Preferred Language
Articles
/
jeasiq-1597
A Novel Invasive Weed Optimization Algorithm (IWO) by Whale Optimization Algorithm(WOA) to solve Large Scale Optimization Problems
...Show More Authors

Abstract  

  In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invasive Weed Optimization Algorithm (IWO), as for the Whale Optimization Algorithm (WOA) uses the intelligence of the swarms to reach the goal and achieve the best solution, which simulates the unique hunting behavior of humpback whales, which is called fishing by bubble trap hunting by creating distinctive bubbles along a circle or a path in the form of 9 has appeared for the first time in 2016 by Mirjalili and Lewis. In order to benefit from the intelligence of the flocks and to avoid falling into local solutions, the new hybridization between the IWO and WOA algorithm was proposed to launch the new hybrid algorithm (IWOWOA). The new hybrid algorithm (IWOWOA) was applied on 23 functions of large scale optimization problems, The proposed algorithm showed very high efficiency in solving these functions. The proposed algorithm was able to reach the optimal solutions by achieving the minimum value of most of these functions. This algorithm was compared with the basic algorithms IWO, WOA and two algorithms that follow the swarm system these algorithms are particle swarm optimization (PSO) and chicken swarm optimization (CSO) [7], they have been statistically tested by calculating the mean arithmetic μ and standard deviation σ for these functions.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
Solve the problem of assignment by using multi-Objective programming
...Show More Authors

he assignment model represents a mathematical model that aims at expressing an important problem facing enterprises and companies in the public and private sectors, which are characterized by ensuring their activities, in order to take the appropriate decision to get the best allocation of tasks for machines or jobs or workers on the machines that he owns in order to increase profits or reduce costs and time As this model is called multi-objective assignment because it takes into account the factors of time and cost together and hence we have two goals for the assignment problem, so it is not possible to solve by the usual methods and has been resorted to the use of multiple programming The objectives were to solve the problem of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Facial Emotion Images Recognition Based On Binarized Genetic Algorithm-Random Forest
...Show More Authors

Most recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Applied Minimized Matrix Size Algorithm on the Transformed Images by DCT and DWT used for Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
International Journal Of Agricultural And Statistical Sciences
The effect of some herbicides on the companion weed to three cultivars of oats
...Show More Authors

A field experiment was carried out to find out the effect of some herbicides(Pallas, Crash, U46) on the companion weed to three cultivars of the oat crop (Shefa, Hamel, and Pimula) and the yield and its components of these cultivars. The results showed the superiority of the two treatments of spraying weed herbicides (T1 and T2 ) by giving the best results, as they recorded the lowest number of weed plants after 30 days of spraying reached 1.44 and 1.67 plant/m2 . Besides, the lowest weed dry weight was 0.11 and 0.00 g/m2, and the highest inhibition percentage in dry weight was 98.44% and 100.0% of the two treatments, respectively. The treatment T2 was also superior by giving the highest control percentage of 93.28% compared to the compari

... Show More
Scopus (7)
Scopus
Publication Date
Wed Sep 15 2021
Journal Name
2021 International Conference On Computing And Communications Applications And Technologies (i3cat)
Parallel Hybrid String Matching Algorithm Using CUDA API Function
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering
SENTIMENT RETRIEVAL OF HEALTH RECORDS USING NLP-BASED ALGORITHM
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Determination Optimum Inventory Level for Material Using Genetic Algorithm
...Show More Authors

The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period.             &nb

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
Enforcing Wiener Filter in the Iterative Blind Restoration Algorithm
...Show More Authors

A new blind restoration algorithm is presented and shows high quality restoration. This
is done by enforcing Wiener filtering approach in the Fourier domains of the image and the
psf environments

View Publication Preview PDF
Publication Date
Mon Jan 09 2023
Journal Name
2023 15th International Conference On Developments In Esystems Engineering (dese)
Deep Learning-Based Speech Enhancement Algorithm Using Charlier Transform
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref