In this paper, a compact genetic algorithm (CGA) is enhanced by integrating its selection strategy with a steepest descent algorithm (SDA) as a local search method to give I-CGA-SDA. This system is an attempt to avoid the large CPU time and computational complexity of the standard genetic algorithm. Here, CGA dramatically reduces the number of bits required to store the population and has a faster convergence. Consequently, this integrated system is used to optimize the maximum likelihood function lnL(φ1, θ1) of the mixed model. Simulation results based on MSE were compared with those obtained from the SDA and showed that the hybrid genetic algorithm (HGA) and I-CGA-SDA can give a good estimator of (φ1, θ1) for the ARMA(1,1) model. Anot
... Show MoreBackground: Polymer surfaces usually present problems in bonding and finishing due to their low hydrophilicity. The aim of this study is to investigate the effect of plasma treatment with the use of two types of gases (oxygen and argon) on surface roughness, and chemical surface properties of acrylic resin denture base polymer material. Materials and Methods: Three heat cured acrylic resin specimens of (2*8*30 mm) dimensions were prepared for each test carried out in this study. Two tests were conducted, surface roughness test and chemical surface analysis test. Results: Application of plasma treatment increased surface roughness for both oxygen and argon plasma treated acrylic resin specimen groups compared with control untreated group,
... Show MoreThis work concerns the thermal and sound insulation as well as the mechanical properties of polymer matrix composite reinforced with glass fibers. These fibers may have dangerous effect during handling, for example the glass fibers might cause some damage to the eyes, lungs and even skin. For this reason the present work, investigates the behavior of polymer composite reinforced with natural fibers (Plant fibers) as replacement to glass fibers. Unsaturated Polyester resin was used as matrix material reinforced with two types of fibers, one of them is artificial (Glass fibers) and the other type is natural (Jute, Fronds Palm and Reed Fibers) by hand lay-up technique. All fibers are untreated with any chemical solvent. The Percentage of mi
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More