This paper presents a hybrid genetic algorithm (hGA) for optimizing the maximum likelihood function ln(L(phi(1),theta(1)))of the mixed model ARMA(1,1). The presented hybrid genetic algorithm (hGA) couples two processes: the canonical genetic algorithm (cGA) composed of three main steps: selection, local recombination and mutation, with the local search algorithm represent by steepest descent algorithm (sDA) which is defined by three basic parameters: frequency, probability, and number of local search iterations. The experimental design is based on simulating the cGA, hGA, and sDA algorithms with different values of model parameters, and sample size(n). The study contains comparison among these algorithms depending on MSE value. One can conclude that (hGA) can give good estimators (phi(1),theta(1)) of ARMA(1,1)parameters and more reliable than estimators obtained by cGA and SDA algorithm
All major organs may be impacted by the connective disease systemic lupus erythematosus, a separate risk factor for coronary artery disease (CAD). Adhesion molecules like intercellular adhesion molecules (ICAM) and vascular cell adhesion molecules (VCAM) can detect endothelial damage and dysfunction, which appear to play a crucial role. This study investigated whether people with SLE had elevated subclinical and clinical atherosclerosis risk factors. Traditional CAD risk factors such as smoking, hypertension, and hyperlipidemia cannot entirely explain this elevation. It is thought that immunological dysfunction also increases CAD risk in SLE patients. The study aimed to assess early endothelial changes in SLE Iraqi female patients w
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreSolid waste is a major issue in today's world. Which can be a contributing factor to pollution and the spread of vector-borne diseases. Because of its complicated nonlinear processes, this problem is difficult to model and optimize using traditional methods. In this study, a mathematical model was developed to optimize the cost of solid waste recycling and management. In the optimization phase, the salp swarm algorithm (SSA) is utilized to determine the level of discarded solid waste and reclaimed solid waste. An optimization technique SSA is a new method of finding the ideal solution for a mathematical relationship based on leaders and followers. It takes a lot of random solutions, as well as their outward or inward fluctuations, t
... Show MoreData Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need
... Show MoreNowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject
... Show MoreSince the COVID-19 pandemic alarm was made by the severe acute respiratory syndrome (SARS)-coronavirus (CoV) 2, several institutions and agencies have pursued to clarify the viral virulence and infectivity. The fast propagation of this virus leads to an unprecedented rise in the number of cases worldwide. COVID-19 virus is exceptionally contagious that spreads through droplets, respiratory secretions, and direct contact. The enveloped, single-stranded RNA virus has a specific envelop region called (S) region encoding (S protein) that specifically binds to the host cell receptor. Viral infection requires receptors' participation on the host cell membrane's surface, a key- step for the viral invasion of susceptible cells.
Rec
... Show MoreToxoplasmosis is a parasitic infection that triggers immune cells to produce cytokines and inflammatory mediators that are responsible for abnormal or aborted immune responses. This study highlights the evaluation of the Dectin-1 receptor and cytokine IL-37 in the serum of 80 patients who had miscarried in the first trimester and were infected with toxoplasmosis, as well as 40 pregnant women in the first trimester who had a successful pregnancy (control groups). The serum was first screened for the T. gondii IgM and IgG antibodies by an enzyme-linked immunosorbent assay (ELISA) and then the serum levels of IL-37 and Dectin-1 were determined. The results showed that the serum level of Dectin-1 was significantly increased in anti-
... Show MoreThe first successful implementation of Artificial Neural Networks (ANNs) was published a little over a decade ago. It is time to review the progress that has been made in this research area. This paper provides taxonomy for classifying Field Programmable Gate Arrays (FPGAs) implementation of ANNs. Different implementation techniques and design issues are discussed, such as obtaining a suitable activation function and numerical truncation technique trade-off, the improvement of the learning algorithm to reduce the cost of neuron and in result the total cost and the total speed of the complete ANN. Finally, the implementation of a complete very fast circuit for the pattern of English Digit Numbers NN has four layers of 70 nodes (neurons) o
... Show MoreThe first successful implementation of Artificial Neural Networks (ANNs) was published a little over a decade ago. It is time to review the progress that has been made in this research area. This paper provides taxonomy for classifying Field Programmable Gate Arrays (FPGAs) implementation of ANNs. Different implementation techniques and design issues are discussed, such as obtaining a suitable activation function and numerical truncation technique trade-off, the improvement of the learning algorithm to reduce the cost of neuron and in result the total cost and the total speed of the complete ANN. Finally, the implementation of a complete very fast circuit for the pattern of English Digit Numbers NN has four layers of 70 nodes (neurons) o
... Show More