This paper presents a hybrid genetic algorithm (hGA) for optimizing the maximum likelihood function ln(L(phi(1),theta(1)))of the mixed model ARMA(1,1). The presented hybrid genetic algorithm (hGA) couples two processes: the canonical genetic algorithm (cGA) composed of three main steps: selection, local recombination and mutation, with the local search algorithm represent by steepest descent algorithm (sDA) which is defined by three basic parameters: frequency, probability, and number of local search iterations. The experimental design is based on simulating the cGA, hGA, and sDA algorithms with different values of model parameters, and sample size(n). The study contains comparison among these algorithms depending on MSE value. One can conclude that (hGA) can give good estimators (phi(1),theta(1)) of ARMA(1,1)parameters and more reliable than estimators obtained by cGA and SDA algorithm
This study focuses on CFD analysis in the field of the shell and double concentric tube heat exchanger. A commercial CFD package was used to resolve the flow and temperature fields inside the shell and tubes of the heat exchanger used. Simulations by CFD are performed for the single shell and double concentric tube.
This heat exchanger included 16 tubes and 20 baffles. The shell had a length of 1.18 m and its diameter was 220 mm. Solid Works 2014, ANSYS 15.0 software was used to analyze the fields of flow and temperature inside the shell and the tubes. The RNG k-ε model was used and it provided good results. Coarse and fine meshes were investigated, showing that aspect ratio has no significant effect. 14 million
... Show MoreThe use of external posttensioning technique for strengthening reinforced concrete girders has been considerably studied by many researchers worldwide. However, no available data are seen regarding strengthening full-scale composite prestressed concrete girders with external posttensioned technique under static and repeated loading. In this research, four full-scale composite prestressed I-shape girders of 16 m span were fabricated and tested under static and repeated loading up to failure. Accordingly, two girders were externally strengthened with posttensioned strands, while the other two girders were left without strengthening. The experimental tests include deflection, cracking load, ultimate strength and strains at midspan, a
... Show MoreThe process for preparing activated carbon (AC) made from tea residue was described in this paper. Investigated were the physicochemical characteristics and adsorption efficiency of the produced AC. Activation with potassium hydroxide (KOH) and carbonization at 350 °C are the two key steps in the manufacturing of AC. The activated carbon was used to adsorb Tetracycline (TC). Different parameters were studied at room temperature to show their effects on the adsorption efficiency of TC. These parameters are the initial concentration of adsorbate TC, solution acidity pH, time of adsorption, and adsorbent dosage. The prepared active carbon was characterized using Fourier transform infrared spectroscopy (FTIR), scanning electron microscopy (
... Show Moreفي البحث الحالي تم تحضير ودراسة النشاط الحيوي لسلسلة من البوليمرات الجديدة المحورة من الكيتوسان مع مركبات تحتوي على مجموعة الآزو. في البداية تم تحضير ملح الديازونيوم من تفاعل 3,3'-dimethyl-[1,1'-biphenyl]-4,4'-diamine مع حامض الهيدروكلوريك المركز ونتريت الصوديوم .ثم تفاعل الازدواج بين ملح الديازونيوم مع الديهايدات اروماتية معوضة لإنتاج مشتقات الازو (1-6). ازو شف بيس كيتوسان((12-7 والتي حضرت من تفاعل الكيتوسان مع مشتقات
... Show MoreIn this study, the chamomile flowers (Matricaria recutitaL) which grow in Iraqi Kurdistan region during the seasons of (2008) are collected. The percentage of essential oil was determined by using steam distillation and the extraction of flowers performed with petroleum ether (70-80) ºC and methanol 70% using ultrasonic extraction. Total phenolic compounds were determined from methanol extracts by using Folin-Ciocalteu method. The extracts were evaluated by thin layer chromatography, ultraviolet absorption and the biological activities were evaluated through their antibacterial action against two types of bacteria using hole method. The flowers showed a composition of 0.071% ash, 0.4% essential oil, 3.2% non oily compounds, 4% oil, 1.9% mo
... Show MoreAbstract This study seeks to deal academically with how the EU treats clandestine immigration, through adopting a purley security approach, based on the European understanding of security threats posed to the security of communities and States in EU at all levels. So they agreed upon criminalizing this threat within the bloc while using repressive tools and steps to limit illegal immigrants flow to European territories. Accordingly, the EU gave the phenomen a security character. So it takes it from low politics level , that of employment and economic field to that of high politics, as a new security problem lying within a new security language embraced by ruling European elites, in other words EU touched on this issue as a speech act emp
... Show More
The main aim of this study is to evaluate the remaining oil in previously produced zones, locate the water productive zone and look for any bypassed oil behind casing in not previously perforated intervals. Initial water saturation was calculated from digitized open hole logs using a cut-off value of 10% for irreducible water saturation. The integrated analysis of the thermal capture cross section, Sigma and Carbon/oxygen ratio was conducted and summarized under well shut-in and flowing conditions. The logging pass zone run through sandstone Zubair formation at north Rumaila oil field. The zones where both the Sigma and the C/O analysis show high remaining oil saturation simila
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreFrom a health standpoint, fluoride (F) is a vital element for humans. It had harmful effects on numerous organs when consumed in high dosages. Fluoride poisoning has been linked to liver damage. The purpose of this study was to see how sodium fluoride (Naf) affected liver function and the glycemic index in adult male albino rats. Fourteen (14) adult male Wistar albino rats were randomly and evenly divided into two groups and given the following treatments for thirty (30) days: G1 Group (Control group), were given distilled water and fed a balanced diet, G2 rats were administered water that contained 100 ppm Naf. The animals were fasted for 8-12 hours before being anesthetized and blood samples were taken by heart puncture technique
... Show MoreThe research aims to monitor and analyze the visual and symbolic features, derived from the Omani heritage, and inspired by the concept of local identity, for a selection of contemporary Omani graphic art works, which represent a mixed, multi-category of research sample, comprising three levels: the works of professional Omani artists, and the works of young artists and specialized students, as well as the work of a number of active academics in the field of graphic theorizing and teaching. The sample is also divided - in terms of technical classification - into a category of works executed using traditional engraving and printing media, and a category of works executed using modern and digital graphic printing media.
Through the da