Metaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory characteristics and memory in SI-based metaheuristics. The latest information and references have been further analyzed to extract key information and mapped into respective subsections. A total of 50 references related to memory usage studies from 2003 to 2018 have been investigated and show that the usage of memory is extremely necessary to increase effectiveness of metaheuristics by taking the advantages from their previous successful experiences. Therefore, in advanced metaheuristics, memory is considered as one of the fundamental elements of an efficient metaheuristic. Issues in memory usage have also been highlighted. The results of this review are beneficial to the researchers in developing efficient metaheuristics, by taking into consideration the usage of memory.
The budget represents a critical accounting tool used for planning and control. It is considered a measure of the results expected to occur.
This study aims to identify the impact of the Kaizen Budget in reducing costs and continuous improvement on the General Company's operations for Light Industries. The research idea is based on the fact that preparing the budget based on constant improvement supports the higher management of people, processes, materials, and production methods, thus enabling them to manage and reduce their costs.
Research results that the prepared budget suffers from many shortages that limit the materials' usefulness for management
These days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that. The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the proce
... Show MoreIn the present work experiments were conducted to study the effect of solid loading (1,5 and 9 vol.%) on the enhancement of carbon dioxide absorption in bubble column at various volumetric gas flow rate (0.75, 1 and 1.5 m3/h) and absorbent concentration (caustic soda)( 0.1,0.5 and 1 M ). Activated carbon and alumina oxide (Al2O3) are used as solid particles. The Danckwerts method was used to calculate interfacial area and individual mass transfer coefficients during absorption of carbon dioxide in a bubble column. The results show that the absorption rate was increased with increasing volumetric gas flow rate, caustic soda concentration and solid loading. Mass transfer coefficient and interfac
... Show MoreIn this study, an unknown force function dependent on the space in the wave equation is investigated. Numerically wave equation splitting in two parts, part one using the finite-difference method (FDM). Part two using separating variables method. This is the continuation and changing technique for solving inverse problem part in (1,2). Instead, the boundary element method (BEM) in (1,2), the finite-difference method (FDM) has applied. Boundary data are in the role of overdetermination data. The second part of the problem is inverse and ill-posed, since small errors in the extra boundary data cause errors in the force solution. Zeroth order of Tikhonov regularization, and several parameters of regularization are employed to decrease error
... Show MoreA field Experiment was carried out in Baghdad for the purpose of compare five horticulture machines during used two types of fuel deffirance in octane number, normal and super fuel which produced in Iraqi and measuring the vibrations transmitted of the three axes are longitudinal X , lateral Y and vertical Z from handlebar in (Mowers) to the operator which walks behind the mower, and the determine of the productivity practical of cutting, productivity passing and fuel consumption. Experiment Factorial used with two factors, The first factor was Five Mowers vary in width , types, weight and company manufacturer, The Second factor was the types of fuel used internal combination engine horticulture mowers were Normal fuel with Octane Number 82
... Show MoreIn this research a recent developed practical modeling technique is applied for the glucose regulation system identification. By using this technique a set of mathematical models is obtained instead of single one to compensate for the loss of information caused by the optimization technique in curve fitting algorithms, the diversity of members inside the single set is interpreted in term of restricted range of its parameters, also a diagnosis criteria is developed for detecting any disorder in the glucose regulation system by investigating the influence of variation of the parameters on the response of the system, this technique is applied in this research practically for 20 cases with association of National Center for
... Show MoreThe treasury bills one internal government debt instruments in iraq that were used to finance temporary deficits in the government budget, There fore the government resorted to issuing for the purpose of providing liquidity, As well as to invest in productive progects, After that it was financing the budget deficit by the monetary authovity of the central baalpennek [the new cash velease] which led to negative effects on the Iraqi econome, Thus we find that the treasury transfers have formed alarge proportion of the gross domestic government debt to finance the deficit ayear ago 2003. &nbs
... Show MoreMarriage is considered one of the strongest ties that links between two human beings , but after the evolutions that happened in our Arab communities and specifically in the Iraqi community , marriage through the internet websites appeared . this kind of marriage is considered one of the new phenomena that appeared in the present time in many societies. That was through internet websites like yahoo , Facebook and other websites that have chat features.
The Islamic sharia looks negatively at marriage through the internet announcing that this way is harmful for both the man and the woman
The researcher highlighted the general budget in Iraq for the period (2003-2018) facing the challenges of administrative and financial corruption, in addition to the fluctuations in oil prices, the repercussions and many problems suffered and will suffer the Iraqi government in the process of preparing the general budget of the state and weak contribution of the agricultural and industrial sectors and other economic sectors and neglect altogether, oil has become the main supplier in funding Iraq's budget after 2003, and the impact on the unemployment rates in Iraq, which recorded fluctuating rates and then increased during the period (2012-2018) to achieve this, an inductive method was adopted, using theoretical and descriptive a
... Show MoreDirectional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show More