This paper proposes a novel meta-heuristic optimization algorithm called the fine-tuning meta-heuristic algorithm (FTMA) for solving global optimization problems. In this algorithm, the solutions are fine-tuned using the fundamental steps in meta-heuristic optimization, namely, exploration, exploitation, and randomization, in such a way that if one step improves the solution, then it is unnecessary to execute the remaining steps. The performance of the proposed FTMA has been compared with that of five other optimization algorithms over ten benchmark test functions. Nine of them are well-known and already exist in the literature, while the tenth one is proposed by the authors and introduced in this article. One test trial was shown to check the performance of each algorithm, and the other test for 30 trials to measure the statistical results of the performance of the proposed algorithm against the others. Results confirm that the proposed FTMA global optimization algorithm has a competing performance in comparison with its counterparts in terms of speed and evading the local minima.
With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreThis study revolves around the rapid changes of science and a comparison of the formal and practical aspects and the reason behind summoning the changes and their types, which are subject to the influence of the recipient. This transformation represents formal and intellectual production cycles and formal functional generation that is subject to the goals of the system of multiple differences at the level of time and place. It meets the needs and the request for change, but access to it comes through multiple systems and portals that are different from the normal and the usual, so this study was called (meta and its dimensions in the designed biological formation (virtual reality environment - a model). The research seeks to find solutio
... Show Moreمع ان افلاطون في الفصلين السابع والعاشر من جمهوريته يعري المسرح بوصفه عالما زائفا يعج بالأخيلة التي يتوجب على المرء ان ينبذها ويتمسك بعالم الحقيقة، الا إن هذا لا يعدم الأثر البالغ الذي تركتهُ أرائهُ على المسرح، قديمهُ وحديثهُ،تجربهً وتنظيرا .إن حكايته الإستعارية للكهف ،والتي تعد مسرحةً للأفكارِ، إن هي إلا وسيلة ينفذ من خلالها الى جوهر المسرح. لذا فان مسرحية ونظرية الكهف قد اصبحت حجر الزاوية في ما قد اص
... Show MoreThe current study aims to identify:The meta-motivation and Uniqueness seeking of the study sample. The correlated relationship among them. The present study sample consists of (400) students from the colleges of engineering, University of Baghdad, and the University of Technology in the academic year (2019-2020), and the researcher has adopted the Chen Scale (1995)to measure the meta-motivation after its translation into Arabic by(Al-Samawi,2011).The scale includes six dimensions. The researcher has also adopted the Snyder&Fromkin scale (1980) to measure the uniqueness seeking after translating and adapting it into the Arabic environment. The scale consists of three dimensions. The results show that students of the Facult
... Show MoreThe achievement of world peace is a humanitarian demand that humanity has sought since its existence. Despite the international and regional efforts to achieve this demand, it is still reaching its desired ambitions if conflicts, contradictions, and internal and external wars continue to justify us clearly in terms of ethnic, religious and sectarian conflict. The revolution of informatics and the impact of globalization opened a new era of communication and openness and the negative and positive impact of others, which re-published and distributed values, ideas and new cultures Some of them carries extremist ideas urging violence and destruction and other abolition, it became necessary to follow policies and reward The culture of peace,
... Show MorePluripotent stem cells (PSC) possess unlimited proliferation, self-renewal, and a differentiation capacity spanning all germ layers. Appropriate culture conditions are important for the maintenance of self-renewal, pluripotency, proliferation, differentiation, and epigenetic states. Oxygen concentrations vary across different human tissues depending on precise cell location and proximity to vascularisation. The bulk of PSC culture-based research is performed in a physiologically hyperoxic, air oxygen (21% O2) environment, with numerous reports now detailing the impact of a physiologic normoxia (physoxia), low oxygen culture in the maintenance of stemness, survival, morphology, proliferation, differentiation potential, and epigenetic
... Show MoreThis research aims at calculating the optimum cutting condition for various types of machining methods, assisted by computers, (the computer program in this research is designed to solve linear programs; the program is written in v. basic language). The program obtains the results automatically, this occur through entering the preliminary information about the work piece and the operating condition, the program makes the calculation actually by solving a group of experimental relations, depending on the type of machining method (turning, milling, drilling). The program was transferred to package and group of windows to facilitate the use; it will automatically print the initial input and optimal solution, and thus reduce the effort and t
... Show MoreMost Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mo
... Show More