Artificial fish swarm algorithm (AFSA) is one of the critical swarm intelligent algorithms. In this
paper, the authors decide to enhance AFSA via diversity operators (AFSA-DO). The diversity operators will
be producing more diverse solutions for AFSA to obtain reasonable resolutions. AFSA-DO has been used to
solve flexible job shop scheduling problems (FJSSP). However, the FJSSP is a significant problem in the
domain of optimization and operation research. Several research papers dealt with methods of solving this
issue, including forms of intelligence of the swarms. In this paper, a set of FJSSP target samples are tested
employing the improved algorithm to confirm its effectiveness and evaluate its execution. Finally, this paper
concludes that the enhanced algorithm via diversity operators has discrepancies about the initial AFSA, and
it also provided both sound quality resolution and intersected rate.
In this paper, our purpose is to study the classical continuous optimal control (CCOC) for quaternary nonlinear parabolic boundary value problems (QNLPBVPs). The existence and uniqueness theorem (EUTh) for the quaternary state vector solution (QSVS) of the weak form (WF) for the QNLPBVPs with a given quaternary classical continuous control vector (QCCCV) is stated and proved via the Galerkin Method (GM) and the first compactness theorem under suitable assumptions(ASSUMS). Furthermore, the continuity operator for the existence theorem of a QCCCV dominated by the QNLPBVPs is stated and proved under suitable conditions.
يتناول البحث انتشار ظاهرة إعادة فرز وتقسيم الوحدات السكنية ذات المساحات الكبيرة الى قطع
صغيرة وبمساحات تصل أحيانا الى اقل من 100 م 2 وعدم التقيد بقوانين البناء ، وقد وجدت اسباب عدة لتفاقم
وانتشار هذه الظاهرة منها ت ردي الحالة الاقتصادية للمواطن والكثافة السكانية المتزايدة والانشطارات العائلية
وارتفاع بدلات الإيجار وعدم توفر السكن ، وهناك من استغل هذا الامر نتيجة لضعف الرقابة من قبل
الجهات المتخصصة في
Each organization struggles to exploit each possible opportunity for gaining success and continuing with its work carrier. In this field, organization success can be concluded by fulfilling end user requirements combined with optimizing available resources usage within a specified time and acceptable quality level to gain maximum profit. The project ranking process is governed by the multi-criteria environment, which is more difficult for the governmental organization because other organizations' main target is maximizing profit constrained with available resources. The governmental organization should consider human, social, economic and many more factors. This paper focused on building a multi-criteria optimizing proje
... Show MoreThe objective of the study is developing a procedure for production and characterization of rice husk ash (RHA). The effects of rice husk (RH) amount, burning/cooling conditions combined with stirring on producing of RHA with amorphous silica, highest SiO2, lowest loss on ignition (LOI), uniform particle shape distribution and nano structured size have been studied. It is concluded that the best amount is 20 g RH in 125 ml evaporating dish Porcelain with burning for 2 h at temperature 700 °C combined with cooling three times during burning to produce RHA with amorphous silica, SiO2 90.78% and LOI 1.73%. On the other hand, cooling and stirring times affect the variation of nano structured size and particle shape dis
... Show MoreMany objective optimizations (MaOO) algorithms that intends to solve problems with many objectives (MaOP) (i.e., the problem with more than three objectives) are widely used in various areas such as industrial manufacturing, transportation, sustainability, and even in the medical sector. Various approaches of MaOO algorithms are available and employed to handle different MaOP cases. In contrast, the performance of the MaOO algorithms assesses based on the balance between the convergence and diversity of the non-dominated solutions measured using different evaluation criteria of the quality performance indicators. Although many evaluation criteria are available, yet most of the evaluation and benchmarking of the MaOO with state-of-art a
... Show MoreAbstract
The aim of this paper is to model and optimize the fatigue life and hardness of medium carbon steel CK35 subjected to dynamic buckling. Different ranges of shot peening time (STP) and critical points of slenderness ratio which is between the long and intermediate columns, as input factors, were used to obtain their influences on the fatigue life and hardness, as main responses. Experimental measurements of shot peening time and buckling were taken and analyzed using (DESIGN EXPERT 8) experimental design software which was used for modeling and optimization purposes. Mathematical models of responses were obtained and analyzed by ANOVA variance to verify the adequacy of the models. The resul
... Show MoreIn this study, multi-objective optimization of nanofluid aluminum oxide in a mixture of water and ethylene glycol (40:60) is studied. In order to reduce viscosity and increase thermal conductivity of nanofluids, NSGA-II algorithm is used to alter the temperature and volume fraction of nanoparticles. Neural network modeling of experimental data is used to obtain the values of viscosity and thermal conductivity on temperature and volume fraction of nanoparticles. In order to evaluate the optimization objective functions, neural network optimization is connected to NSGA-II algorithm and at any time assessment of the fitness function, the neural network model is called. Finally, Pareto Front and the corresponding optimum points are provided and
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.