Artificial fish swarm algorithm (AFSA) is one of the critical swarm intelligent algorithms. In this
paper, the authors decide to enhance AFSA via diversity operators (AFSA-DO). The diversity operators will
be producing more diverse solutions for AFSA to obtain reasonable resolutions. AFSA-DO has been used to
solve flexible job shop scheduling problems (FJSSP). However, the FJSSP is a significant problem in the
domain of optimization and operation research. Several research papers dealt with methods of solving this
issue, including forms of intelligence of the swarms. In this paper, a set of FJSSP target samples are tested
employing the improved algorithm to confirm its effectiveness and evaluate its execution. Finally, this paper
concludes that the enhanced algorithm via diversity operators has discrepancies about the initial AFSA, and
it also provided both sound quality resolution and intersected rate.
This work is concerned with studying the solvability for optimal classical continuous control quaternary vector problem that controls by quaternary linear hyperbolic boundary value problem. The existence of the unique quaternary state vector solution for the quaternary linear hyperbolic boundary value problem is studied and demonstrated by employing the method of Galerkin, where the classical continuous control quaternary vector is Known. Also, the existence theorem of an optimal classical continuous control quaternary vector related to the quaternary linear hyperbolic boundary value problem is demonstrated. The existence of a unique solution to the adjoint quaternary linear hyperbolic boundary value problem a
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
Learning programming is among the top challenges in computer science education. A part of that, program visualization (PV) is used as a tool to overcome the high failure and drop-out rates in an introductory programming course. Nevertheless, there are rising concerns about the effectiveness of the existing PV tools following the mixed results derived from various studies. Student engagement is also considered a vital factor in building a successful PV, while it is also an important part of the learning process in general. Several techniques have been introduced to enhance PV engagement; however, student engagement with PV is still challenging. This paper employed three theories—constructivism, social constructivism and cognitive load t
... Show MoreResearch summary
The first step towards the goal of coexistence with diversity, we must all recognize each one of us the rights of others regardless of his religion, color, gender, and point of view, and that each one agrees with his partnership with others, and a person’s belonging to a religion or doctrine must be based on conviction and self-motivation, and that the true Sharia prohibits a Muslim To impose on others what they do not believe and believe in, for God Almighty did not give His Prophet this right, so how about others, and it is not surprising for everyone that disharmony and rivalry impede the attempt to advance in society, and it is natural that our enemies take advantage of our division among us,
Abstract
Objective(s): To assess the job satisfaction during of covid-19 among the nurses in respiratory isolation units of coronavirus disease.
Methodology: A descriptive cross-sectional design was carried out in four hospitals at isolation units of coronavirus disease from the period (21th December, 2021 to 27th January, 2022). A non-probability (convenience) sampling method consists of (300) nurse was selected convenience based on the study criteria. The tool used to measure the job satisfaction is Job satisfaction scale for clinical nursing (JSS-CN). This tool consists of two parts, the first part is for demographic information and consists of 8 items, and the second
... Show MoreThe composition of fish assemblages in Iraqi marine water was assessed. 91 species belonging to 71 genes and 47 families of Osteichthyes and 13 species of Conderchthyes were collected during the study period from January to December 2018, using trawl net fishing. Three stations were selected, where two new species (Siganus javus and Gobiopsis sp.) and reclassification of Torpedo panthera where identified and two species of freshwater fish (Oreochromis niloticus and Oreochromis aureus) were first recorded in marine waters. The highest numbers of species were 32 and 42 for the first and second stations, respectively, recorded in October , while 55 species were recorded in the third s
... Show MoreAssessing water quality provides a scientific foundation for the development and management of water resources. The objective of the research is to evaluate the impact treated effluent from North Rustumiyia wastewater treatment plant (WWTP) on the quality of Diyala river. The model of the artificial neural network (ANN) and factor analysis (FA) based on Nemerow pollution index (NPI). To define important water quality parameters for North Al-Rustumiyia for the line(F2), the Nemerow Pollution Index was introduced. The most important parameters of assessment of water variation quality of wastewater were the parameter used in the model: biochemical oxygen demand (BOD), chemical oxygen dem
This study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that functions as an act over S if and only if functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following, is acting over S if and only if is a module where T is a nilpotent operator, is a
... Show More