This paper presents a hybrid genetic algorithm (hGA) for optimizing the maximum likelihood function ln(L(phi(1),theta(1)))of the mixed model ARMA(1,1). The presented hybrid genetic algorithm (hGA) couples two processes: the canonical genetic algorithm (cGA) composed of three main steps: selection, local recombination and mutation, with the local search algorithm represent by steepest descent algorithm (sDA) which is defined by three basic parameters: frequency, probability, and number of local search iterations. The experimental design is based on simulating the cGA, hGA, and sDA algorithms with different values of model parameters, and sample size(n). The study contains comparison among these algorithms depending on MSE value. One can conclude that (hGA) can give good estimators (phi(1),theta(1)) of ARMA(1,1)parameters and more reliable than estimators obtained by cGA and SDA algorithm
Farmers keep trying to avoid using chemical fertilizer without losing high yield. A field experiment was conducted in the fields of Agriculture College, University of Baghdad during winter seasons of 2015 and 2016 to investigate the response of three bread wheat (Triticum aestivum L.) cultivars (Ibaa99, Abu-Ghraib3 and Buhooth22) to the frequency of spraying with biofertilizer (EM-1) (one time at tillering stage, twice at tillering and stem elongation stages and three times at tillering, stem elongation and booting stages) in addition to the control (without spraying), to the increase of grain yield. Randomized complete block design (RCBD), in split plots arrangement and four replications, was used. Spraying treatments were placed as main p
... Show Moremenopause is the most common cause of accelerated bone loss in women. Omentin-1 is secreted by the visceral adipose tissue and it isdonated in the regulation of bone metabolism in postmenopausal women which is related with decreased bone mineral density. The current study aims to investigate the role of serum omentin-1and some bone metabolism markers in osteoporosis among postmenopausal Iraqi women. This study was performedin the Rheumatology and Rehabilitation Unit, Baghdad Teaching Hospital/ Baghdad medical city, during the period from November 2019 to July 2020 with a total of 60 postmenopausal women(30 with osteoporosis and 30 without osteoporosis), their ages ranged from 52 to 62 years. They were compared with 30 healthy premenopausal
... Show MoreSeveral new derivatives of 1, 2, 4-triazoles linked to phthalimide moiety were synthesized through following multisteps. The first step involved preparation of 2, 2-diphthalimidyl ethanoic acid [2] via reaction of two moles of phthalimide with dichloroacetic acid. Treatment of the resulted imide with ethanol in the second step afforded 2, 2-diphthalimidyl ester [3] which inturn was introduced in reaction with hydrazine hydrate in the third step, producing the corresponding hydrazide derivative [4]. The synthesized hydazide was introduced in different synthetic paths including treatment with carbon disulfide in alkaline solution then with hydrazine hydrate to afford the new 1, 2, 4-triazole [10]. Reaction of compound [10] with different alde
... Show MoreAbstract New derivatives of 1,2,4- triazole , 1,2,4-triazole -3-one and 1,2,4-triazole-3-thione were obtained through this research. Acid hydrazide derivative was present from reaction of poly acryloyl chloride with hydrazine hydrate in presence of DMF as a solvent then reacted with benzonitrile and its derivatives to give 1,2,4-triazole derivatives. After that reaction of poly acryloyl chloride with semicarbazide and semithiocarbazide to form semicarbazone and semithiocarbazone derivatives respectively. Finally, closing of semicarbazone and semithiocarbazone derivatives with 2% NaOH gave 1,2,4-triazole -3-one and 1,2,4-triazole-4-thione derivatives respectively. These new synthesized products have been characterized by infrared, 1 H-n
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreRecently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreIn this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show More