This paper presents a hybrid genetic algorithm (hGA) for optimizing the maximum likelihood function ln(L(phi(1),theta(1)))of the mixed model ARMA(1,1). The presented hybrid genetic algorithm (hGA) couples two processes: the canonical genetic algorithm (cGA) composed of three main steps: selection, local recombination and mutation, with the local search algorithm represent by steepest descent algorithm (sDA) which is defined by three basic parameters: frequency, probability, and number of local search iterations. The experimental design is based on simulating the cGA, hGA, and sDA algorithms with different values of model parameters, and sample size(n). The study contains comparison among these algorithms depending on MSE value. One can conclude that (hGA) can give good estimators (phi(1),theta(1)) of ARMA(1,1)parameters and more reliable than estimators obtained by cGA and SDA algorithm
Maximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show MoreCredit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering res
... Show MoreIn this research, the focus was placed on estimating the parameters of the Hypoexponential distribution function using the maximum likelihood method and genetic algorithm. More than one standard, including MSE, has been adopted for comparison by Using the simulation method
The regular job of a reservoir engineer is to put a development plan to increase hydrocarbon production as possible and within economic and technical considerations. The development strategy for the giant reservoir is a complex and challenging task through the decision-making analysis process. Due to the limited surface water treatment facility, the reservoir management team focuses on minimizing water cut as low as possible by check the flow of formation and injected water movement through the Mishrif reservoir. In this research, a representative sector was used to make the review of water injection configuration, which is considered an efficient tool to make study in a particular area of the entire field when compared with the ful
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreThe compound 2,2'-(((1H-benzo(d)imidazol-2-yl)methyl)azanediyl)bis(ethan-1-ol) was reacted with benzyl bromide to afford compound (1) which used as row material to prepare a series of compounds through condensation reaction, the starting compound were reacted with tosyl chloride to protect the OH group to afford compound 2, then reacted benzyl bromide to produce compound (2), then the compound (2) treated with three compounds ( 2-mercaptobenzthiazole, 2-mercaptobenimidazol and 2-chloromethyl benzimidazole) to form compounds 3a,b, 4a,b and 5a,b respectively. In the another step the click reaction of compound 2,2'-(((1H-benzo(d)imidazol-2-yl)methyl)azanediyl)bis(ethan-1-ol) with Propargyl bromide produce compound 6 which
... Show MoreThe compound 2,2'-(((1H-benzo(d)imidazol-2-yl)methyl)azanediyl)bis(ethan-1-ol) was reacted with benzyl bromide to afford compound (1) which used as row material to prepare a series of compounds through condensation reaction, the starting compound were reacted with tosyl chloride to protect the OH group to afford compound 2, then reacted benzyl bromide to produce compound (2), then the compound (2) treated with three compounds ( 2-mercaptobenzthiazole, 2-mercaptobenimidazol and 2-chloromethyl benzimidazole) to form compounds 3a,b, 4a,b and 5a,b respectively. In the another step the click reaction of compound 2,2'-(((1H-benzo(d)imidazol-2-yl)methyl)azanediyl)bis(ethan-1-ol) with Propargyl bromide produce compound 6 which reacted
... Show More