Metaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory characteristics and memory in SI-based metaheuristics. The latest information and references have been further analyzed to extract key information and mapped into respective subsections. A total of 50 references related to memory usage studies from 2003 to 2018 have been investigated and show that the usage of memory is extremely necessary to increase effectiveness of metaheuristics by taking the advantages from their previous successful experiences. Therefore, in advanced metaheuristics, memory is considered as one of the fundamental elements of an efficient metaheuristic. Issues in memory usage have also been highlighted. The results of this review are beneficial to the researchers in developing efficient metaheuristics, by taking into consideration the usage of memory.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe study attempts to assess water quality in Abu-Zirig Marsh which used epiphytic Diatom community for assessing water quality. Many of Diatom indices {Trophic diatom index (TDI), Diatom index (DI), Generic diatom index (GDI) have been used to give qualitative information about the status of the freshwater ecosystem(good, moderate, high pollution). In this study, the epiphytic diatoms on both host aquatic plants Phragmites australis and Typha domengensis were collected from Abu-Zirig Marsh within Thi-Qar Province at three sites in Autumn, 2018 and winter, 2019. Epiphytic diatoms were Identified by the preparation of permanent slides method, some species of epiphytic diatom showed dominance such as Cyclotella menegh
... Show MoreThe research aims to shed light on the internet and how to employ them and to take advantage of applications in scientific research among faculty members, from a survey the opinions of professors at the University of Alanbar and Almustansiriah, to see the reality of use of the Internet and ways to invest in the service of scientific research.
The follow descriptive analysis approach , which is appropriate to the nature of this study concerned with exploring the views on the uses of the Internet. The study reached the field the following results:
1- There are(60) % of respondents use the Internet on an ongoing basis to see new information and keep pace with scientific developments in the field of specialty and the average use of the
The efficiency of Nd:YAG laser radiation in removing debris and smear layer from prepared root
canal walls was studied. Fifty-seven human extracted single rooted anterior teeth were divided into three
groups. A group that was not lased is considered as a control group. The remaining teeth were exposed to
different laser parameters regarding laser energy, repetition rate and exposure time. For the case of the set of
parameters of 7 mJ laser energy, the cleaning was maximum at 3 p.p.s. repetition rate for 3 seconds exposure
time for, the coronal, middle and apical thirds. Above and below this energy level, there was an overdose
(melting) or under dose (no effect). Nevertheless for 10mJ laser energy case, the cleaning effi
This study compared in vitro the microleakage of a new low shrink silorane-based posterior composite (Filtek™ P90) and two methacrylate-based composites: a packable posterior composite (Filtek™ P60) and a nanofill composite (Filtek™ Supreme XT) through dye penetration test. Thirty sound human upper premolars were used in this study. Standardized class V cavities were prepared at the buccal surface of each tooth. The teeth were then divided into three groups of ten teeth each: (Group 1: restored with Filtek™ P90, Group 2: restored with Filtek™ P60, and Group 3: restored with Filtek™ Supreme XT). Each composite system was used according to the manufacturer's instructions with their corresponding adhesive systems. The teeth were th
... Show MoreForest fires continue to rise during the dry season and they are difficult to stop. In this case, high temperatures in the dry season can cause an increase in drought index that could potentially burn the forest every time. Thus, the government should conduct surveillance throughout the dry season. Continuous surveillance without the focus on a particular time becomes ineffective and inefficient because of preventive measures carried out without the knowledge of potential fire risk. Based on the Keetch-Byram Drought Index (KBDI), formulation of Drought Factor is used just for calculating the drought today based on current weather conditions, and yesterday's drought index. However, to find out the factors of drought a day after, the data
... Show MoreThis research aims at measuring the relationship between moral intelligence and academic adjustment for sixth year primary School Pupils.
The research is assigned to sixth year primary school pupils- Baghdad –the 2nd karkh of the both genders .The total sample includes (500) pupils .The researchers has built two scales one for Moral Intelligence and another for Academic Adjustment and applied them on the total sample of the research .The researchers treated data by appropriate statistical means .The research has reached the following results:
- The pupils of sixth year primary school characterized by Moral Intelligence.
- The
The current research aimed to identify psychological stability and its relationship to university integration and spiritual intelligence among university students. The research sample consisted of (158) students from the College of Education - Al-Mustansiriya University.
A scale was applied: psychological stability, university integration, and spiritual intelligence, and by using the (Pearson) correlation coefficient, and the t-test, the results showed: the sample members enjoy psychological stability, university integration, and spiritual intelligence, and there is a positive, statistically significant correlation between the research variables, and the results resulted in some recommendations and proposals.
In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreEchinococcosis is a zoonotic disease caused by the larval stage of the tapeworm Echinococcus granulosus. This disease is an important public health and a significant economic issue in Iraq, where the lungs and livers are the popular places of infection. The aim of the current study focused on using the molecular techniques in the detection of an E. granulosus strain that causes cystic echinococcosis to human, sheep and cattle in Thi-Qar province, Iraq. In the current study, thirty isolates of E. granulosus were collected from 10 human hydatid cysts through surgery done at Al-Hussein Imam Teaching Hospital in Thi-Qar province and 10 sheep with 10 cattle hydatid cysts were obtained from the slaughterhouse in Thi-
... Show More