Preferred Language
Articles
/
URfCNY8BVTCNdQwCKWI1
A combined compact genetic algorithm and local search method for optimizing the ARMA(1,1) model of a likelihood estimator
...Show More Authors

In this paper, a compact genetic algorithm (CGA) is enhanced by integrating its selection strategy with a steepest descent algorithm (SDA) as a local search method to give I-CGA-SDA. This system is an attempt to avoid the large CPU time and computational complexity of the standard genetic algorithm. Here, CGA dramatically reduces the number of bits required to store the population and has a faster convergence. Consequently, this integrated system is used to optimize the maximum likelihood function lnL(φ1, θ1) of the mixed model. Simulation results based on MSE were compared with those obtained from the SDA and showed that the hybrid genetic algorithm (HGA) and I-CGA-SDA can give a good estimator of (φ1, θ1) for the ARMA(1,1) model. Another comparison has been conducted to show that the I-CGA-SDA has fewer function evaluations, minimum search space percentage, faster convergence speed and has a higher optimal precision than that of the HGA.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Nov 20 2019
Journal Name
Proceedings Of The 2019 3rd International Conference On Big Data Research
Pressure Vessel Design Simulation Using Hybrid Harmony Search Algorithm
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Search for Identity in Michael Ondaatje's Post colonial Novel In the Skin of a Lion
...Show More Authors

In his post colonial novel, In the Skin of a lion, the Canadian/Sri Lankan writer,
Michael Ondaatje is so interested in the term "Post colonialism" because he wants to show
that the term doesn't only refer to a period of time that comes after colonialism. In other
words, post colonialism is not only referred to as a literal description of formerly colonial
societies. He deals with the termas a literary genre and an academic construct that describes
the global conditions of a man after a period of colonialism. He shows that post colonialism is
a theory that tries to examine and explore the different styles and faces of European authority
to control the colonized. Ondaatje's attempt through such term is to unmask Europ

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Nov 24 2021
Journal Name
Iraqi Journal Of Science
A proposal of Multimedia Steganography Algorithm based on Improved Least Significant Bit (LSB) Method
...Show More Authors

Because of the rapid development and use of the Internet as a communication media emerged to need a high level of security during data transmission and one of these ways is "Steganography". This paper reviews the Least Signification Bit steganography used for embedding text file with related image in gray-scale image. As well as we discuss the bit plane which is divided into eight different images when combination them we get the actual image. The findings of the research was the stego-image is indistinguishable to the naked eye from the original cover image when the value of bit less than four Thus we get to the goal is to cover up the existence of a connection or hidden data. The Peak to Signal Noise Ratio(PSNR) and Mean Square Error (

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of Nonlinear PID Neural Controller for the Speed Control of a Permanent Magnet DC Motor Model based on Optimization Algorithm
...Show More Authors

In this paper, the speed control of the real DC motor is experimentally investigated using nonlinear PID neural network controller. As a simple and fast tuning algorithm, two optimization techniques are used; trial and error method and particle swarm optimization PSO algorithm in order to tune the nonlinear PID neural controller's parameters and to find best speed response of the DC motor. To save time in the real system, a Matlab simulation package is used to carry out these algorithms to tune and find the best values of the nonlinear PID parameters. Then these parameters are used in the designed real time nonlinear PID controller system based on LabVIEW package. Simulation and experimental results are compared with each other and showe

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 05 2014
Journal Name
International Journal Of Applied Mathematical Research
Approximate solution of a model describing biological species living together using a new iterative method
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sat Dec 28 2019
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
NEW ROBUST ESTIMATOR OF CHANGE POINT IN SEGMENTED REGRESSION MODEL FOR BED-LOAD OF RIVERS
...Show More Authors

View Publication Preview PDF
Clarivate Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Engineering And Technology Journal
A Proposed Method for the Sound Recognition Process
...Show More Authors

View Publication
Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Practical Method to Calculate and Model the Petrophysical Properties of Reservoir Rock Using Petrel Software: A case Study from Iraq
...Show More Authors

Nasiriyah oilfield is located in the southern part of Iraq. It represents one of the promising oilfields. Mishrif Formation is considered as the main oil-bearing carbonate reservoir in Nasiriyah oilfield, containing heavy oil (API 25o(. The study aimed to calculate and model the petrophysical properties and build a three dimensional geological model for Mishrif Formation, thus estimating the oil reserve accurately and detecting the optimum locations for hydrocarbon production.

Fourteen vertical oil wells were adopted for constructing the structural and petrophysical models. The available well logs data, including density, neutron, sonic, gamma ray, self-potential, caliper and resistivity logs were used to calculate the

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design Active Filter Based on Genetic Algorithm
...Show More Authors

The  lossy-FDNR  based  aclive  fil ter has an  important   property among  many  design  realizations. 'This includes  a significant reduction in component count particularly in the number  of OP-AMP which consumes   power.  However  the·  problem  of  this   type  is the  large component spreads  which affect the fdter performance.

In  this  paper   Genetic   Algorithm   is  applied   to  minimize   the component  spread   (capacitance  and  resistance  p,read). The minimization of these spreads allow the fil

... Show More
View Publication Preview PDF