Recently Genetic Algorithms (GAs) have frequently been used for optimizing the solution of estimation problems. One of the main advantages of using these techniques is that they require no knowledge or gradient information about the response surface. The poor behavior of genetic algorithms in some problems, sometimes attributed to design operators, has led to the development of other types of algorithms. One such class of these algorithms is compact Genetic Algorithm (cGA), it dramatically reduces the number of bits reqyuired to store the poulation and has a faster convergence speed. In this paper compact Genetic Algorithm is used to optimize the maximum likelihood estimator of the first order moving avergae model MA(1). Simulation results based on MSE were compared with those obtained from the moments method and showed that the Canonical GA and compact GA can give good estimator of θ for the MA(1) model. Another comparison has been conducted to show that the cGA method has less number of function evaluations, minimum searched space percentage, faster convergence speed and has a higher optimal precision than that of the Canonical GA.
The aim of this paper is to construct the analysis mathematical model for stream cipher cryptosystems in order to be cryptanalysis using the cryptanalysis tools based on plaintext attack (or part from it) or ciphertext only attack, choosing Brüer generator as study case of nonlinear stream cipher system.
The constructing process includes constructing the linear (or non-linear) equations system of the attacked nonlinear generator. The attacking of stream cipher cryptosystem means solving the equations system and that means finding the initial key values for each combined LFSR.
Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the ene
... Show MoreB Saleem, H Alwan, L Khalid, Journal of Engineering, 2011 - Cited by 2
This paper compares between the direct and indirect georeferencing techniques in Photogrammetry bases on a simulation model. A flight plan is designed which consists of three strips with nine overlapped images for each strip by a (Canon 500D) digital camera with a resolution of 15 Mega Pixels.
The triangulation computations are carried out by using (ERDAS LPS) software, and the direct measurements are taken directly on the simulated model to substitute using GPS/INS in real case. Two computational tests have been implemented to evaluate the positional accuracy for the whole model and the Root Mean Square Error (RMSE) relating to (30) check points show that th
... Show MoreThe measurement data of the raw water quality of Tigris River were statistically analyzed to measure the salinity value in relation to the selected raw water quality parameters. The analyzed data were collected from five water treatment plants (WTPs) assembled alongside of the Tigris River in Baghdad: Al-Karkh, Al-Karama, Al-Qadisiya, Al-Dora, and Al-Wihda for the period from 2015 to 2021. The selected parameters are total dissolved solid (TDS), electrical conductivity (EC), pH and temperature. The main objective of this research is to predicate a mathematical model using SPSS software to calculate the value of salinity along the river, in addition, the effect of electrical conductivi
This research aims to present a proposed model for disclosure and documentation when performing the audit according to the joint audit method by using the questions and principles of the collective intelligence system, which leads to improving and enhancing the efficiency of the joint audit, and thus enhancing the confidence of the parties concerned in the outputs of the audit process. As the research problem can be formulated through the following question: “Does the proposed model for disclosure of the role of the collective intelligence system contribute to improving joint auditing?”
The proposed model is designed for the disclosure of joint auditing and the role
... Show MoreThe main purpose of the research is to diagnose the importance of the role that strategic memory plays with its three variables (content, structure, and processes) in helping the human resource department to use the COSO model with its five components (culture and governance, strategy and objectives, performance, communications and information, and feedback) in auditing activities and tasks Her own. As the research problem emphasized the existence of a lack of cognitive perception, of the importance of strategic memory, and the investment of its components in the rationalization of the application of the COSO model. and therefore it can be emphasized that the importance of the research is to provide treatments for problems relate
... Show More