Abstract
The use of modern scientific methods and techniques, is considered important topics to solve many of the problems which face some sector, including industrial, service and health. The researcher always intends to use modern methods characterized by accuracy, clarity and speed to reach the optimal solution and be easy at the same time in terms of understanding and application.
the research presented this comparison between the two methods of solution for linear fractional programming models which are linear transformation for Charnas & Cooper , and denominator function restriction method through applied on the oil heaters and gas cookers plant , where the show after reac
... Show MoreOne of the most important challenges facing project management at present time is to ensure project accomplishment in spite of the specific restrictions like the specific time the financial resources specialized to do the project ; which require an accurate consideration for time and cost . the modern village project (residential building aspect) is one of the great project that ministry of agriculture is trying to do Wasit governorate it is chosen as the work in this project is dilatory for that is being studied in term of some modern mathematical and scientific methods like critical path method (CPM)which is one of the project management and scheduling methods to know the time needed to accomplish residential building pro
... Show MoreIn this paper, an algorithm is suggested to train a single layer feedforward neural network to function as a heteroassociative memory. This algorithm enhances the ability of the memory to recall the stored patterns when partially described noisy inputs patterns are presented. The algorithm relies on adapting the standard delta rule by introducing new terms, first order term and second order term to it. Results show that the heteroassociative neural network trained with this algorithm perfectly recalls the desired stored pattern when 1.6% and 3.2% special partially described noisy inputs patterns are presented.
The structure of the interrogation process in cross-examinations is said to be diverse and complex in terms of question-response typology. This is because the counsel has to extract truth from an opposing party’s witness whose views are expected to advocate that party's views regarding the case. Accordingly, the study which is basically quantitative in nature aims to investigate what the examining party intends to obtain out of these questions and which of these questions are the most prevalently used. It also aims to measure the amount of cooperativity in witnesses' responses. Accordingly, three transcripts of cross-examination have been analyzed, using a pragmatically-oriented approach. The approach draws on Stenstorm (1984) and Arch
... Show MoreIn this paper a modified approach have been used to find the approximate solution of ordinary delay differential equations with constant delay using the collocation method based on Bernstien polynomials.
This research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More