This research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-factor model. The results show that the dragonfly algorithm, particularly when using MPT and APT, demonstrates superior performance in improving the accuracy of Fama-MacBeth estimates and enhancing the effectiveness of the KWR approach.
Various simple and complicated models have been utilized to simulate the stress-strain behavior of the soil. These models are used in Finite Element Modeling (FEM) for geotechnical engineering applications and analysis of dynamic soil-structure interaction problems. These models either can't adequately describe some features, such as the strain-softening of dense sand, or they require several parameters that are difficult to gather by conventional laboratory testing. Furthermore, soils are not completely linearly elastic and perfectly plastic for the whole range of loads. Soil behavior is quite difficult to comprehend and exhibits a variety of behaviors under various circumstances. As a result, a more realistic constitutive model is
... Show MoreVarious simple and complicated models have been utilized to simulate the stress-strain behavior of the soil. These models are used in Finite Element Modeling (FEM) for geotechnical engineering applications and analysis of dynamic soil-structure interaction problems. These models either can't adequately describe some features, such as the strain-softening of dense sand, or they require several parameters that are difficult to gather by conventional laboratory testing. Furthermore, soils are not completely linearly elastic and perfectly plastic for the whole range of loads. Soil behavior is quite difficult to comprehend and exhibits a variety of behaviors under various circumstances. As a result, a more realistic constitutive model is
... Show MoreThe Estimation Of The Reliability Function Depends On The Accuracy Of The Data Used To Estimate The Parameters Of The Probability distribution, and Because Some Data Suffer from a Skew in their Data to Estimate the Parameters and Calculate the Reliability Function in light of the Presence of Some Skew in the Data, there must be a Distribution that has flexibility in dealing with that Data. As in the data of Diyala Company for Electrical Industries, as it was observed that there was a positive twisting in the data collected from the Power and Machinery Department, which required distribution that deals with those data and searches for methods that accommodate this problem and lead to accurate estimates of the reliability function,
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreA New developed technique to estimate the necessary six elastic constants of homogeneous laminate of special orthotropic properties are presented in this paper for the first time. The new approach utilizes the elasto-static deflection behavior of composite cantilever beam employing the famous theory of Timoshenko. Three extracted strips of the composite plate are tested for measuring the bending deflection at two locations. Each strip is associated to a preferred principal axis and the deflection is measured in two orthogonal planes of the beam domain. A total of five trails of testing is accomplished and the numerical results of the stiffness coefficients are evaluated correctly under the contribution of the macromechanic
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThis paper proposes a better solution for EEG-based brain language signals classification, it is using machine learning and optimization algorithms. This project aims to replace the brain signal classification for language processing tasks by achieving the higher accuracy and speed process. Features extraction is performed using a modified Discrete Wavelet Transform (DWT) in this study which increases the capability of capturing signal characteristics appropriately by decomposing EEG signals into significant frequency components. A Gray Wolf Optimization (GWO) algorithm method is applied to improve the results and select the optimal features which achieves more accurate results by selecting impactful features with maximum relevance
... Show MoreWind energy is considered one of the most important sources of renewable energy in the world, because it contributes to reducing the negative effects on the environment. The most important types of wind turbines are horizontal and vertical axis wind turbines. This work presents the full details of design for vertical axis wind turbine (VAWT) and how to find the optimal values of necessary factors. Additionally, the results shed light on the efficiency and performance of the VAWT under different working conditions. It was taken into consideration the variety of surrounding environmental conditions (such as density and viscosity of fluid, number of elements of the blade, etc.) to simulate the working of vertical wind turbines under di
... Show More