Metaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory characteristics and memory in SI-based metaheuristics. The latest information and references have been further analyzed to extract key information and mapped into respective subsections. A total of 50 references related to memory usage studies from 2003 to 2018 have been investigated and show that the usage of memory is extremely necessary to increase effectiveness of metaheuristics by taking the advantages from their previous successful experiences. Therefore, in advanced metaheuristics, memory is considered as one of the fundamental elements of an efficient metaheuristic. Issues in memory usage have also been highlighted. The results of this review are beneficial to the researchers in developing efficient metaheuristics, by taking into consideration the usage of memory.
A revolution called information revolution has recently invaded the world. It is Currently considered one of the most important properties of development to the countries of the world The criteria provided by computers such as accuracy, speed, time saving Storage and restore have led them to be widely used in economy, industry, agriculture, communications, etc., as well as being the major finder of reengineering the operations of innovation. The use of computers in the preparation of budgets will lead to achieve accuracy. Since, the operation draws upon the statistic and quantity estimations about budget items, the computerized balance sheet may save time and effort of preparing mathematical equations annually. According to the problem o
... Show MoreThe study attempts to assess water quality in Abu-Zirig Marsh which used epiphytic Diatom community for assessing water quality. Many of Diatom indices {Trophic diatom index (TDI), Diatom index (DI), Generic diatom index (GDI) have been used to give qualitative information about the status of the freshwater ecosystem(good, moderate, high pollution). In this study, the epiphytic diatoms on both host aquatic plants Phragmites australis and Typha domengensis were collected from Abu-Zirig Marsh within Thi-Qar Province at three sites in Autumn, 2018 and winter, 2019. Epiphytic diatoms were Identified by the preparation of permanent slides method, some species of epiphytic diatom showed dominance such as Cyclotella menegh
... Show MoreThis research aims at building a proposed training program according to the self-regulated strategies for the mathematics teachers and to identify the effect of this program on relational Mathematics of teachers. The sample of the research was (60) Math teachers; (30) teachers as experimental group and (30) teachers as control group. The results of the current research reacheded that the proposed training program according to some self-managed learning strategies, meets the needs of trainees with remarkable effectiveness to improve the level of their teaching performance to achieve the desired goals. Training teacher according to self-managed learning strategies is effective in bringing about the transition of training to their students
... Show MoreThe efficiency of Nd:YAG laser radiation in removing debris and smear layer from prepared root
canal walls was studied. Fifty-seven human extracted single rooted anterior teeth were divided into three
groups. A group that was not lased is considered as a control group. The remaining teeth were exposed to
different laser parameters regarding laser energy, repetition rate and exposure time. For the case of the set of
parameters of 7 mJ laser energy, the cleaning was maximum at 3 p.p.s. repetition rate for 3 seconds exposure
time for, the coronal, middle and apical thirds. Above and below this energy level, there was an overdose
(melting) or under dose (no effect). Nevertheless for 10mJ laser energy case, the cleaning effi
The research aims to shed light on the internet and how to employ them and to take advantage of applications in scientific research among faculty members, from a survey the opinions of professors at the University of Alanbar and Almustansiriah, to see the reality of use of the Internet and ways to invest in the service of scientific research.
The follow descriptive analysis approach , which is appropriate to the nature of this study concerned with exploring the views on the uses of the Internet. The study reached the field the following results:
1- There are(60) % of respondents use the Internet on an ongoing basis to see new information and keep pace with scientific developments in the field of specialty and the average use of the
أن التقدم والتطور العلمي اللذين حدثا خلال القرن العشرين كان لهما اثر كبير في المسيرة العلمية ، حيث أن من المفترض على أفراد مجتمع المتعلمين أن يتزودوا بمهارات التفكير العلمي لكي تمكنهم من العيش في العصر الحالي وليشاركوا فيه بذكاء وفاعلية حتى يحققوا لذاتهم ملائمة أفضل مع التغييرات والتطورات المختلفة التي حدثت في العالم لذا فان طرائق التدريس أصبحت حاجة ملحة لا تقل أهميتها عن المدرس والمادة الدراسية حيث أ
... Show MoreA simple all optical fiber sensor based on multimode interference (MMI) for chemical liquids sensing was designed and fabricated. A segment of coreless fiber (CF) was spliced between two single mode fibers to buildup single mode-coreless-single mode (SCS) structure. Broadband source and optical signal analyzer were connected to the ends of SCS structure. De-ionized water, acetone, and n-hexane were used to test the performance of the sensor. Two influence factors on the sensitivity namely the length and the diameter of the CF were investigated. The obtained maximum sensitivity was at n-hexane at 340.89 nm/RIU (at a wavelength resolution of the optical spectrum analyzer of 0.02 nm) when the diameter of the CF reduced from 125 μm to 60 μ
... Show MoreThe research dealt with the design of the cost accounting system for the transport service and its Role in improving the efficiency of pricing decisions through the application of the cost system based on ABC activities. The main activities were defined and cost guides were to measure the cost of each service and to determine the cost of each service for the purpose of providing management with appropriate information and pricing decisions The problem of research in the lack of adoption by some public companies in the service sector on the cost accounting system to calculate the cost of service as well as the lack of identification of productive activities and service activities and therefore cannot make the appropriate decision t
... Show MoreForest fires continue to rise during the dry season and they are difficult to stop. In this case, high temperatures in the dry season can cause an increase in drought index that could potentially burn the forest every time. Thus, the government should conduct surveillance throughout the dry season. Continuous surveillance without the focus on a particular time becomes ineffective and inefficient because of preventive measures carried out without the knowledge of potential fire risk. Based on the Keetch-Byram Drought Index (KBDI), formulation of Drought Factor is used just for calculating the drought today based on current weather conditions, and yesterday's drought index. However, to find out the factors of drought a day after, the data
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More