Most heuristic search method's performances are dependent on parameter choices. These parameter settings govern how new candidate solutions are generated and then applied by the algorithm. They essentially play a key role in determining the quality of the solution obtained and the efficiency of the search. Their fine-tuning techniques are still an on-going research area. Differential Evolution (DE) algorithm is a very powerful optimization method and has become popular in many fields. Based on the prolonged research work on DE, it is now arguably one of the most outstanding stochastic optimization algorithms for real-parameter optimization. One reason for its popularity is its widely appreciated property of having only a small number of parameters to tune. This paper presents a detailed review of DE parameter tuning with a table compromised a recommended guidelines for these parameters, along with a full description of the basic DE algorithm and its corresponding operators, overlooked by previous studies. It is aimed at practitioners to help them achieve better results when adopting DE as an optimization method for their problems with less time and effort. Moreover, an experimental study has been conducted over fifteen test problems and the results obtained prove the reliability of the setting values.
in this paper fourth order kutta method has been used to find the numerical solution for different types of first liner
In this paper, the author established some new integral conditions for the oscillation of all solutions of nonlinear first order neutral delay differential equations. Examples are inserted to illustrate the results.
This paper is concerned with the oscillation of all solutions of the n-th order delay differential equation . The necessary and sufficient conditions for oscillatory solutions are obtained and other conditions for nonoscillatory solution to converge to zero are established.
One of the most important problems in the statistical inference is estimating parameters and Reliability parameter and also interval estimation , and testing hypothesis . estimating two parameters of exponential distribution and also reliability parameter in a stress-strength model.
This parameter deals with estimating the scale parameter and the Location parameter µ , of two exponential distribution ,using moments estimator and maximum likelihood estimator , also we estimate the parameter R=pr(x>y), where x,y are two- parameter independent exponential random variables .
Statistical properties of this distribution and its properti
... Show MoreEducation quality evaluation is one of the objectives of education quality. The evaluation includes assessing the education standards and academic program outcomes to develop intellectual, scientific and practical concepts for the educational structure. It considers the determination of the rates of the number of accepted students and graduates. The research focuses on "what are the levels of education quality according to the evaluation mechanisms in the design department" to enhance the quality system and the objectives of theoretical and applied education.
It is identifying the levels of education quality and evaluating it according to the numbers and rates of graduate students of the design department branches for morning and ev
The wave functions of the coherent states of the charged oscillator in magnetic field are obtained via a canonical transformation. The numerical calculations of these functions are made and then the space and time plots are obtained. It was shown that these states are Gaussians distributions of widths vary periodically in an opposite way with their peaks. We interpret that is due to the mutual actions of the spreading effect of the wave packet and the reaction of the magnetic field.
With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show More