Linear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will change the problem of linear programming and will affect the optimal solution, and therefore we need a method that helps us to stand on the impact of changing these constants on the optimal solution that has been reached. General concepts about the binary model and some related theories have also been addressed. By analyzing the sensitivity, we relied on real data for a company that transports crude oil and its derivatives. The mathematical model was formulated for it and the optimal solution was reached using the software. Ready-made sop WINQSB and then calculate the shadow price values for the binding constraints, in addition to what
In this paper, we have investigated some of the most recent energy efficient routing protocols for wireless body area networks. This technology has seen advancements in recent times where wireless sensors are injected in the human body to sense and measure body parameters like temperature, heartbeat and glucose level. These tiny wireless sensors gather body data information and send it over a wireless network to the base station. The data measurements are examined by the doctor or physician and the suitable cure is suggested. The whole communication is done through routing protocols in a network environment. Routing protocol consumes energy while helping non-stop communic
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreOne of the most prevalent phenolic compounds found in olive leaves is oleuropein. Numerous studies have demonstrated the biologically significant effects of this compound, including anti-inflammatory, anti-atherogenic, anticancer, antimicrobial, and antiviral effects, which has led to its increased attention in the scientific community. Oleuropein can be recovered and purified (mostly by chromatographic techniques) from a variety of sources using both conventional and non-conventional methods. It can then be applied in a number of contexts. Because of its numerous pharmacological properties, oleuropein is commercially obtainable as a food enhancement in Mediterranean countries. Numerous scientific and clinical investigations have d
... Show MoreThe Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show MoreIn this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.
The researchers have recently noticed the interest in the problem of overweight and how to find solutions to it until it is now at the forefront in terms of innovating various and different methods and treatment methods, and the interest in developing health fitness is one of the most important requirements of physical activity for the trainees, which led to the multiplicity of sports activities that promote the health aspect For the individual, in addition to the aesthetic aspect, the problem lies in not adopting training programs according to codified scientific foundations aiming, in addition to reducing weight, to raise the general health level of the trainee participating in fitness institutes, as the trainers do not follow the
... Show MoreThe Present study investigated the drought in Iraq, by using the rainfall data which obtained from 39 meteorological stations for the past 30 years (1980-2010). The drought coefficient calculated on basis of the standard precipitation index (SPI) and then characteristics of drought magnitude, duration and intensity were analyzed. The correlation and regression between magnitude and duration of drought were obtained according the (SPI) index. The result shows that drought magnitude values were greater in the northeast region of Iraq.
With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show More