A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including several CEC 2005 test problems and it shows reliability in most of the test cases.
The presence of hydrocarbons in the soil is considered one of the main problems of pollution. In our current study, eight samples isolated from soil saturated with hydrocarbons were taken from different areas of Baghdad, Iraq. In this study, 5 isolates belonging to Pseudomonas aeruginosa by 99%, 4 isolates to Klebsiella pneumoniae by 98%, and 3 isolates to Enterobacter hormaechei by 97% were diagnosed in different ways. A molecular examination was also conducted by 16sRNA. We recorded P. aeruginosa, K. Pneumoniae and E. hormaechei as new local isolates in NCBI. In addition, a comparison was made between our isolates and the global isolates to determine the degree of convergence in the evolutionary line. The genes alkB and nahAc7 were diagno
... Show MoreBacterial contamination of AL-Habania reservoir was studied during the period from February 2005 to January 2006; samples were collected from four stations (AL-Warrar, AL-Theban regulator, middle of the reservoir and the fourth was towards AL-Razzaza reservoir). Coliform bacteria, faecal Coliforms, Streptococci, and faecal Streptococci were used as parameters of bacterial contamination in waters through calculating the most probable number. Highest count of Coliform bacteria (1500 cell/100ml) was recorded at AL-Razaza during August, and the lowest count was less than (300 cell/100ml) in the rest of the collection stations for all months. Fecal Coliform bacteria ranged between less than 300 cells/100ml in all stations for all months to 700 c
... Show MoreThe present study was identified the type of bacterial contamination of Iraqi banknotes currency (Iraqi dinars) in circulation. 68 Iraqi banknotes currency of different denominations samples were randomly gathered from different locations and different occupational groups in Baghdad city. The results showed 61 (89.70%) of the samples were determined to be contaminated with bacteria, whereas 7 (10.29%) were confirmed to be sterile. A total of 11 different species of bacteria resulting in 72 isolates were found from those 61 contaminated Iraqi banknotes currency. Based on culture, morphological and biochemical tests, 11 isolates were identified as Bacillus sp., Staphylococcus aureus, Staphylococcus epidermidis, Corynebacterium diphtheria, Leu
... Show MoreThis study was conducted to examine the discharge capacity of the reach of the Tigris River between Kut and Amarah Barrages of 250km in length. The examination includes simulation the current capacity of the reach by using HEC-RAS model. 247cross sections surveyed in 2012 were used in the simulation. The model was calibrated using observed discharges of 533, 800, 1025 and 3000m3/s discharged at Kut Barrage during 2013, 1995, 1995 and 1988, respectively, and its related water level at three gauge stations located along the reach. The result of calibration process indicated that the lowest Root Mean Square Error of 0.095 can be obtained when using Manning’s n coefficient of 0.026, 0.03 for th
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreIn the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial
... Show MorePsychological damage is one of the damages that can be compensated under the fault of negligence in the framework of English law, where the latter intends to include an enumeration of civil errors on the basis of which liability can be determined, and aims under each of these errors to protect a specific interest (for example, defamation protects Among the damage to reputation and inconvenience are the rights contained on the land), and the same is true for the rest of the other errors. Compensation for psychological damage resulting from negligence has raised problems in cases where the psychological injury is "pure", that is, those that are not accompanied by a physical injury, which required subjecting them to special requirements by the
... Show MoreBackground: Piezosurgery improved the split approach by making it safer, easier, and less prone to complications when treating extremely atrophic crests. Densah drills, with their unique design, expand the ridge by densifying bone in a reverse, non-cutting mode. Objective: To assess the effectiveness of sagittal piezosurgery, which involves cutting bone to the full implant depth and then expanding it using osseodensification drills. We use this technique to expand narrow alveolar bones and simultaneously place dental implants in the maxillary and mandibular arches. Methods: Fourteen patients received 31 dental implants. The maxillary arch received 19, and the mandible received 12 dental implants. This study will include patients who
... Show More