to the neural network structure and weights. In this optimization the weight, Bios and the neural networks structure are considered for awareness...........
Keyword: optimization, neural networks, genetic algorithm, forming, time series prediction
[1] NS Jaddi, S Abdullah, AR Hamdan - Information Processing Letters, 2016 - A solution representation of genetic algorithm for neural network weights and structure. ElsevierCamisón,
[2] S.I. Chang, K.P. Seng, L. Ang, 2012, Modular dynamic RBF neural network for face recognition, in: IEEE
[3] Conference on Open Systems (ICOS) , pp. 1–6.
[4] HX Huang, JC Li, CL Xiao - Expert Systems with Applications, 2015 - A proposed iteration optimization approach integrating backpropagation neural network with genetic algorithm.ElsevierHazen,