Decision-making in Operations Research is the main point in various studies in our real-life applications. However, these different studies focus on this topic. One drawback some of their studies are restricted and have not addressed the nature of values in terms of imprecise data (ID). This paper thus deals with two contributions. First, decreasing the total costs by classifying subsets of costs. Second, improving the optimality solution by the Hungarian assignment approach. This newly proposed method is called fuzzy sub-Triangular form (FS-TF) under ID. The results obtained are exquisite as compared with previous methods including, robust ranking technique, arithmetic operations, magnitude ranking method and centroid ranking method. This current novelty offers an effective tool to accesses solving the ID to solve assignment problems.
A simple, precise and accurate spectrophotometric method has been developed for simultaneous estimation of sulfanilamide and furosemide in their mixture by using first and second order derivative method in the ultraviolet region. The method depends on first and second derivative spectrophotometry, with zero-crossing and peak to base line and peak area measurements. The first derivative amplitudes at 214, 238 and 266 nm were selected for the assay of sulfanilamide and 240, 260, 284, 314 and 352 nm for furosemide. Peak area at 201222, 222-251 and 251-281 nm selected for estimation of sulfanilamide and at 229-249, 249270, 270-294, 294-333 and 333-382 nm for furosemide. The second derivative amplitudes at 220, 252 and 274 nm for sulfanilamid
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
This study was aimed to assess the efficiency of N.oleander to remove heavy metals such as Copper (Cu) from wastewater. A toxicity test was conducted outdoor for 65-day to estimate the ability of N.oleander to tolerate Cu in synthetic wastewater. Based on a previous range-finding test, five concentrations were used in this test (0, 50, 100, 300, 510 mg/l). The results showed that maximum values of removal efficiency was found 99.9% on day-49 for the treatment 50 mg/l. Minimum removal efficiency was 94% day-65 for the treatment of 510 mg/l. Water concentration was within the permissible limits of river conservation and were 0.164 at day-35 for the 50 mg/l treatment, decreased thereafter until the end of the observation, and 0.12 at d
... Show MoreOne of the most important problems in concrete production in Iraq and other country is the high sulfate content in sand that led to damage of concrete and hence reduces its compressive strength and may leads to cracking due to internal sulfate attack and delay ettringite formation. The magnetic water treatment process is adopted in this study. Many samples with different SO3 content are treated with magnetic water (12, 8, 4 and 2)L that needed for each 1kg of sand with the magnetic intensity (9000 and 5000) Gaus. The magnetic water needed is reduced with less SO3 content in sand. The ACI 211.1-91 concrete mix design was used in this research with slump range (75- 100) mm and the specified compressive strength (35MPa). The compressive streng
... Show MoreStream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha
... Show MoreThe present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin
I n this paper ,we 'viii consider the density questions associC;lted with the single hidden layer feed forward model. We proved that a FFNN with one hidden layer can uniformly approximate any continuous function in C(k)(where k is a compact set in R11 ) to any required accuracy.
However, if the set of basis function is dense then the ANN's can has al most one hidden layer. But if the set of basis function non-dense, then we need more hidden layers. Also, we have shown that there exist localized functions and that there is no t
... Show More