Preferred Language
Articles
/
bsj-3560
Taxonomy of Memory Usage in Swarm Intelligence-Based Metaheuristics
...Show More Authors

Metaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory characteristics and memory in SI-based metaheuristics. The latest information and references have been further analyzed to extract key information and mapped into respective subsections. A total of 50 references related to memory usage studies from 2003 to 2018 have been investigated and show that the usage of memory is extremely necessary to increase effectiveness of metaheuristics by taking the advantages from their previous successful experiences. Therefore, in advanced metaheuristics, memory is considered as one of the fundamental elements of an efficient metaheuristic. Issues in memory usage have also been highlighted. The results of this review are beneficial to the researchers in developing efficient metaheuristics, by taking into consideration the usage of memory.

Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 28 2020
Journal Name
Neuroquantology
Studying the Swarm Parameters and Electron Transport Coefficients in N2– CH4 Mixtures Using BOLSIG+ Program
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Oct 31 2023
Journal Name
College Of Islamic Sciences
The fatwa based on the statement of Zafar In the Hanafi school of thought
...Show More Authors

Each school of Islamic jurisprudence has principles and rules upon which the diligent work in these schools is based. This is due to the view of sanctification of these rulings, as they are divine rulings. Therefore, the goal is to reach a ruling that represents the intent of the legislator as much as possible.
Hence, these schools of thought established rules for issuing fatwas with the intention of restricting the performance of a fatwa to the hands of those who are qualified for it and have met its conditions, so they gave priority to the most knowledgeable person over others to perform the fatwa. In the Hanafi school of thought, for example, the saying of Imam Abu Hanifa (may God have mercy on him) is given precedence over others,

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Engineering
Intelligence in Construction between Contemporary and Traditional Architecture
...Show More Authors

The authentic traditional architecture proved that it is very convenient to the environmental and social regulations where it appeared and lasted for hundred of years.

This traditional architecture got the intelligence in providing thermal comfort for their occupants by the intelligent usage of the building materials and the intelligent planning and designs which took in consideration the climatic condition and the aerodynamics of the whole city as one ecological system starting from the cold breeze passing through its narrow streets till it enters the dwelling units and glides out through the wind catchers.

This architecture had been neglected and replaced by modern imported architecture which had collap

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Pathology - Research And Practice
Artificial intelligence in cancer diagnosis: Opportunities and challenges
...Show More Authors

View Publication
Scopus (38)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Evaluating the individual, dual usage of (TGP) and (SF) additives on improving gypsum characteristics
...Show More Authors

View Publication
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
The communicative dimension of Andalusian-Moroccan poetry In the classification and refining book (The pleasure of the soul of the five senses)
...Show More Authors

The heritage of the human peoples remains a beacon of data, after renewed awareness of them, open to their propositions, which are born from the womb of intertwined elements of customs, knowledge, arts, and literature ... Misleading the reception process, it may be something intriguing to identify with caution with the text sample selected by the current search procedures prepared according to the adoption of a descriptive therapist in a three-dimensional approach, as well as a comprehensive textual reference for that specific communication dimension within Anthology Andalusian - Moroccan poetry in the book of pleasure in the perception of the five senses Tahdib ibn Manzoor (d. 711 e) from the origin of Tivashi (d. 651 e) Tagged: Separat

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Using Earned Value Method in Project Control Applied research
...Show More Authors

   There is no doubt that the project control function is very important for administration, so the project Management depends on to monitor and control the project. The project control integrated to the planning which is the base of the administration functions; planning, organizing, directing, and controlling. Without project control cannot be insure to fulfill the plan of the project by the budget and specified time. The project management apply many methods of control to achieve the goals of project which are cost, time, and required specifications. Earned Value Management one of control methods that used in the project by international companies.

Earned Value Method is used in the project o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
استخدام سلاسل ماركوف في التعرف على تعقبات الحامض النووي DNA
...Show More Authors

استخدام سلاسل ماركوف في التعرف على تعقبات الحامض النووي DNA

View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Influence of Design Efficiency of Water Supply Network Inside Building on its Optimum Usage: Review
...Show More Authors

The water supply network inside the building is of high importance due to direct contact with the user that must be optimally designed to meet the water needs of users.  This work aims to review previous research and scientific theories that deal with the design of water networks inside buildings, from calculating the amount of consumption and the optimal distribution of the network, as well as ways to rationalize the use of water by the consumer.  The process of pumping domestic water starts from water treatment plants to be fed to the public distribution networks, then reaching a distribution network inside the building till it is  provided to the user.  The design of the water supply network inside the building is

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref