Preferred Language
Articles
/
PBe7NY8BVTCNdQwCjmKZ
Differential evolution with adaptive repository of strategies and parameter control schemes
...Show More Authors

A new Differential Evolution (ARDE) algorithm is introduced that automatically adapt a repository of DE strategies and parameters adaptation schemes of the mutation factor and the crossover rate to avoid the problems of stagnation and make DE responds to a wide range of function characteristics at different stages of the evolution. ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. Then a new adaptive procedure called adaptive repository (AR) has been developed to select the appropriate combinations of the JADE strategies and the parameter control schemes of the MDE_pBX to generate the next population based on their fitness values. Experimental results have been presented to confirm the reliability of the proposed ARDE over several existing adaptive DE variants. This comparison has been conducted in terms of the solution precision over twenty-one standard benchmark functions including CEC 2005 functions.

Scopus Crossref
View Publication
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Effect of Silver Oxide Film Thickness on Some Optical Parameter
...Show More Authors

Films of silver oxide of different thickness have been prepared by the chemical spray paralysis. Transmission and absorption spectra have recorded in order to study the effect of increasing thickness on some optical parameter such as reflectance, refractive index , and dielectric constant in its two parts . This study reveals that all these paramters affect by increasing the thickness .

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
A Comparative Study for Estimate Fractional Parameter of ARFIMA Model
...Show More Authors

      Long memory analysis is one of the most active areas in econometrics and time series where various methods have been introduced to identify and estimate the long memory parameter in partially integrated time series. One of the most common models used to represent time series that have a long memory is the ARFIMA (Auto Regressive Fractional Integration Moving Average Model) which diffs are a fractional number called the fractional parameter. To analyze and determine the ARFIMA model, the fractal parameter must be estimated. There are many methods for fractional parameter estimation. In this research, the estimation methods were divided into indirect methods, where the Hurst parameter is estimated fir

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Application of Wavelet Packet and S Transforms for Differential Protection of Power Transformer
...Show More Authors

The differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
Comparative Analysis of H2 and H∞ Robust Control Design Approaches for Dynamic Control Systems
...Show More Authors

This paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Apr 04 2023
Journal Name
International Journal Of Professional Business Review
Leadership and Internal Communication Strategies in Public Organizations: Analytical Research
...Show More Authors

Purpose: As managers can lead a set of ways to improve internal communication in public organizations, and leadership can cultivate a common understanding of goals within the organization and share the vision in preparation for its way to better performance, the purpose of the research is to assess the type and strength of the relationship between internal communication and different forms of leadership.   Theoretical framework: The study demonstrates how leaders in public organizations improve internal communication, related to employees' perceptions of public organizations' routines and performance.   Design/methodology/approach: The  study  uses the  ordinary  least  squares  (OLS) and  applied multiple  regression A sa

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Self-organized learning strategies and self-competence among talented students
...Show More Authors

Investigating the strength and the relationship between the Self-organized learning strategies and self-competence among talented students was the aim of this study. To do this, the researcher employed the correlation descriptive approach, whereby a sample of (120) male and female student were selected from various Iraqi cities for the academic year 2015-2016.  the researcher setup two scales based on the previous studies: one to measure  the Self-organized learning strategies which consist of (47) item and the other to measure the self-competence that composed of (50) item. Both of these scales were applied on the targeted sample to collect the required data

View Publication Preview PDF
Publication Date
Tue Oct 11 2022
Journal Name
Al–bahith Al–a'alami
Comment moderation strategies in Canadian news media and their principles
...Show More Authors

This paper offers a critical examination of Canadian news guidelines and policies
on user-generated content (UGC) posted on news-related comment sections and
social media.
The outline of how news-related UGC is moderated within Canadian news is achieved
by looking at the online comment policies of major Canadian news organizations like .
the CBC, CityNews (Halifax), CTV News, Glacier Media, Global News, The Globe
and Mail, Narcity Media, Postmedia, QUB (Québecor), and Torstar.The policies highlight how Canadian news organizations have practical strategies
to manage news-related UGC but also call upon positive and negative social
principles, to flag ill practices, foster democracy, and fight against online hate sp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Practice Periodical On Structural Design And Construction
Best Practice Strategies for Workforce Development and Sustainability in Construction
...Show More Authors

View Publication
Scopus (22)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Between Shrinkage &Maximum likelihood Method For Estimation Parameters &Reliability Function With 3- Parameter Weibull Distribution By Using Simulation
...Show More Authors

The 3-parameter Weibull distribution is used as a model for failure since this distribution is proper when the failure rate somewhat high in starting operation and these rates will be decreased with increasing time .

In practical side a comparison was made between (Shrinkage and Maximum likelihood) Estimators for parameter and reliability function using simulation , we conclude that the Shrinkage estimators for parameters are better than maximum likelihood estimators but the maximum likelihood estimator for reliability function is the better using statistical measures (MAPE)and (MSE) and for different sample sizes.

Note:- ns : small sample ; nm=median sample

... Show More
View Publication Preview PDF
Crossref