A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including several CEC 2005 test problems and it shows reliability in most of the test cases.
The present study was carried out to determine the bacterial isolates and study their antimicrobial susceptibility in case of burned wound infections. 70 burn wound swabs were taken from patients, who presented invasive burn wound infection from both sex and average age of 3-58 years, admitted to teaching medical Al- Kendi hospital from October 2007 to June 2008. Pseudomonas aeruginosa was found to be the most common isolate (48.9%) followed by Staphylococcus aureus (24.4%), Citrobacter braakii (13.3%), Enterobacter spp. (11.1%), Coagulase-negative Staphylococci (11.1%), Proteus vulgaris (6.66%), Corynebacterium spp. (6.66%), Micrococcus (6.66%), Proteus mirabilis (4.44%), Enterococcus faecalis (4.44%), E.coli (4.44%), Klebsiella spp. (2.22
... Show MoreThe main purpose of this paper, is to characterize new admissible classes of linear operator in terms of seven-parameter Mittag-Leffler function, and discuss sufficient conditions in order to achieve certain third-order differential subordination and superordination results. In addition, some linked sandwich theorems involving these classes had been obtained.
This paper deals with the thirteenth order differential equations linear and nonlinear in boundary value problems by using the Modified Adomian Decomposition Method (MADM), the analytical results of the equations have been obtained in terms of convergent series with easily computable components. Two numerical examples results show that this method is a promising and powerful tool for solving this problems.
The real and imaginary part of complex dielectric constant for InAs(001) by adsorption of oxsagen atoms has been calculated, using numerical analysis method (non-linear least square fitting). As a result a mathematical model built-up and the final result show a fairly good agreement with other genuine published works.
In this paper, we consider inequalities in which the function is an element of n-th partially order space. Local and Global uniqueness theorem of solutions of the n-the order Partial differential equation Obtained which are applications of Gronwall's inequalities.
Oscillation criteria are obtained for all solutions of the first-order linear delay differential equations with positive and negative coefficients where we established some sufficient conditions so that every solution of (1.1) oscillate. This paper generalized the results in [11]. Some examples are considered to illustrate our main results.
We present a reliable algorithm for solving, homogeneous or inhomogeneous, nonlinear ordinary delay differential equations with initial conditions. The form of the solution is calculated as a series with easily computable components. Four examples are considered for the numerical illustrations of this method. The results reveal that the semi analytic iterative method (SAIM) is very effective, simple and very close to the exact solution demonstrate reliability and efficiency of this method for such problems.
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show More