Preferred Language
Articles
/
YxfJNY8BVTCNdQwCZ2Li
A canonical generic algorithm for likelihood estimator of first order moving average model parameter
...Show More Authors

The increasing availability of computing power in the past two decades has been use to develop new techniques for optimizing solution of estimation problem. Today's computational capacity and the widespread availability of computers have enabled development of new generation of intelligent computing techniques, such as our interest algorithm, this paper presents one of new class of stochastic search algorithm (known as Canonical Genetic' Algorithm ‘CGA’) for optimizing the maximum likelihood function strategy is composed of three main steps: recombination, mutation, and selection. The experimental design is based on simulating the CGA with different values of are compared with those of moment method. Based on MSE value obtained from both methods

Scopus
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing

... Show More
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (21)
Crossref (10)
Scopus Crossref
Publication Date
Fri May 05 2017
Journal Name
International Journal Of Science And Research (ijsr)
Automatic brain tumor segmentation from MRI images using region growing algorithm
...Show More Authors

LK Abood, RA Ali, M Maliki, International Journal of Science and Research, 2015 - Cited by 2

View Publication
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology & Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm
...Show More Authors

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (43)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
Fitting Scoring Rubrics for Electronic Portfolio to Partial Credit Model According to the Number of Assumed Dimensions
...Show More Authors

Abstract

 

The current research aims to reveal the extent to which all scoring rubrics data for the electronic work file conform to the partial estimation model according to the number of assumed dimensions. The study sample consisted of (356) female students. The study concluded that the list with the one-dimensional assumption is more appropriate than the multi-dimensional assumption, The current research recommends preparing unified correction rules for the different methods of performance evaluation in the basic courses. It also suggests the importance of conducting studies aimed at examining the appropriateness of different evaluation methods for models of response theory to the

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
Study of the Electric Quadrupole Moments for some Scandium Isotopes Using Shell Model Calculations with Different Interactions
...Show More Authors

The electric quadrupole moments for some scandium isotopes (41, 43, 44, 45, 46, 47Sc) have been calculated using the shell model in the proton-neutron formalism. Excitations out of major shell model space were taken into account through a microscopic theory which is called core polarization effectives. The set of effective charges adopted in the theoretical calculations emerging about the core polarization effect. NushellX@MSU code was used to calculate one body density matrix (OBDM). The simple harmonic oscillator potential has been used to generate the single particle matrix elements. Our theoretical calculations for the quadrupole moments used the two types of effective interactions to obtain the best interaction compared with the exp

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 02 2011
Journal Name
Ibn Al-haithem Journal For Pure And Applied Sciences
On modified pr-test double stage shrinkage estimators for estimate the parameters of simple linear regression model
...Show More Authors

Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Calibration and verification of the hydraulic model for Blue Nile river from Roseires dam to Khartoum city
...Show More Authors

This research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing it with anothe

... Show More