A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including several CEC 2005 test problems and it shows reliability in most of the test cases.
Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pr
... Show MorePrediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pressur
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreThis research shows the problem of the economic development of underdeveloped countries in an unconventional way, as these papers explain the problems of the economic development. This research not only reviews the problems, but it illustrates them in a philosophical way, basis of the data of modernity, this mean it is a process of connecting between the absence of the modernity values and the failure of development in underdeveloped countries. The Search follows the descriptive approach to get to the goal of search by four main axes. The first axis includes clarifying modernity and its principles, the second axis includes clarifying the economic development , the third axis includes the features of the mod
... Show MoreIn the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
Take the teacher's key position in the educational system as a foundation stone and primarily responsible for achieving the goals of Education , and efficient teacher conscious is the teacher who prepared educationally and specialized training well add to the enjoyment of a range of features that enable them to adjust and compatibility with educational developments
Hence the problem of the study questioning the Kindergarten Does teacher professional awareness that enable it to perform its work learned from experienceThe research sought to measure
1-Professional awareness among teacher Kindergarten
2-Professional awareness of Kindergarten parameters depending on the type of kindergarten.
Limited search parameters Riyadh govern
It is clear that correct application of antibiotic prophylaxis can reduce the incidence of infection resulting from the bacterial inoculation in a variety of clinical situations; it cannot prevent all infections any more than it can eliminate all established infections. Optimum antibiotic prophylaxis depends on: rational selection of the drug(s), adequate concentrations of the drug in the tissues that are at risk, and attention to timing of administration. Moreover, the risk of infection in some situations does not outweigh the risks which attend the administration of even the safest antibiotic drug. The aim of this study was to comp
... Show More<p>The popularity, great influence and huge importance made wireless indoor localization has a unique touch, as well its wide successful on positioning and tracking systems for both human and assists also contributing to take the lead from outdoor systems in the scope of the recent research works. In this work, we will attempt to provide a survey of the existing indoor positioning solutions and attempt to classify different its techniques and systems. Five typical location predication approaches (triangulation, fingerprinting, proximity, vision analysis and trilateration) are considered here in order to analysis and provide the reader a review of the recent advances in wireless indoor localization techniques and systems to hav
... Show MoreIt is clear that correct application of antibiotic prophylaxis can reduce the incidence of infection resulting from the bacterial inoculation in a variety of clinical situations; it cannot prevent all infections any more than it can eliminate all established infections. Optimum antibiotic prophylaxis depends on: rational selection of the drug(s), adequate concentrations of the drug in the tissues that are at risk, and attention to timing of administration. Moreover, the risk of
... Show More