This paper proposes a novel meta-heuristic optimization algorithm called the fine-tuning meta-heuristic algorithm (FTMA) for solving global optimization problems. In this algorithm, the solutions are fine-tuned using the fundamental steps in meta-heuristic optimization, namely, exploration, exploitation, and randomization, in such a way that if one step improves the solution, then it is unnecessary to execute the remaining steps. The performance of the proposed FTMA has been compared with that of five other optimization algorithms over ten benchmark test functions. Nine of them are well-known and already exist in the literature, while the tenth one is proposed by the authors and introduced in this article. One test trial was shown to check the performance of each algorithm, and the other test for 30 trials to measure the statistical results of the performance of the proposed algorithm against the others. Results confirm that the proposed FTMA global optimization algorithm has a competing performance in comparison with its counterparts in terms of speed and evading the local minima.
Most Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mo
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MorePluripotent stem cells (PSC) possess unlimited proliferation, self-renewal, and a differentiation capacity spanning all germ layers. Appropriate culture conditions are important for the maintenance of self-renewal, pluripotency, proliferation, differentiation, and epigenetic states. Oxygen concentrations vary across different human tissues depending on precise cell location and proximity to vascularisation. The bulk of PSC culture-based research is performed in a physiologically hyperoxic, air oxygen (21% O2) environment, with numerous reports now detailing the impact of a physiologic normoxia (physoxia), low oxygen culture in the maintenance of stemness, survival, morphology, proliferation, differentiation potential, and epigenetic
... Show MoreThe achievement of world peace is a humanitarian demand that humanity has sought since its existence. Despite the international and regional efforts to achieve this demand, it is still reaching its desired ambitions if conflicts, contradictions, and internal and external wars continue to justify us clearly in terms of ethnic, religious and sectarian conflict. The revolution of informatics and the impact of globalization opened a new era of communication and openness and the negative and positive impact of others, which re-published and distributed values, ideas and new cultures Some of them carries extremist ideas urging violence and destruction and other abolition, it became necessary to follow policies and reward The culture of peace,
... Show MoreA cumulative review with a systematic approach aimed to provide a comparison of studies’ investigating the possible impact of the active form of vitamin D3, calcitriol (CTL), on the tooth movement caused by orthodontic forces (OTM) by evaluating the quality of evidence, based on collating current data from animal model studies, in vivo cell culture studies, and human clinical trials. Methods: A strict systematic review protocol was applied following the application of the International Prospective Register of Systematic Reviews (PROSPERO). A structured search strategy, including main keywords, was defined during detailed search with the application of electronic database systems: Medline/Pubmed, EMBASE, Scopus, Web of Science, and
... Show MoreThe performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to resul
... Show More