Recently Genetic Algorithms (GAs) have frequently been used for optimizing the solution of estimation problems. One of the main advantages of using these techniques is that they require no knowledge or gradient information about the response surface. The poor behavior of genetic algorithms in some problems, sometimes attributed to design operators, has led to the development of other types of algorithms. One such class of these algorithms is compact Genetic Algorithm (cGA), it dramatically reduces the number of bits reqyuired to store the poulation and has a faster convergence speed. In this paper compact Genetic Algorithm is used to optimize the maximum likelihood estimator of the first order moving avergae model MA(1). Simulation results based on MSE were compared with those obtained from the moments method and showed that the Canonical GA and compact GA can give good estimator of θ for the MA(1) model. Another comparison has been conducted to show that the cGA method has less number of function evaluations, minimum searched space percentage, faster convergence speed and has a higher optimal precision than that of the Canonical GA.
This research aimed at recognizing the properties of curricula that fitted to preeminent and talent students. Many types of these curricula were exposed, enrichment curriculum was explained as one of alternatives of available curricula.
The research used the analytical methodology for local and international literature in the field of preeminent and talent education to meet the properties of curricula that fitted to this special group of students. Many results was obtained as:
• This type of school enrichment curriculum consists of three levels( general discovery activities, individual and groups training activities, and individual or groups real problems).
• Investigation the effectively both sides of brain: right and left,
In this paper, 3D simulation of the global coronal magnetic field, which use observed line of sight component of the photosphere magnetic field from (MDI/SOHO) was carried out using potential field model. The obtained results, improved the theoretical models of the coronal magnetic field, which represent a suitable lower boundary conditions (Bx, By, Bz) at the base of the linear force-free and nonlinear force free models, provides a less computationally expensive method than other models. Generally, very high speed computer and special configuration is needed to solve such problem as well as the problem of viewing the streamline of the magnetic field. For high accuracy special mathematical treatment was adopted to solve the computation comp
... Show MoreGypseous soils are distributed in many regions in the world including Iraq, which cover more than (31%) of the surface area of the country. Existence of these soils, always with high gypsum content, caused difficult problems to the buildings and strategic projects due to dissolution and leaching of the gypsum caused by the action of water flow through soil mass. For the study, the gypseous soil was brought from Bahr Al-Najaf, Al-Najaf Governorate which is located in the middle of Iraq. The model pile was embedded in gypseous soil with 42% gypsum content. Compression axial model pile load tests have been carried out for model pile embedded in gypseous soil at initial degree of saturation of (7%) before and after soil satu
... Show MoreBy driven the moment estimator of ARMA (1, 1) and by using the simulation some important notice are founded, From the more notice conclusions that the relation between the sign and moment estimator for ARMA (1, 1) model that is: when the sign is positive means the root gives invertible model and when the sign is negative means the root gives invertible model. An alternative method has been suggested for ARMA (0, 1) model can be suitable when
In this paper, a simple fast lossless image compression method is introduced for compressing medical images, it is based on integrates multiresolution coding along with polynomial approximation of linear based to decompose image signal followed by efficient coding. The test results indicate that the suggested method can lead to promising performance due to flexibility in overcoming the limitations or restrictions of the model order length and extra overhead information required compared to traditional predictive coding techniques.
Reducing the drag force has become one of the most important concerns in the automotive industry. This study concentrated on reducing drag through use of some external modifications of passive flow control, such as vortex generators, rear under body diffuser slices and a rear wing spoiler. The study was performed at inlet velocity (V=10,20,30,40 m/s) which correspond to an incompressible car model length Reynolds numbers (Re=2.62×105, 5.23×105, 7.85×105 and 10.46×105), respectively and we studied their effect on the drag force. We also present a theoretical study finite volume method (FVM) of solvi
Chemotherapy is one of the most efficient methods for treating cancer patients. Chemotherapy aims to eliminate cancer cells as thoroughly as possible. Delivering medications to patients’ bodies through various methods, either oral or intravenous is part of the chemotherapy process. Different cell-kill hypotheses take into account the interactions of the expansion of the tumor volume, external drugs, and the rate of their eradication. For the control of drug usage and tumor volume, a model based smooth super-twisting control (MBSSTC) is proposed in this paper. Firstly, three nonlinear cell-kill mathematical models are considered in this work, including the log-kill, Norton-Simon, and hypotheses subject to parametric uncertainties and exo
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThe rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E
... Show More