Preferred Language
Articles
/
bsj-3560
Taxonomy of Memory Usage in Swarm Intelligence-Based Metaheuristics
...Show More Authors

Metaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory characteristics and memory in SI-based metaheuristics. The latest information and references have been further analyzed to extract key information and mapped into respective subsections. A total of 50 references related to memory usage studies from 2003 to 2018 have been investigated and show that the usage of memory is extremely necessary to increase effectiveness of metaheuristics by taking the advantages from their previous successful experiences. Therefore, in advanced metaheuristics, memory is considered as one of the fundamental elements of an efficient metaheuristic. Issues in memory usage have also been highlighted. The results of this review are beneficial to the researchers in developing efficient metaheuristics, by taking into consideration the usage of memory.

Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
The Impact of Fear and Rational Appeal Scam Techniques on Individual Susceptibility
...Show More Authors

Scams remain among top cybercrime incidents happening around the world. Individuals with high susceptibility to persuasion are considered as risk-takers and prone to be scam victims. Unfortunately, limited number of research is done to investigate the relationship between appeal techniques and individuals' personality thus hindering a proper and effective campaigns that could help to raise awareness against scam. In this study, the impact of fear and rational appeal were examined as well as to identify suitable approach for individuals with high susceptibility to persuasion. To evaluate the approach, pretest and posttest surveys with 3 separate controlled laboratory experiments were conducted. This study found that rational appeal treatm

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The Evaluation of Information Security Management System in the Iraqi Commission for Computers and Informatics according to the International Standard (ISO 27001: 2013)
...Show More Authors

    The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations  dependence on computers and information technology in work and communication  with others. The international legitimacy (represented by the  International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Laser
Design and Implementation Tunable Band Pass Filter based on PCF-Air Micro-cavity FBG Fabry-Perot Resonator
...Show More Authors

A tunable band pass filter based on fiber Bragg grating sensor using an in-fiber Mach-Zender interferometer with dual micro-cavities is presented. The micro-cavity was formed by splicing together a conventional single-mode fiber and a solid core photonic crystal fiber (SCPCF) with simple arc discharge technique. Different parameters such as arc power, length of the SCPCF and the overlap gap between samples were considered to control the fabrication process. The ellipsoidal air-cavity between the two fibers forms Fabry-Perot cavity. The diffraction loss was very low due to short cavity length. Ellipsoidal shape micro-cavities were experimentally achieved parallel to the propagation axis having dimensions of (24.92 – 62.32) μm of width

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation Pore and Fracture Pressure Based on Log Data; Case Study: Mishrif Formation/Buzurgan Oilfield at Iraq
...Show More Authors

Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pr

... Show More
Crossref
Publication Date
Fri Jul 30 2021
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
EEG Motor-Imagery BCI System Based on Maximum Overlap Discrete Wavelet Transform (MODWT) and Machine learning algorithm
...Show More Authors

The ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communi

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
An Efficient Shrinkage Estimators For Generalized Inverse Rayleigh Distribution Based On Bounded And Series Stress-Strength Models
...Show More Authors
Abstract<p>In this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.</p>
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu May 05 2022
Journal Name
Karbala International Journal Of Modern Science
Nigella sativa Methanol Extract Inhibits PC-3 Cell Line Colonization, Induced Apoptosis, and Modulated LC3-based Autophagy
...Show More Authors

Nigella sativa has various pharmacological properties and has been used throughout history for a variety of reasons. However, there is limited data about the effects of N. sativa (NS) on human cancer cells. This study aimed at observing the roles of methanolic extract of N. sativa on apoptosis and autophagy pathway in the Human PC3 (prostate cancer) cell line. The cell viability was checked by MTT assay. Clonogenic assay was performed to demonstrate clonogenicity and Western blot was used to check caspase-3, TIGAR, p53, and LC3 protein expression. The results demonstrated that PC3 cell proliferation was inhibited, caspase-3 and p53 protein expression was induced, and LC3 protein expression was modulated. The clonogenic assay showed that PC3

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Nov 03 2020
Journal Name
Modern Sport
Exercises based on the phosphogenic energy system to develop the ability to perform with precision and accuracy
...Show More Authors

Each sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volle

... Show More
Crossref (1)
Crossref
Publication Date
Wed Mar 01 2017
Journal Name
Archive Of Mechanical Engineering
Using the Lid-Driven Cavity Flow to Validate Moment-Based Boundary Conditions for the Lattice Boltzmann Equation
...Show More Authors
Abstract<p>The accuracy of the Moment Method for imposing no-slip boundary conditions in the lattice Boltzmann algorithm is investigated numerically using lid-driven cavity flow. Boundary conditions are imposed directly upon the hydrodynamic moments of the lattice Boltzmann equations, rather than the distribution functions, to ensure the constraints are satisfied precisely at grid points. Both single and multiple relaxation time models are applied. The results are in excellent agreement with data obtained from state-of-the-art numerical methods and are shown to converge with second order accuracy in grid spacing.</p>
View Publication
Scopus (20)
Crossref (17)
Scopus Crossref