A new Differential Evolution (ARDE) algorithm is introduced that automatically adapt a repository of DE strategies and parameters adaptation schemes of the mutation factor and the crossover rate to avoid the problems of stagnation and make DE responds to a wide range of function characteristics at different stages of the evolution. ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. Then a new adaptive procedure called adaptive repository (AR) has been developed to select the appropriate combinations of the JADE strategies and the parameter control schemes of the MDE_pBX to generate the next population based on their fitness values. Experimental results have been presented to confirm the reliability of the proposed ARDE over several existing adaptive DE variants. This comparison has been conducted in terms of the solution precision over twenty-one standard benchmark functions including CEC 2005 functions.
Films of silver oxide of different thickness have been prepared by the chemical spray paralysis. Transmission and absorption spectra have recorded in order to study the effect of increasing thickness on some optical parameter such as reflectance, refractive index , and dielectric constant in its two parts . This study reveals that all these paramters affect by increasing the thickness .
Long memory analysis is one of the most active areas in econometrics and time series where various methods have been introduced to identify and estimate the long memory parameter in partially integrated time series. One of the most common models used to represent time series that have a long memory is the ARFIMA (Auto Regressive Fractional Integration Moving Average Model) which diffs are a fractional number called the fractional parameter. To analyze and determine the ARFIMA model, the fractal parameter must be estimated. There are many methods for fractional parameter estimation. In this research, the estimation methods were divided into indirect methods, where the Hurst parameter is estimated fir
... Show MoreThe differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree
... Show MoreThis paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl
... Show MorePurpose: As managers can lead a set of ways to improve internal communication in public organizations, and leadership can cultivate a common understanding of goals within the organization and share the vision in preparation for its way to better performance, the purpose of the research is to assess the type and strength of the relationship between internal communication and different forms of leadership. Theoretical framework: The study demonstrates how leaders in public organizations improve internal communication, related to employees' perceptions of public organizations' routines and performance. Design/methodology/approach: The study uses the ordinary least squares (OLS) and applied multiple regression A sa
... Show MoreInvestigating the strength and the relationship between the Self-organized learning strategies and self-competence among talented students was the aim of this study. To do this, the researcher employed the correlation descriptive approach, whereby a sample of (120) male and female student were selected from various Iraqi cities for the academic year 2015-2016. the researcher setup two scales based on the previous studies: one to measure the Self-organized learning strategies which consist of (47) item and the other to measure the self-competence that composed of (50) item. Both of these scales were applied on the targeted sample to collect the required data
This paper offers a critical examination of Canadian news guidelines and policies
on user-generated content (UGC) posted on news-related comment sections and
social media.
The outline of how news-related UGC is moderated within Canadian news is achieved
by looking at the online comment policies of major Canadian news organizations like .
the CBC, CityNews (Halifax), CTV News, Glacier Media, Global News, The Globe
and Mail, Narcity Media, Postmedia, QUB (Québecor), and Torstar.The policies highlight how Canadian news organizations have practical strategies
to manage news-related UGC but also call upon positive and negative social
principles, to flag ill practices, foster democracy, and fight against online hate sp
As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreThe 3-parameter Weibull distribution is used as a model for failure since this distribution is proper when the failure rate somewhat high in starting operation and these rates will be decreased with increasing time .
In practical side a comparison was made between (Shrinkage and Maximum likelihood) Estimators for parameter and reliability function using simulation , we conclude that the Shrinkage estimators for parameters are better than maximum likelihood estimators but the maximum likelihood estimator for reliability function is the better using statistical measures (MAPE)and (MSE) and for different sample sizes.
Note:- ns : small sample ; nm=median sample
... Show More