Metaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory characteristics and memory in SI-based metaheuristics. The latest information and references have been further analyzed to extract key information and mapped into respective subsections. A total of 50 references related to memory usage studies from 2003 to 2018 have been investigated and show that the usage of memory is extremely necessary to increase effectiveness of metaheuristics by taking the advantages from their previous successful experiences. Therefore, in advanced metaheuristics, memory is considered as one of the fundamental elements of an efficient metaheuristic. Issues in memory usage have also been highlighted. The results of this review are beneficial to the researchers in developing efficient metaheuristics, by taking into consideration the usage of memory.
Flow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relativel
... Show MoreLiterature on the use of the first-person pronoun in abstracts and conclusion sections of final-year projects is limited. In case of Algerian Master students, it is too scant. The present paper aims at filling this gap through a study concerned with students’ and engagement in their final projects (memoirs). This quantitative study examines the use of “we” and its various types, “our- us-I, my, the researcher” in memoirs chosen at random from the d-space portal of the University of Adrar, southern Algeria. Sixty-five papers, submitted in the fields of Linguistics or didactics between 2015 and 2020 and representing nearly half of the whole memoirs’ depository at the library’s d-space, constituted the corpus of study. The des
... Show Moreاستهدف البحث فصل بروتينات مصل دم كل من الحمامة الفاختة (Streptopelia decaocto) والحمامة المطوقة (Streptopelia senegalensis) بطريقة الترحيل الكهربائي كطريقة تصنيفية مابين النوعين . تم جمع 23 حمامة فاختة (13 ذكر و10 إناث) و 15 حمامة ضاحكة (8 ذكر و5 إناث) من مناطق مختلفة من مدينة بغداد ، وتم سحب0.1 مل من الدم من الوريد الموجود
This study was conducted on Lake Hamrin situated in Diyala governorate, focal Iraq, between latitudes 44º 53ʹ 26.16 '- 45º 07 ʹ 28.03ʺ and 34º 04ʹ 24.75ʺ ــ 34º 19ʹ 12.74ʺ . As in this study, the surface area of Hamrin Lake was calculated from satellite images during the period from October 2019 to September 2020, with an average satellite image for each month, furthermore,by utilizing the Normalized Differences Water Index (NDWI), the largest surface area was 264,617 km2 for October and the lowest surface area 140.202 km2 for September. The surface temperature of the lake water was also calculated from satellite images of the Landsat 8 satellite, based on ban
... Show MoreAbstract
This study aims to identify the reality of using electronic applications in teaching language skills to people with mild intellectual disabilities from the mothers’ perspective. A descriptive approach was used. The electronic questionnaires were administered to the study sample, 122 responses were received from mothers of the students with mild intellectual disability in Hafer Al-Baten schools. The response average rate was 94%. The results showed that there are statistically significant differences that are related to the variant of monthly income as for the barriers to using electronic applications in such schools, whereas there were no differences regarding the variant of monthly income regarding t
... Show MoreThe research aims to find out the impact of cognitive strategies in the mathematical competence of the students of the fourth scientific in the preparatory mahmoudiyah in the Directorate General of The Education of Karkh 2. A post-test of the mathematical competence prepared by (Jassim, 2018) was applied to the sample of (65) students, distributed into two groups of (33) students as experimental group and (32) students as a control group. The results found there are significant differences between the experimental group and the control group in testing the mathematical competence of students for the experimental group.
The team of this investigation deals with phraseology and the importance of its organized use in the media of communication, especially in the daily newspaper which is used by different society classes.
So, the journalist
... Show Moreاسباب تفرد استخدام خط النسخ في تصميم الحروف الطباعية
In general, the importance of cluster analysis is that one can evaluate elements by clustering multiple homogeneous data; the main objective of this analysis is to collect the elements of a single, homogeneous group into different divisions, depending on many variables. This method of analysis is used to reduce data, generate hypotheses and test them, as well as predict and match models. The research aims to evaluate the fuzzy cluster analysis, which is a special case of cluster analysis, as well as to compare the two methods—classical and fuzzy cluster analysis. The research topic has been allocated to the government and private hospitals. The sampling for this research was comprised of 288 patients being treated in 10 hospitals. As t
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More