Recently Genetic Algorithms (GAs) have frequently been used for optimizing the solution of estimation problems. One of the main advantages of using these techniques is that they require no knowledge or gradient information about the response surface. The poor behavior of genetic algorithms in some problems, sometimes attributed to design operators, has led to the development of other types of algorithms. One such class of these algorithms is compact Genetic Algorithm (cGA), it dramatically reduces the number of bits reqyuired to store the poulation and has a faster convergence speed. In this paper compact Genetic Algorithm is used to optimize the maximum likelihood estimator of the first order moving avergae model MA(1). Simulation results
... Show MoreThis research presents an experimental investigation of the rehabilitation efficiency of the damaged hybrid reinforced concrete beams with openings in the shear region. The study investigates the difference in retrofitting ability of hybrid beams compared to traditional beams and the effect of two openings compared with one opening equalized to two holes in the area. Five RC beams classified into two groups, A and B, were primarily tested to full-failure under two-point loads. The first group (A) contained beams with normal weight concrete. The second group (hybrid) included beams with lightweight concrete for web and bottom flange, whereas the top flange was made from normal concrete. Two types of openings were considered in this s
... Show MoreIn this research, the structural behavior of reinforced concrete columns made of normal and hybrid reactive powder concrete (hybrid by steel and polypropylene fibers) subjected to chloride salts with concentration was 8341.6 mg/l. The study consists of two parts, the first one is experimental study and the second one is theoretical analysis. Three main variables were adopted in the experimental program; concrete type, curing type and loading arrangement. Twenty (120x120x1200) mm columns were cast and tested depending on these variables. The samples were reinforced using two different bars; Ø8 for ties and Ø12 with minimum longitudinal reinforcement (0.01Ag). The specimens were divided into two main groups based o
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThree-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.
Two‐dimensional buoyancy‐induced flow and heat transfer inside a square enclosure partially occupied by copper metallic foam subjected to a symmetric side cooling and constant heat flux bottom heating was tested numerically. Finite Element Method was employed to solve the governing partial differential equations of the flow field and the Local Thermal Equilibrium model was used for the energy equation. The system boundaries were defined as lower heated wall by constant heat flux, cooled lateral walls, and insulated top wall. The three parameters elected to conduct the study are heater length (7 ≤
Optimization is essentially the art, science and mathematics of choosing the best among a given set of finite or infinite alternatives. Though currently optimization is an interdisciplinary subject cutting through the boundaries of mathematics, economics, engineering, natural sciences, and many other fields of human Endeavour it had its root in antiquity. In modern day language the problem mathematically is as follows - Among all closed curves of a given length find the one that closes maximum area. This is called the Isoperimetric problem. This problem is now mentioned in a regular fashion in any course in the Calculus of Variations. However, most problems of antiquity came from geometry and since there were no general methods to solve suc
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More