Preferred Language
Articles
/
jeasiq-1597
A Novel Invasive Weed Optimization Algorithm (IWO) by Whale Optimization Algorithm(WOA) to solve Large Scale Optimization Problems
...Show More Authors

Abstract  

  In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invasive Weed Optimization Algorithm (IWO), as for the Whale Optimization Algorithm (WOA) uses the intelligence of the swarms to reach the goal and achieve the best solution, which simulates the unique hunting behavior of humpback whales, which is called fishing by bubble trap hunting by creating distinctive bubbles along a circle or a path in the form of 9 has appeared for the first time in 2016 by Mirjalili and Lewis. In order to benefit from the intelligence of the flocks and to avoid falling into local solutions, the new hybridization between the IWO and WOA algorithm was proposed to launch the new hybrid algorithm (IWOWOA). The new hybrid algorithm (IWOWOA) was applied on 23 functions of large scale optimization problems, The proposed algorithm showed very high efficiency in solving these functions. The proposed algorithm was able to reach the optimal solutions by achieving the minimum value of most of these functions. This algorithm was compared with the basic algorithms IWO, WOA and two algorithms that follow the swarm system these algorithms are particle swarm optimization (PSO) and chicken swarm optimization (CSO) [7], they have been statistically tested by calculating the mean arithmetic μ and standard deviation σ for these functions.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
A consensus on measurement
...Show More Authors

Many letters and theses written on the subject of consensus, as well as in measurement,
But we tried to address a topic of consensus

Building a blind measuring guide.
 We have tried to explain the meaning of convening, then the statement of consensus in language and terminology and then the statement of measurement
Also, we have shown the types of consensus mentioned by the jurists, and this is how much was in the first topic, either
The second section included the statement of the doctrines of the blind in the matter, and then the evidence of each doctrine and discussed.
We followed it with the most correct opinion statement and concluded the research with some of the conclusions we reached through
search.

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Scienceasia
A combined compact genetic algorithm and local search method for optimizing the ARMA(1,1) model of a likelihood estimator
...Show More Authors

In this paper, a compact genetic algorithm (CGA) is enhanced by integrating its selection strategy with a steepest descent algorithm (SDA) as a local search method to give I-CGA-SDA. This system is an attempt to avoid the large CPU time and computational complexity of the standard genetic algorithm. Here, CGA dramatically reduces the number of bits required to store the population and has a faster convergence. Consequently, this integrated system is used to optimize the maximum likelihood function lnL(φ1, θ1) of the mixed model. Simulation results based on MSE were compared with those obtained from the SDA and showed that the hybrid genetic algorithm (HGA) and I-CGA-SDA can give a good estimator of (φ1, θ1) for the ARMA(1,1) model. Anot

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The added value of the knowledge assets using a scale (VAIC) in a sample of the industrial sector companies
...Show More Authors

The sustainable competitive advantage for organizations is one of the requirements for value creation, which centered on the possession of scarce resources that achieve maximum flows to invest in intellectual capital, if what has been interest in them, measured and employed the way properly and style, so I figured the need for new technologies to enable organizations to measure the intellectual and physical assets and to assess its performance accordingly, so it sheds search light on the measurement of the added value of existing knowledge using the standard value-added factor is the intellectual (value added intellectual coefficient) (VAIC) and to develop a set of assumptions about the extent of the difference between the sample

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Large-Coessential and Large-Coclosed Submodules
...Show More Authors

The goal of this research is to introduce the concepts of Large-coessential submodule and Large-coclosed submodule, for which some properties are also considered. Let M  be an R-module and K, N are submodules of M such that , then K is said to be Large-coessential submodule, if . A submodule N of M is called Large-coclosed submodule, if K is Large-coessential submodule of N in M, for some submodule K of N, implies that  .

Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
...Show More Authors

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Aip Conference Proceedings
Application of simulated annealing to solve multi-objectives for aggregate production planning
...Show More Authors

Aggregate production planning (APP) is one of the most significant and complicated problems in production planning and aim to set overall production levels for each product category to meet fluctuating or uncertain demand in future. and to set decision concerning hiring, firing, overtime, subcontract, carrying inventory level. In this paper, we present a simulated annealing (SA) for multi-objective linear programming to solve APP. SA is considered to be a good tool for imprecise optimization problems. The proposed model minimizes total production and workforce costs. In this study, the proposed SA is compared with particle swarm optimization (PSO). The results show that the proposed SA is effective in reducing total production costs and req

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
ESTIMATION OF COEFFICIENTS AND SCALE PARAMETER FOR LINEAR (TYPE 1) EXTREME VALUE REGRESSION MODEL FOR LARGEST VALUES WITH APPLICATIONS
...Show More Authors

In this paper we estimate the coefficients and scale parameter in linear regression model depending on the residuals are of type 1 of extreme  value distribution for the largest values . This can be regard as an improvement for the studies with the smallest values . We study two estimation methods ( OLS  & MLE ) where we resort to Newton – Raphson (NR) and Fisher Scoring methods to get MLE estimate because the difficulty of using the usual approach with MLE . The relative efficiency criterion is considered beside to the statistical inference procedures for the extreme value regression model of type 1 for largest values . Confidence interval , hypothesis testing for both scale parameter and regression coefficients

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 05 2017
Journal Name
International Journal Of Science And Research (ijsr)
Automatic brain tumor segmentation from MRI images using region growing algorithm
...Show More Authors

LK Abood, RA Ali, M Maliki, International Journal of Science and Research, 2015 - Cited by 2

View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing

... Show More
View Publication