Optimization is the task of minimizing or maximizing an objective function f(x) parameterized by x. A series of effective numerical optimization methods have become popular for improving the performance and efficiency of other methods characterized by high-quality solutions and high convergence speed. In recent years, there are a lot of interest in hybrid metaheuristics, where more than one method is ideally combined into one new method that has the ability to solve many problems rapidly and efficiently. The basic concept of the proposed method is based on the addition of the acceleration part of the Gravity Search Algorithm (GSA) model in the Firefly Algorithm (FA) model and creating new individuals. Some standard objective functions are used to compare the hybrid (FAGSA) method with FA and the traditional GSA to find the optimal solution. Simulation results obtained by MATLAB R2015a indicate that the hybrid algorithm has the ability to cross the local optimum limits with a faster convergence than the luminous Fireflies algorithm and the ordinary gravity search algorithm. Therefore, this paper proposes a new numerical optimization method based on integrating the properties of the two methods (luminous fireflies and gravity research). In most cases, the proposed method usually gives better results than the original methods individually.
TRIPS agreement was The first to apply protection by patents. However, this type of protection, which grants exclusive and monopoly rights to patent owners, came at the expense of developing countries which are considered rich in biodiversity and also at the expense of traditional and poor knowledge of modern technologies. The release of new plant varieties has led to the emergence of biopiracy and looting of the rights of developing countries without a license
In this work, new di-acid monomers 4, 4’-di-carboxillic-4â€-bromo-2â€, 6â€-dimethyl triphenylamine (Ma), 4, 4’- di-carboxylic -4â€-chloro-2â€, 6â€-dimethyl triphenylamine (Mb) and 4, 4’- di-carboxylic -2â€,4â€-dichloro-6â€-methyl triphenylamine (Mc) were synthesized by reaction of p-cyanobenzofluride with three different aromatic amines (4-bromo,2,6-dimethyl aniline, 4-chloro,2,6-dimethyl aniline and 2,4 dichloro, 6- methyl aniline ) via aromatic nucleophilc substitution method to form three di cyano intermediates 4, 4’-Dicyano-4â€-bromo-2â€, 6â€-dimethyl triphenylamine (Da), 4,
... Show MoreSince the beginning of this century, a new communication map has been formed that foretells to get mankind to enter into a media environment in which the media is mixed with communication, which is technically and even intellectually known as integration.
This environment and its features are no different from the environment in its natural physical incision. If the level and temperature in the physical nature is a specific issue in the natural ecological balance, the level of freedoms, especially the transfer of information and views and circulation in society is also a determinant in the extent of media balance in the world on the one hand and in each country on the other.
There is also a special environment for nature,
... Show MoreWe have focused the research problem through an assessment of the applicability of the third pillar of the decisions of the Basel Committee 11 (market discipline) or not and its impact on both the adequacy of bank capital, supervisory oversight and banking risks and the statement weaknesses commitment banking institutions and which in turn lead to the stability of the financial system as a whole. .
The research is important statement on the importance of big capital in the banking business and the attributes of a role in the absorption of losses suffered by the bank, which reflects the willin
Cryptography can be thought of as a toolbox, where potential attackers gain access to various computing resources and technologies to try to compute key values. In modern cryptography, the strength of the encryption algorithm is only determined by the size of the key. Therefore, our goal is to create a strong key value that has a minimum bit length that will be useful in light encryption. Using elliptic curve cryptography (ECC) with Rubik's cube and image density, the image colors are combined and distorted, and by using the Chaotic Logistics Map and Image Density with a secret key, the Rubik's cubes for the image are encrypted, obtaining a secure image against attacks. ECC itself is a powerful algorithm that generates a pair of p
... Show MoreTrialeurodes irakensis sp. n. is describe and illustrated from Iraq. T.vaporariorurn (westwood)
is reported and for the first time for the Iraqi fauna. A ke to species of Trialeurodes found in
Iraq is presented.