Preferred Language
Articles
/
bsj-3560
Taxonomy of Memory Usage in Swarm Intelligence-Based Metaheuristics
...Show More Authors

Metaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory characteristics and memory in SI-based metaheuristics. The latest information and references have been further analyzed to extract key information and mapped into respective subsections. A total of 50 references related to memory usage studies from 2003 to 2018 have been investigated and show that the usage of memory is extremely necessary to increase effectiveness of metaheuristics by taking the advantages from their previous successful experiences. Therefore, in advanced metaheuristics, memory is considered as one of the fundamental elements of an efficient metaheuristic. Issues in memory usage have also been highlighted. The results of this review are beneficial to the researchers in developing efficient metaheuristics, by taking into consideration the usage of memory.

Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jun 16 2020
Journal Name
Baghdad Science Journal
Using Diatom Indices to Evaluate Water quality In Abu-Zirig Marsh Thi-Qar Province /south of Iraq
...Show More Authors

The study attempts to assess water quality in Abu-Zirig Marsh which used epiphytic Diatom community for assessing water quality. Many of Diatom indices {Trophic diatom index (TDI), Diatom index (DI), Generic diatom index (GDI) have been used to give qualitative information about the status of the freshwater ecosystem(good, moderate, high pollution). In this study, the epiphytic diatoms on both host aquatic plants Phragmites australis and Typha domengensis were collected from Abu-Zirig Marsh within Thi-Qar Province at three sites in Autumn, 2018 and winter, 2019. Epiphytic diatoms were Identified by the preparation of permanent slides method, some species of epiphytic diatom showed dominance such as Cyclotella menegh

... Show More
View Publication Preview PDF
Scopus (7)
Scopus Clarivate Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
Use of Internet by Universities Teachers and Benefits in Teaching and Scientific Research
...Show More Authors

The research aims to shed light on the internet and how to employ them and to take advantage of applications in scientific research among faculty members, from a survey the opinions of professors at the University of Alanbar and Almustansiriah, to see the reality of use of the Internet and ways to invest in the service of scientific research.
The follow descriptive analysis approach , which is appropriate to the nature of this study concerned with exploring the views on the uses of the Internet. The study reached the field the following results:
1- There are(60) % of respondents use the Internet on an ongoing basis to see new information and keep pace with scientific developments in the field of specialty and the average use of the

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 11 2002
Journal Name
Iraqi Journal Of Laser
The Use of a Pulsed Nd: YAG Laser Radiation for the Removal of Intracanal Debris and Smear Layer in Extracted Human Teeth
...Show More Authors

The efficiency of Nd:YAG laser radiation in removing debris and smear layer from prepared root
canal walls was studied. Fifty-seven human extracted single rooted anterior teeth were divided into three
groups. A group that was not lased is considered as a control group. The remaining teeth were exposed to
different laser parameters regarding laser energy, repetition rate and exposure time. For the case of the set of
parameters of 7 mJ laser energy, the cleaning was maximum at 3 p.p.s. repetition rate for 3 seconds exposure
time for, the coronal, middle and apical thirds. Above and below this energy level, there was an overdose
(melting) or under dose (no effect). Nevertheless for 10mJ laser energy case, the cleaning effi

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Tikrit Journal For Dental Sciences
Microleakage Evaluation of a Silorane-Based and Methacrylate-Based Packable and Nanofill Posterior Composites (in vitro comparative study)
...Show More Authors

This study compared in vitro the microleakage of a new low shrink silorane-based posterior composite (Filtek™ P90) and two methacrylate-based composites: a packable posterior composite (Filtek™ P60) and a nanofill composite (Filtek™ Supreme XT) through dye penetration test. Thirty sound human upper premolars were used in this study. Standardized class V cavities were prepared at the buccal surface of each tooth. The teeth were then divided into three groups of ten teeth each: (Group 1: restored with Filtek™ P90, Group 2: restored with Filtek™ P60, and Group 3: restored with Filtek™ Supreme XT). Each composite system was used according to the manufacturer's instructions with their corresponding adhesive systems. The teeth were th

... Show More
Preview PDF
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Using Backpropagation to Predict Drought Factor in Keetch-Byram Drought Index
...Show More Authors

Forest fires continue to rise during the dry season and they are difficult to stop. In this case, high temperatures in the dry season can cause an increase in drought index that could potentially burn the forest every time. Thus, the government should conduct surveillance throughout the dry season. Continuous surveillance without the focus on a particular time becomes ineffective and inefficient because of preventive measures carried out without the knowledge of potential fire risk. Based on the Keetch-Byram Drought Index (KBDI), formulation of Drought Factor is used just for calculating the drought today based on current weather conditions, and yesterday's drought index. However, to find out the factors of drought a day after, the data

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Sun Oct 02 2011
Journal Name
Journal Of Educational And Psychological Researches
Moral Intelligence and its Relationship with Academic Adjustment for Sixth Year Primary School Pupils
...Show More Authors

This research aims at measuring the relationship between moral intelligence and academic adjustment for sixth year primary School Pupils.

The research is assigned to sixth year primary school pupils- Baghdad –the 2nd   karkh of the both genders .The total sample includes (500) pupils .The researchers has built two scales one for Moral Intelligence and another for Academic Adjustment and applied them on the total sample of the research .The researchers treated data by appropriate statistical means .The research has reached the following results:

  • The pupils of sixth year primary school characterized by Moral Intelligence.
  • The

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Psychological stability and its relationship to Integration University and spiritual intelligence among University students
...Show More Authors

The current research aimed to identify psychological stability and its relationship to university integration and spiritual intelligence among university students. The research sample consisted of (158) students from the College of Education - Al-Mustansiriya University.

A scale was applied: psychological stability, university integration, and spiritual intelligence,   and by using the (Pearson) correlation coefficient, and the t-test, the results showed: the sample members enjoy psychological stability, university integration, and spiritual intelligence, and there is a positive, statistically significant correlation between the research variables, and the results resulted in some recommendations and proposals.

View Publication Preview PDF
Publication Date
Tue Apr 02 2024
Journal Name
Engineering, Technology & Applied Science Research
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence
...Show More Authors

In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Employing NADH Dehydrogenase Subunit 1 in the Determination of Echinococcus granulosus Strain in Sheep, Cattle and Human in Thi-Qar Province, Iraq
...Show More Authors

Echinococcosis is a zoonotic disease caused by the larval stage of the tapeworm Echinococcus granulosus. This disease is an important public health and a significant economic issue in Iraq, where the lungs and livers are the popular places of infection. The aim of the current study focused on using the molecular techniques in the detection of an E. granulosus strain that causes cystic echinococcosis to human, sheep and cattle in Thi-Qar province, Iraq. In the current study, thirty isolates of E. granulosus were collected from 10 human hydatid cysts through surgery done at Al-Hussein Imam Teaching Hospital in Thi-Qar province and 10 sheep with 10 cattle hydatid cysts were obtained from the slaughterhouse in Thi-

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref