This paper presents a hybrid genetic algorithm (hGA) for optimizing the maximum likelihood function ln(L(phi(1),theta(1)))of the mixed model ARMA(1,1). The presented hybrid genetic algorithm (hGA) couples two processes: the canonical genetic algorithm (cGA) composed of three main steps: selection, local recombination and mutation, with the local search algorithm represent by steepest descent algorithm (sDA) which is defined by three basic parameters: frequency, probability, and number of local search iterations. The experimental design is based on simulating the cGA, hGA, and sDA algorithms with different values of model parameters, and sample size(n). The study contains comparison among these algorithms depending on MSE value. One can conclude that (hGA) can give good estimators (phi(1),theta(1)) of ARMA(1,1)parameters and more reliable than estimators obtained by cGA and SDA algorithm
The importance of media coverage in the war remains dependent on many indicators for its success, the most important is to have qualified reporters who carry the war news professionally. The idea of this research is to determine the role played by war correspondents working on Iraqi satellite channels during the war against ISIS.
The researcher has chosen ( 40 ) reporters those who was able to contact them and prepared a questionnaire for them to study their situations. Also, he chose an intentional sample from Baghdad audience on condition they should be informed by the performance of the reporters in the satellite channels applying the hypotheses of the theory of depending upon media.
The most important results reached by the re
In this paper the queuing system (M/Er/1/N) has been considered in equilibrium. The method of stages introduced by Erlang has been used. The system of equations which governs the equilibrium probabilities of various stages has been given. For general N the probability of j stages of service are left in the system, has been introduced. And the probability for the empty system has been calculated in the explicit form.
This work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obta
... Show MoreIn this study new derivatives of O-[2-{''2-Substituted Aryl (''1,''3,''4 thiadiazolyl) ['3,'4-b]-'1,'2,'4- Triazolyl]-Ethyl]-p- chlorobenzald oxime (6-11)have been synthesized from the starting material p-chloro – E- benzaldoxime 1.Compound 2 was synthesized by the reaction of p-chloro – E- benzaldoxime with ethyl acrylate in basic medium. Refluxing compound 2 with hydrazine hydrate in ethanol absolute afforded 3. Derivative 4 was prepared by the reaction of 3 with carbon disulphide, treated of compound 4 with hydrazine hydrate gave 5. The derivatives (6-11) were prepared by the reaction of 5 with different substitutesof aromatic acids. The structures of these compounds were characterized from their melting points, infrared spectroscopy
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreThe aim of this study is to show the concepts of nuclear shape and the geometrical picture to the even-even nuclei of 164,166,168E isotopes in the context of the Interacting boson Model IBM-1. The energy spectra were calculated and the effective charge values (eB) of the electromagnetic transition strength were obtained and used to calculate the B(E2) values of the electromagnetic transitions and the quadrupole moment Q of 2+ -states. The Hamiltonian parameters were calculated by taking in account the properties of these nuclei. Comparison were made with the available experimental data and included in tables. The geometrical picture of these nuclei were looked at by calculating the deformation which were represented by the potentia
... Show MoreThis study is about the role of the Internet in spreading rumors, especially through social networking sites "Facebook" model as the effectiveness of social networks lies in the speed of transmission of events; these two characteristics are important to the public, making the Internet a strong contender for television and its relationship with the public. That's why we find that the Internet today has become a fertile environment for the growth and spread of rumors. The more limited the platforms and places of publication, the greater the responsibility in the search for the original source in spreading this or that rumor, as the Internet is considered an easy means in the production, spreading and re-spreading of
... Show MoreEvolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological proce
... Show More