A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including several CEC 2005 test problems and it shows reliability in most of the test cases.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreStudies were conducted to screen eight sunflower (Helianthus annuus L.) genotypes for their allelopathic potential against weeds and wheat crop, which customarily follows sunflower in Iraq. All sunflower genotypes significantly inhibited the total number and biomass of companion weeds and the magnitude of inhibition was genotype dependent. Among the eight genotypes tested, Sin-Altheeb and Coupon were the most weed-suppressing cultivars, and Euroflor and Shumoos were the least. A subsequent field experiment indicated that sunflower residues incorporated into the field soil significantly inhibited the total number and biomass of weeds growing in the wheat field. Sunflower genotypes Sin-Altheeb and Coupon appeared to inhibit total weed number
... Show MoreBackground:Plant-derived compounds have action alongside Gram-positive and Gram-negative bacteria and numerous compounds, inhibit efflux pumps and hence have become known as efflux pump inhibitors. Clarithromycin is a macrolide antibiotic used to treat pharyngitis, tonsillitis, acute maxillary sinusitis and acute bacterial exacerbation of chronic bronchitis the antibacterial range is the similar as erythromycin but it is active against Mycobacterium avium complex, M.leprae and atypical mycobacteria. The in vitro antibacterial activity results of different boswellic acid compounds discovered alpha keto-boswellic acid (AKBA) to be the preponderance potent antibacterial compound alongside Gram-positive pathogens, but it showed no significant a
... Show MoreIn this work ,the modified williamos-Hall method was used to analysis the x-ray diffraction lines for powder of magnesium oxide nanoparticles (Mgo) .and for diffraction lines (111),(200),(220),(311) and (222).where by used special programs such as origin pro Lab and Get Data Graph ,to calculate the Full width at half maximum (FWHM) and integral breadth (B) to calculate the area under the curve for each of the lines of diffraction .After that , by using modified Williamson –Hall equations to determin the values of crystallite size (D),lattice strain (ε),stress( σ ) and energy (U) , where was the results are , D=17.639 nm ,ε =0.002205 , σ=0.517 and U=0.000678 respectively. And then using the scherrer method can by calculated the crystal
... Show MoreIn this paper the oscillation criterion was investigated for all solutions of the third-order half linear neutral differential equations. Some necessary and sufficient conditions are established for every solution of (a(t)[(x(t)±p(t)x(?(t) ) )^'' ]^? )^'+q(t) x^? (?(t) )=0, t?t_0, to be oscillatory. Examples are given to illustrate our main results.
Recently, the financial mathematics has been emerged to interpret and predict the underlying mechanism that generates an incident of concern. A system of differential equations can reveal a dynamical development of financial mechanism across time. Multivariate wiener process represents the stochastic term in a system of stochastic differential equations (SDE). The standard wiener process follows a Markov chain, and hence it is a martingale (kind of Markov chain), which is a good integrator. Though, the fractional Wiener process does not follow a Markov chain, hence it is not a good integrator. This problem will produce an Arbitrage (non-equilibrium in the market) in the predicted series. It is undesired property that leads to erroneous conc
... Show MoreAt the last years, the interesting of measurement spicilists was increased to study differential item functioning (DIF) wich is reflect the difference of propability true response for test item from subgroups which have equal level of ability . The aims of this research are, inform the DIFat Namers’scale(2009) for mental health to prepare students and detect items that have DIF. Sample research contants (540) students, we use Mantel- Haenzel chi-square to detect DIF. The results are point to there are (26) items have DIF according to gender which are delated form the scale after that.
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More