A Strength Pareto Evolutionary Algorithm 2 (SPEA 2) approach for solving the multi-objective Environmental / Economic Power Dispatch (EEPD) problem is presented in this paper. In the past fuel cost consumption minimization was the aim (a single objective function) of economic power dispatch problem. Since the clean air act amendments have been applied to reduce SO2 and NOX emissions from power plants, the utilities change their strategies in order to reduce pollution and atmospheric emission as well, adding emission minimization as other objective function made economic power dispatch (EPD) a multi-objective problem having conflicting objectives. SPEA2 is the improved version of SPEA with better fitness assignment, density estimation, and modified archive truncation. In addition fuzzy set theory is employed to extract the best compromise solution. Several optimization run of the proposed method are carried out on 3-units system and 6-units standard IEEE 30-bus test system. The results demonstrate the capabilities of the proposed method to generate well-distributed Pareto-optimal non-dominated feasible solutions in single run. The comparison with other multi-objective methods demonstrates the superiority of the proposed method.
Objectives: Successful endodontic treatment outcome requires effective shaping and cleaning of root canals. This study aims to evaluate the smear layer removal after continuous chelation (CC) ) NaOCL\HEDP( and sequential chelation (SC) )NaOCL\EDTA( and their influence on the push-out bond strength (POBS) of Bio-C sealer. Materials and Methods: Palatal roots of the maxillary first molar (n=72) were divided into four groups (n=18) as follows: 3% NaOCL, SC: 3% NaOCL followed by 17% EDTA, CC: 3% NaOCL \9% HEDP and Distilled water. Thirty-two roots (n=8/group) were split longitudinally for smear layer evaluation using SEM. Forty roots were obturated with Guttapercha and Bio-C sealer using a single cone technique. Thre
... Show MoreThe study aims to identify the effectiveness of a structural theory-based training program in enhancing the teaching practices of Arabic language teachers teaching grade ten in South Al Batinah in Sultanate of Oman. The study used the quasi-experimental design, and the sample consisted of 40 male and female teachers. To achieve the objectives of the study, a training program, an observation form and a measurement tool of teachers’ tendencies towards a structural teaching were made. The program was implemented with an experimental group of 20 female and male teachers in the first semester of the academic year 2018/2019. The study has found that there is a statistically significant difference between the average grades before and after i
... Show MoreThis research aims to find out the impact on the receptive style according to the specimen in the collection of material Brawner and retention as students at the Arabic Department at the Faculty of Education for Girls. For confirmation from the goal of the research, the researcher placed two hypotheses, one to two for collections and one for pods. - chosen as the College of Education for Girls / Department of Arabic language for the application of choice Intentionally search experience for reasons of researcher he is teaching them and thus ensures cooperation of teachers and students in them. - selected Division (b) of the fourth grade students of the Arabic language section at random to represent the experimental group, while the Division
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB
... Show More
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show More