tock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.
The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreBrachytherapy treatment is primarily used for the certain handling kinds of cancerous tumors. Using radionuclides for the study of tumors has been studied for a very long time, but the introduction of mathematical models or radiobiological models has made treatment planning easy. Using mathematical models helps to compute the survival probabilities of irradiated tissues and cancer cells. With the expansion of using HDR-High dose rate Brachytherapy and LDR-low dose rate Brachytherapy for the treatment of cancer, it requires fractionated does treatment plan to irradiate the tumor. In this paper, authors have discussed dose calculation algorithms that are used in Brachytherapy treatment planning. Precise and less time-consuming calculations
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreIn this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i
It is widely accepted that early diagnosis of Alzheimer's disease (AD) makes it possible for patients to gain access to appropriate health care services and would facilitate the development of new therapies. AD starts many years before its clinical manifestations and a biomarker that provides a measure of changes in the brain in this period would be useful for early diagnosis of AD. Given the rapid increase in the number of older people suffering from AD, there is a need for an accurate, low-cost and easy to use biomarkers that could be used to detect AD in its early stages. Potentially, the electroencephalogram (EEG) can play a vital role in this but at present, no reliable EEG biomarker exists for early diagnosis of AD. The gradual s
... Show More
Atheism is one of the most dangerous absurd doctrines that have swept the world in the modern era. Its strength lies in the bodies that stand behind it and adopt its ideologies which are accompanied by the tremendous media momentum of the theses of its supporters based on scientific and non-scientific levels. And since the denial of the existence of the Creator is the main focus and central point which the atheists based their view towards the universe, life and man, this humble research came to discuss the claim of the existence of the world by pure chance, and try to explain this scientifically through the theory of natural selection and survival of the fittest developed by the English biologist Charles Darwin. The resea
... Show MoreThe discipline of International Relations has been a science for almost a century and has undergone considerable development and dynamism as a field of knowledge. In the aftermath of the First World War, traditional idealistic trends prevailed. Still, after the end of the Second World War, the theory of realism dominated the analysis of international relations, international politics, and its laws and mechanisms. With the inter-paradigm debate of the 1980s, a broad spectrum of theories of international relations emerged, the most significant of which are critical theories including feminism. Feminist theory has since become central to the debates about global phenomena among those who work in International Relations as a field. The paper at
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreIn this research a theoretical study has been carried out on the behavior and strength of simply supported composite beams strengthened by steel cover plate taking into consideration partial interaction of shear connectors and nonlinear behavior of the materials and shear connectors. Following the procedure that already has been adopted by Johnson (1975), the basic differential equations of equilibrium and compatibility were reduced to single differential equation in terms of interface slip between concrete slab and steel beam. Furthermore, in order to consider the nonlinear behavior of steel, concrete and shear connectors, the basic equation was rearranged so that all terms related to materials are isol
... Show More