In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction accuracy criterion and matching curve-fitting in this work demonstrated that if the residuals of the revised model are white noise, the forecasts are unbiased. Future work investigating robust hybrid model forecasting using fuzzy neural networks would be very interesting.
The vast advantages of 3D modelling industry have urged competitors to improve capturing techniques and processing pipelines towards minimizing labour requirements, saving time and reducing project risk. When it comes to digital 3D documentary and conserving projects, laser scanning and photogrammetry are compared to choose between the two. Since both techniques have pros and cons, this paper approaches the potential issues of individual techniques in terms of time, budget, accuracy, density, methodology and ease to use. Terrestrial laser scanner and close-range photogrammetry are tested to document a unique invaluable artefact (Lady of Hatra) located in Iraq for future data fusion sc
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThis paper presents a hybrid approach called Modified Full Bayesian Classifier (M-FBC) and Artificial Bee Colony (MFBC-ABC) for using it to medical diagnosis support system. The datasets are taken from Iraqi hospitals, these are for the heart diseases and the nervous system diseases. The M-FBC is depended on common structure known as naïve Bayes. The structure for network is represented by D-separated for structure's variables. Each variable has Condition Probability Tables (CPTs) and each table for disease has Probability. The ABC is easy technique for implementation, has fewer control parameters and it could be easier than other swarm optimization algorithms, so that hybrid with other algorithms to reach the optimal structure. In the
... Show MoreFeature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall
... Show MoreIn this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreIn this paper a mathematical model that analytically as well as numerically
the flow of infection disease in a population is proposed and studied. It is
assumed that the disease divided the population into five classes: immature
susceptible individuals (S1) , mature individuals (S2 ) , infectious individual
(I ), removal individuals (R) and vaccine population (V) . The existence,
uniqueness and boundedness of the solution of the model are discussed. The
local and global stability of the model is studied. Finally the global dynamics of
the proposed model is studied numerically.
The interplay of predation, competition between species and harvesting is one of the most critical aspects of the environment. This paper involves exploring the dynamics of four species' interactions. The system includes two competitive prey and two predators; the first prey is preyed on by the first predator, with the former representing an additional food source for the latter. While the second prey is not exposed to predation but rather is exposed to the harvest. The existence of possible equilibria is found. Conditions of local and global stability for the equilibria are derived. To corroborate our findings, we constructed time series to illustrate the existence and the stability of equilibria numerically by varying the different values
... Show MoreAbstract
The study of oxygen mass transfer was conducted in a laboratory scale 5 liter stirred bioreactor equipped with one Rushton turbine impeller. The effects of superficial gas velocity, impeller speed, power input and liquid viscosity on the oxygen mass transfer were considered. Air/ water and air/CMC systems were used as a liquid media for this study. The concentration of CMC was ranging from 0.5 to 3 w/v. The experimental results show that volumetric oxygen mass transfer coefficient increases with the increase in the superficial gas velocity and impeller speed and decreases with increasing liquid viscosity. The experimental results of kla were correlated with a mathematical correlation des
... Show More