Linear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will change the problem of linear programming and will affect the optimal solution, and therefore we need a method that helps us to stand on the impact of changing these constants on the optimal solution that has been reached. General concepts about the binary model and some related theories have also been addressed. By analyzing the sensitivity, we relied on real data for a company that transports crude oil and its derivatives. The mathematical model was formulated for it and the optimal solution was reached using the software. Ready-made sop WINQSB and then calculate the shadow price values for the binding constraints, in addition to what
The AlAdhaim Dam is located 133 kilometers northeast of Baghdad. It is a multipurpose dam and joints the Iraqi dam system in 2000. It has a storage capacity of 1.5 billion m3. The dam has an ogee spillway with a length of 562 m, a crest level of 131.5 m.a.m.s.l. and a maximum discharge capacity of 1150 m3/s at its maximum storage height of 143 m.a.m.s.l. This research aimed to investigate the hydrodynamics performance of the spillway and the stilling basin of AlAdhiam Dam by using numerical simulation models under gated situations. It was suggested to modify the dam capacity by increasing the dam's storage capacity by installing gates on the crest of the dam spillway. The FLUENT program was used to
... Show MoreThe ground-state properties of exotic 18N and 20F nuclei, including the neutron, proton and matter densities and related radii are investigated using the two-body model of within Gaussian (GS) and Woods Saxon (WS) wave functions. The long tail is evident in the computed neutron and matter densities of these nuclei. The plane wave Born approximation (PWBA) is calculate the elastic form factors of these exotic nuclei. The variation in the proton density distributions due to the presence of the extra neutrons in 18N and 20F leads to a major difference between the elastic form factors of these exotic nuclei and their stable isotopes 14N and 19F. The reaction c
... Show More
Strengthening of the existing structures is an important task that civil engineers continuously face. Compression members, especially columns, being the most important members of any structure, are the most important members to strengthen if the need ever arise. The method of strengthening compression members by direct wrapping by Carbon Fiber Reinforced Polymer (CFRP) was adopted in this research. Since the concrete material is a heterogeneous and complex in behavior, thus, the behavior of the confined compression members subjected to uniaxial stress is investigated by finite element (FE) models created using Abaqus CAE 2017 software.
The aim of this research is to study experime
... Show MoreIn this paper, we proposed a modified Hestenes-Stiefel (HS) conjugate
gradient method. This achieves a high order accuracy in approximating the second
order curvature information of the objective function by utilizing the modified
secant condition which is proposed by Babaie-Kafaki [1], also we derive a nonquadratic
conjugate gradient model. The important property of the suggestion
method that is satisfy the descent property and global convergence independent of
the accuracy of the line search. In addition, we prove the global convergence under
some suitable conditions, and we reported the numerical results under these
conditions.
A three-dimensional (3D) model extraction represents the best way to reflect the reality in all details. This explains the trends and tendency of many scientific disciplines towards making measurements, calculations and monitoring in various fields using such model. Although there are many ways to produce the 3D model like as images, integration techniques, and laser scanning, however, the quality of their products is not the same in terms of accuracy and detail. This article aims to assess the 3D point clouds model accuracy results from close range images and laser scan data based on Agi soft photoscan and cloud compare software to determine the compatibility of both datasets for several applications. College of Scien
... Show MoreThe paper generates a geological model of a giant Middle East oil reservoir, the model constructed based on the field data of 161 wells. The main aim of the paper was to recognize the value of the reservoir to investigate the feasibility of working on the reservoir modeling prior to the final decision of the investment for further development of this oilfield. Well log, deviation survey, 2D/3D interpreted seismic structural maps, facies, and core test were utilized to construct the developed geological model based on comprehensive interpretation and correlation processes using the PETREL platform. The geological model mainly aims to estimate stock-tank oil initially in place of the reservoir. In addition, three scenarios were applie
... Show MoreThe ground state proton, neutron and matter densities of exotic 11Be and 15C nuclei are studied by means of the TFSM and BCM. In TFSM, the calculations are based on using different model spaces for the core and the valence (halo) neutron. Besides single particle harmonic oscillator wave functions are employed with two different size parameters Bc and Bv. In BCM, the halo nucleus is considered as a composite projectile consisting of core and valence clusters bounded in a state of relative motion. The internal densities of the clusters are described by single particle Gaussian wave functions.
Elastic electron scattering proton f
... Show MoreAbstract
The current research aims to reveal the extent to which all scoring rubrics data for the electronic work file conform to the partial estimation model according to the number of assumed dimensions. The study sample consisted of (356) female students. The study concluded that the list with the one-dimensional assumption is more appropriate than the multi-dimensional assumption, The current research recommends preparing unified correction rules for the different methods of performance evaluation in the basic courses. It also suggests the importance of conducting studies aimed at examining the appropriateness of different evaluation methods for models of response theory to the
... Show MoreSome geometric parameters affecting the performance of a wire-plate electrostatic precipitator (ESP) are investigated theoretically. A numerical model was built to investigate the influence of the discharge wire size, wire separation, collector plates spacing, and roughness factor on the ESP performance. The results show that thinner wires emit higher current than larger ones at the same applied voltage, which would be suitable for low voltage power supply to generate the desired current density at the collecting electrodes. The results also show that, as the discharge electrodes get closer, the corona gets suppressed, resulting in a diminished corona current flow. On the other hand, as the distance between elect
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show More