The swarm intelligence and evolutionary methods are commonly utilized by researchers in solving the difficult combinatorial and Non-Deterministic Polynomial (NP) problems. The N-Queen problem can be defined as a combinatorial problem that became intractable for the large ‘n’ values and, thereby, it is placed in the NP class of problems. In the present study, a solution is suggested for the N-Queen problem, on the basis of the Meerkat Clan Algorithm (MCA). The problem of n-Queen can be mainly defined as one of the generalized 8-Queen problem forms, for which the aim is placing 8 queens in a way that none of the queens has the ability of killing the others with the use of the standard moves of the chess queen. The Meerkat Clan environment is a directed graph, called the search space, produced for the efficient search of valid n-queens’ placement, in a way that they do not cause harm to one another. This paper also presents the development of an intelligent heuristic function which is helpful to find the solution with high speed and effectiveness. This study includes a detailed discussion of the problem background, problem complexity, Meerkat Clan Algorithm, and comparisons of the problem solution with the Practical Swarm Optimization (PSO) and Genetic Algorithm (GA. It is an entirely review-based work which implemented the suggested designs and architectures of the methods and a fair amount of experimental results.
An advertisement is a form of communication intended to promote the sale of a product or service, influence public opinion, gain political support, or to elicit some other response. It consists of various type, including style, target audience, geographic scope, medium, or purpose. An advertisement should catch a person's attention and quickly create a memorable impression. The main aim of the present paper is to investigate the phonological problems of translating English international TV advertisements into Arabic. It deals with the most common and popular TV advertisements. The importance of such advertisements lies not in its information content rather than in the achievement of the desired impact on the receivers. When translating such
... Show MoreThree N-(hydroxylphenyl) dimethylmaleimides were directly prepared in good yields (81-86)% from the reaction of dimethylmaleic anhydride with amino phenols. The prepared imides were esterified to the corresponding benzoates, methacrylates and cinnamates via their reaction with different acid chlorides in the presence of triethylamine. The prepared esters were tested as plasticizers for PVC via preparing of thirty six samples of PVC with the prepared esters in certain weight ratio followed by recording their softening points. Comparison the results with the universal plasticizers for PVC (DOP) and (DBP) indicated that the prepared esters in general have high plasticizing efficiency.
This study aimed at revealing the degree of availability of standards of word problems in mathematics books for the first three grades of the basic stage in Palestine. For this purpose, the researcher prepared an analysis tool and a list of criteria consisting of two areas: linguistic formulation and mathematical content. Every area had seven items. The results of the study showed that the third-grade mathematics book has the highest degree of availability of the standards with 85.75%, and then came the second-grade mathematics book with 83.12%. Finally, the first-grade mathematics book came with 80.13%. In the light of the previous results, the researcher recommended to develop the language of word problems, to take into account their i
... Show MoreIn this paper, we investigate prime near – rings with two sided α-n-derivations
satisfying certain differential identities. Consequently, some well-known results
have been generalized. Moreover, an example proving the necessity of the primness
hypothesis is given.
Steganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to b
... Show MoreElectronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the ene
... Show More